{"created":"2023-05-15T12:00:26.449267+00:00","id":7239,"links":{},"metadata":{"_buckets":{"deposit":"84e9d1c6-e116-4f9e-bdbc-d266accf36b1"},"_deposit":{"created_by":3,"id":"7239","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"7239"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00007239","sets":["8:24"]},"author_link":["31234","31233","31232","899"],"item_21_alternative_title_18":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"End-to-end Security for Connected Vehicles"}]},"item_21_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2020-08-21","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"225","bibliographicPageStart":"216","bibliographicVolumeNumber":"1263","bibliographic_titles":[{"bibliographic_title":"Advances in Intelligent Systems and Computing"}]}]},"item_21_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Recently Mode 4 operation of Cellular Vehicle to Everything (C-V2X) specifies the operation of vehicle-to-vehicle, vehicle-to-pedestrian and vehicle-to-UE-stationary over the PC5 interface. However, the security is delegated to the application layer, which is out of the scope of the 3GPP-layer specification. Hence, we propose a transparent and independent distributed security protocol for C-V2X over the PC5 interface at the RLC-layer based on cryptographic ratchets. Our new proposed security protocol provides authenticated encryption, integrity, forward and backward secrecy. The security procedure can start on the fly as soon as vehicles enter a C-V2X group over the PC5 interface, using the cryptographic credentials of the digital certificate issued for ITS applications. The distributed security protocol supports strong encryption, authentication and privacy regardless of the use case in 5G applications for C-V2X over the PC5 interface.","subitem_description_type":"Abstract"}]},"item_21_description_5":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"12th International Workshop on Information Network Design (WIND-2020), in conjunction with 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), August 31st - September 2nd, 2020, University of Victoria, Canada(新型コロナ感染拡大に伴い、現地開催中止)","subitem_description_type":"Other"}]},"item_21_description_60":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"Journal Article","subitem_description_type":"Other"}]},"item_21_relation_12":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1007/978-3-030-57796-4_21","subitem_relation_type_select":"DOI"}}]},"item_21_relation_9":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"978-3-030-57795-7","subitem_relation_type_select":"ISBN"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"978-3-030-57796-4","subitem_relation_type_select":"ISBN"}}]},"item_21_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (c) Springer Nature Switzerland AG 2021. This is a post-peer-review, pre-copyedit version of an article published in Advances in Intelligent Systems and Computing. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-57796-4_21."}]},"item_21_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"yes"}]},"item_21_subject_16":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"548","subitem_subject_scheme":"NDC"}]},"item_21_text_36":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"City University of New York (CUNY)"},{"subitem_text_value":"Mexico Autonomous Institute of Technology (ITAM)"},{"subitem_text_value":"City University of New York (CUNY)"},{"subitem_text_value":"Kyushu Institute of Technology"}]},"item_21_text_63":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"8799"}]},"item_21_version_type_58":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ahmed, Kazi J."}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hernandez, Marco"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Lee, Myung"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"Tsukamoto, Kazuya","creatorNameLang":"en"},{"creatorName":"塚本, 和也","creatorNameLang":"ja"},{"creatorName":"ツカモト, カズヤ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2021-08-23"}],"displaytype":"detail","filename":"RECN_2020-07.pdf","filesize":[{"value":"626.1 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"RECN_2020-07.pdf","url":"https://kyutech.repo.nii.ac.jp/record/7239/files/RECN_2020-07.pdf"},"version_id":"bb24c140-d7a3-4e78-bf3c-75283a07e62c"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"End-to-End Security for Connected Vehicles","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"End-to-End Security for Connected Vehicles"}]},"item_type_id":"21","owner":"3","path":["24"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-08-23"},"publish_date":"2021-08-23","publish_status":"0","recid":"7239","relation_version_is_last":true,"title":["End-to-End Security for Connected Vehicles"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-10-25T08:46:58.657508+00:00"}