Secure Authentication Protocol Implementation for V2X Communication: a Simulation Study-Case

  • Emanuely Poncio do Amaral UFSC
  • Leonardo Passig Horstmann UFSC
  • Antônio Augusto Fröhlich UFSC

Resumo


Secure Vehicle-to-Everything (V2X) communication is a key for the development of Intelligent Transportation Systems (ITS). Compromising the sensitive data exchanged by vehicles, pedestrians and the infrastructure can lead to critical safety and privacy risks. Nevertheless, implementing robust security protocols that respect the real-time requirements of such critical applications is challenging due to the significant computational overhead of traditional PKI and the strict latency constraints of safety messages. This work investigates the application of a secure IIoT authentication protocol, proposed in previous work by the group, in the context of V2X communication. The secure protocol is implemented on a V2X simulation environment built over the Artery framework (which integrates OMNeT++ and SUMO) and accounts for vehicles and Roadside Units communication. We evaluated the implementation in a 100-vehicle simulation in terms of latency and jitter, with a mean end-to-end authentication latency of 24.15 ms. The results corroborate the suitability of the secure IIoT protocol implemented here for V2X communication, demonstrating its ability to provide robust security without introducing prohibitive delays.
Palavras-chave: security, V2X, simulation, protocol

Referências

IEEE standard for a precision clock synchronization protocol for networked measurement and control systems.

Daniel J. Bernstein. An overview of the omnet++ simulation environment. pages 32–49, Paris, France, march 2008.

D. Dolev and A. C. Yao. On the security of public key protocols. In 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pages 350–357. IEEE, October 1981.

Antônio Augusto Fröhlich, Leonardo Passig Horstmann, and José Luis Conradi Hoffmann. A secure iiot gateway architecture based on trusted execution environments. Journal of Network and Systems Management, 31(2), February 2023.

Farah Haidar, Arnaud Kaiser, and Brigitte Lonc. On the performance evaluation of vehicular pki protocol for v2x communications security. In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), page 1–5. IEEE, September 2017.

Intel Corporation. TinyCrypt Cryptographic Library. Accessed November 21, 2025.

Pablo Alvarez Lopez, Evamarie Wiessner, Michael Behrisch, Laura Bieker-Walz, Jakob Erdmann, Yun-Pang Flotterod, Robert Hilbrich, Leonhard Lucken, Johannes Rummel, and Peter Wagner. Microscopic traffic simulation using sumo. In 2018 21st International Conference on Intelligent Transportation Systems (ITSC), page 2575–2582. IEEE, November 2018.

Mateus Lucena, Roberto Milton Scheffel, and Antônio Augusto Fröhlich. Iot gateway integrity checking protocol. In 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC), pages 1–8, 2019.

NSA. The case for elliptic curve cryptography, January 2009.

National Institute of Standards and Technology. Advanced encryption standard (AES), November 2001.

National Institute of Standards and Technology. Secure hash standard, July 2015.

Raphael Riebl, Christina Obermaier, and Hendrik-Jörn Günther. Artery: Large Scale Simulation Environment for ITS Applications, page 365–406. Springer International Publishing, 2019.
Publicado
24/11/2025
AMARAL, Emanuely Poncio do; HORSTMANN, Leonardo Passig; FRÖHLICH, Antônio Augusto. Secure Authentication Protocol Implementation for V2X Communication: a Simulation Study-Case. In: WORKSHOP LATINOAMERICANO DE DEPENDABILIDADE E SEGURANÇA EM SISTEMAS VEICULARES (SSV), 2. , 2025, Campinas/SP. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2025 . p. 9-12.