A security credential management system for V2V communications
Citations
471 citations
Cites background or methods from "A security credential management sy..."
...Confidentiality NHTSA and ETSI via symmetric and asymmetric encryption....
[...]
...Node impersonation Authentication Integrity Non-repudiation [2,37,39,41] Masquerading Authentication Non-repudiation Integrity [25,47] Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58] Timing attack Availability [9,24,36] Replay Authentication Integrity Non-repudiation [2,25,43] Illusion attack Authentication Integrity [25,35,58] Jamming Availability [35,57] Key and/or certificate replication (unauthorized access) Authentication Confidentiality [3,24,30,33,38,39] Loss of event traceability (Repudiation) Non-repudiation [9,41,33] For Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25]....
[...]
...Attacks Compromised services Solutions Tracking Privacy [2,3,12,24–32] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication Privacy [2] DOS Authentication Availability [1,2,24,33–36] Sybil attack Authentication Availability [3,8,9,37–44] Malware Availability [41,41] Spamming Confidentiality Man in the middle attack Authentication Confidentiality Integrity Non-repudiation [9,36,45–47] Brute force Authentication Confidentiality [49,48,49] Tampering Hardware Confidentiality Privacy Control of manufacturer users’ job....
[...]
...Tracking Privacy [2,3,12,24–32] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication Privacy [2]...
[...]
...NHTSA proposed a security architecture [12] based on PKI....
[...]
414 citations
Cites background from "A security credential management sy..."
...Jamming and eavesdropping are two primary attacks in networks, and the vehicular public key infrastructure (PKI) and elliptic curve digital signature algorithm (ECDSA) have been proposed to be the two main security architectures to ensure the confidential communication from malicious attacks [36], [37]....
[...]
337 citations
Additional excerpts
...The Security Credential Management System (SCMS), developed under a cooperative agreement with the United States Department of Transportation (USDOT), is currently the leading candidate for V2V security backend design in the U.S. [4]....
[...]
164 citations
158 citations
References
[...]
4,816 citations
"A security credential management sy..." refers methods in this paper
...This would enable masquerading as multiple devices by compromising a single device (the so-called Sybil attack [20]) [21]....
[...]
2,063 citations
1,956 citations
[...]
1,853 citations
1,562 citations