WEKO3
アイテム
{"_buckets": {"deposit": "84e9d1c6-e116-4f9e-bdbc-d266accf36b1"}, "_deposit": {"created_by": 3, "id": "7239", "owners": [3], "pid": {"revision_id": 0, "type": "depid", "value": "7239"}, "status": "published"}, "_oai": {"id": "oai:kyutech.repo.nii.ac.jp:00007239", "sets": ["24"]}, "author_link": ["31234", "31233", "31232", "899"], "item_21_alternative_title_18": {"attribute_name": "その他のタイトル", "attribute_value_mlt": [{"subitem_alternative_title": "End-to-end Security for Connected Vehicles"}]}, "item_21_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2020-08-21", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "225", "bibliographicPageStart": "216", "bibliographicVolumeNumber": "1263", "bibliographic_titles": [{"bibliographic_title": "Advances in Intelligent Systems and Computing"}]}]}, "item_21_description_4": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Recently Mode 4 operation of Cellular Vehicle to Everything (C-V2X) specifies the operation of vehicle-to-vehicle, vehicle-to-pedestrian and vehicle-to-UE-stationary over the PC5 interface. However, the security is delegated to the application layer, which is out of the scope of the 3GPP-layer specification. Hence, we propose a transparent and independent distributed security protocol for C-V2X over the PC5 interface at the RLC-layer based on cryptographic ratchets. Our new proposed security protocol provides authenticated encryption, integrity, forward and backward secrecy. The security procedure can start on the fly as soon as vehicles enter a C-V2X group over the PC5 interface, using the cryptographic credentials of the digital certificate issued for ITS applications. The distributed security protocol supports strong encryption, authentication and privacy regardless of the use case in 5G applications for C-V2X over the PC5 interface.", "subitem_description_type": "Abstract"}]}, "item_21_description_5": {"attribute_name": "内容記述", "attribute_value_mlt": [{"subitem_description": "12th International Workshop on Information Network Design (WIND-2020), in conjunction with 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), August 31st - September 2nd, 2020, University of Victoria, Canada(新型コロナ感染拡大に伴い、現地開催中止)", "subitem_description_type": "Other"}]}, "item_21_description_60": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"subitem_description": "Journal Article", "subitem_description_type": "Other"}]}, "item_21_relation_12": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1007/978-3-030-57796-4_21", "subitem_relation_type_select": "DOI"}}]}, "item_21_relation_9": {"attribute_name": "ISBN", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "978-3-030-57795-7", "subitem_relation_type_select": "ISBN"}}, {"subitem_relation_type_id": {"subitem_relation_type_id_text": "978-3-030-57796-4", "subitem_relation_type_select": "ISBN"}}]}, "item_21_rights_13": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "Copyright (c) Springer Nature Switzerland AG 2021. This is a post-peer-review, pre-copyedit version of an article published in Advances in Intelligent Systems and Computing. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-57796-4_21."}]}, "item_21_select_59": {"attribute_name": "査読の有無", "attribute_value_mlt": [{"subitem_select_item": "yes"}]}, "item_21_subject_16": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "548", "subitem_subject_scheme": "NDC"}]}, "item_21_text_36": {"attribute_name": "著者所属", "attribute_value_mlt": [{"subitem_text_value": "City University of New York (CUNY)"}, {"subitem_text_value": "Mexico Autonomous Institute of Technology (ITAM)"}, {"subitem_text_value": "City University of New York (CUNY)"}, {"subitem_text_value": "Kyushu Institute of Technology"}]}, "item_21_text_63": {"attribute_name": "連携ID", "attribute_value_mlt": [{"subitem_text_value": "8799"}]}, "item_21_version_type_58": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Ahmed, Kazi J."}], "nameIdentifiers": [{"nameIdentifier": "31232", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Hernandez, Marco"}], "nameIdentifiers": [{"nameIdentifier": "31233", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Lee, Myung"}], "nameIdentifiers": [{"nameIdentifier": "31234", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "Tsukamoto, Kazuya", "creatorNameLang": "en"}, {"creatorName": "塚本, 和也", "creatorNameLang": "ja"}, {"creatorName": "ツカモト, カズヤ", "creatorNameLang": "ja-Kana"}], "familyNames": [{"familyName": "Tsukamoto", "familyNameLang": "en"}, {"familyName": "塚本", "familyNameLang": "ja"}, {"familyName": "ツカモト", "familyNameLang": "ja-Kana"}], "givenNames": [{"givenName": "Kazuya", "givenNameLang": "en"}, {"givenName": "和也", "givenNameLang": "ja"}, {"givenName": "カズヤ", "givenNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "899", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "20452823", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020452823"}, {"nameIdentifier": "8237935100", "nameIdentifierScheme": "Scopus著者ID", "nameIdentifierURI": "https://www.scopus.com/authid/detail.uri?authorId=8237935100"}, {"nameIdentifier": "218", "nameIdentifierScheme": "九工大研究者情報", "nameIdentifierURI": "https://hyokadb02.jimu.kyutech.ac.jp/html/218_ja.html"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2021-08-23"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "RECN_2020-07.pdf", "filesize": [{"value": "626.1 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 626100.0, "url": {"label": "RECN_2020-07.pdf", "url": "https://kyutech.repo.nii.ac.jp/record/7239/files/RECN_2020-07.pdf"}, "version_id": "bb24c140-d7a3-4e78-bf3c-75283a07e62c"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "End-to-End Security for Connected Vehicles", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "End-to-End Security for Connected Vehicles"}]}, "item_type_id": "21", "owner": "3", "path": ["24"], "permalink_uri": "http://hdl.handle.net/10228/00008443", "pubdate": {"attribute_name": "公開日", "attribute_value": "2021-08-23"}, "publish_date": "2021-08-23", "publish_status": "0", "recid": "7239", "relation": {}, "relation_version_is_last": true, "title": ["End-to-End Security for Connected Vehicles"], "weko_shared_id": 3}
End-to-End Security for Connected Vehicles
http://hdl.handle.net/10228/00008443
http://hdl.handle.net/10228/000084437507d2ee-e054-49d1-9fb4-947ad07e2a1a
名前 / ファイル | ライセンス | アクション |
---|---|---|
RECN_2020-07.pdf (626.1 kB)
|
|
Item type | 学術雑誌論文 = Journal Article(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2021-08-23 | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||
資源タイプ | journal article | |||||||||||
タイトル | ||||||||||||
タイトル | End-to-End Security for Connected Vehicles | |||||||||||
その他のタイトル | ||||||||||||
その他のタイトル | End-to-end Security for Connected Vehicles | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
著者 |
Ahmed, Kazi J.
× Ahmed, Kazi J.× Hernandez, Marco× Lee, Myung× 塚本, 和也
WEKO
899
|
|||||||||||
抄録 | ||||||||||||
内容記述タイプ | Abstract | |||||||||||
内容記述 | Recently Mode 4 operation of Cellular Vehicle to Everything (C-V2X) specifies the operation of vehicle-to-vehicle, vehicle-to-pedestrian and vehicle-to-UE-stationary over the PC5 interface. However, the security is delegated to the application layer, which is out of the scope of the 3GPP-layer specification. Hence, we propose a transparent and independent distributed security protocol for C-V2X over the PC5 interface at the RLC-layer based on cryptographic ratchets. Our new proposed security protocol provides authenticated encryption, integrity, forward and backward secrecy. The security procedure can start on the fly as soon as vehicles enter a C-V2X group over the PC5 interface, using the cryptographic credentials of the digital certificate issued for ITS applications. The distributed security protocol supports strong encryption, authentication and privacy regardless of the use case in 5G applications for C-V2X over the PC5 interface. | |||||||||||
備考 | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | 12th International Workshop on Information Network Design (WIND-2020), in conjunction with 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), August 31st - September 2nd, 2020, University of Victoria, Canada(新型コロナ感染拡大に伴い、現地開催中止) | |||||||||||
書誌情報 |
Advances in Intelligent Systems and Computing 巻 1263, p. 216-225, 発行日 2020-08-21 |
|||||||||||
DOI | ||||||||||||
関連タイプ | isVersionOf | |||||||||||
識別子タイプ | DOI | |||||||||||
関連識別子 | https://doi.org/10.1007/978-3-030-57796-4_21 | |||||||||||
ISBN | ||||||||||||
識別子タイプ | ISBN | |||||||||||
関連識別子 | 978-3-030-57795-7 | |||||||||||
ISBN | ||||||||||||
識別子タイプ | ISBN | |||||||||||
関連識別子 | 978-3-030-57796-4 | |||||||||||
日本十進分類法 | ||||||||||||
主題Scheme | NDC | |||||||||||
主題 | 548 | |||||||||||
著作権関連情報 | ||||||||||||
権利情報 | Copyright (c) Springer Nature Switzerland AG 2021. This is a post-peer-review, pre-copyedit version of an article published in Advances in Intelligent Systems and Computing. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-57796-4_21. | |||||||||||
出版タイプ | ||||||||||||
出版タイプ | AM | |||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||
査読の有無 | ||||||||||||
値 | yes | |||||||||||
連携ID | ||||||||||||
8799 |