Search papers, labs, and topics across Lattice.
This paper analyzes and compares three major V2X security standards: IEEE 1609, ETSI, and YD/T 3957-2021, focusing on certificate formats, message signing, and certificate request processes. It evaluates the performance of different cryptographic algorithms (NIST P-256 vs SM2-256, SHA-256 vs SM3-256, AES-128 vs SM4-128) within each standard. The study implements these standards on V2X devices and compares message signing and verification efficiency, providing insights for secure V2X certificate management.
Harmonizing global V2X communication demands a clear understanding of the performance tradeoffs between competing security standards (IEEE, ETSI, and China's YD/T) and their cryptographic implementations.
As V2X (Vehicle-to-Everything) technology becomes increasingly prevalent, the security of V2X networks has garnered growing attention worldwide. In North America, the IEEE 1609 series standards are primarily used, while Europe adopts the ETSI series standards, and China has also established its industry standard, YD/T 3957-2021, among others. Although these standards share some commonalities, they also exhibit differences. To achieve compatibility across these standards, analyzing their similarities and differences is a crucial issue. Therefore, this study focuses on analyzing the three major standards mentioned above, discussing aspects such as certificate formats, signed message formats, and certificate request processes. Additionally, this research evaluates the efficiency of different cryptographic methods, including NIST P-256 and SM2-256, SHA-256 and SM3-256, as well as AES-128 and SM4-128. Finally, the study implements these three major standards on V2X devices and compares the efficiency of message signing and signature verification in V2X systems, providing a reference for the development of a secure certificate management system for V2X networks.