Proceedings ArticleDOI
A security credential management system for V2V communications
William Whyte,Andre Weimerskirch,Virendra Kumar,Thorsten Hehn +3 more
- pp 1-8
Reads0
Chats0
TLDR
This system is currently being finalized, and it is the leading candidate design for the V2V security backend design in the US, subject to review by the US Department of Transportation and other stakeholders.Abstract:
We present a security credential management system for vehicle-to-vehicle communications, which has been developed under a Cooperative Agreement with the US Department of Transportation. This system is currently being finalized, and it is the leading candidate design for the V2V security backend design in the US, subject to review by the US Department of Transportation and other stakeholders. It issues digital certificates to participating vehicles for establishing trust among them, which is necessary for safety applications based on vehicle-to-vehicle communications. It supports four main use cases, namely, bootstrapping, certificate provisioning, misbehavior reporting and revocation. The main design goal is to provide both security and privacy to the largest extent reasonable and possible. To achieve the latter, vehicles are issued pseudonym certificates, and the provisioning of those certificates is divided among multiple organizations. One of the main challenges is to facilitate efficient revocation while providing privacy against attacks from insiders.read more
Citations
More filters
Book ChapterDOI
Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET
TL;DR: The identification of the vulnerabilities in the existing pseudonym changing schemes, determining the attacking capabilities of the local-passive attacker, and demonstration of the optimal case for an attacker to deploy the network of eavesdropping stations with the feasible attacking capabilities are provided.
Journal ArticleDOI
Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication
TL;DR: A centralized adaptive pseudonym change scheme that permits the certificate’s authority to adjust the pseudonyms assignment for each requesting vehicle is proposed, which aims to solve the trade-off problem between wasting pseudonyms and Sybil attack.
Journal ArticleDOI
Privacy-Preserving Certificate Linkage/Revocation in VANETs Without Linkage Authorities
Marcos A. Simplicio,Eduardo Lopes Cominetti,Harsh Kupwade Patil,Jefferson E. Ricardini,Leonardo T. D. Ferraz,Marcos Vinicius M. Silva +5 more
TL;DR: A method is proposed that simplifies SCMS’s architecture, removing the need for Linkage Authorities (LAs), and cuts down deployment costs while reducing the system‘s attack surface, in particular against some troublesome forms of replay attacks that are hereby unveiled.
Journal ArticleDOI
Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)
TL;DR: A survey of Vehicular Public-key Infrastructure (PKI) schemes for secure management and revocation of public-key certificates can be found in this article , where the authors present evaluation metrics that help to compare the existing VPKI proposals systematically.
Proceedings ArticleDOI
Efficient Certificate Management in Blockchain based Internet of Vehicles
TL;DR: This paper uses the blockchain technology to address the distribution and management of the Certificate Revocation List (CRL) in vehicle public key infrastructure (PKI) and proposes a scheme to reduce the verification cost and naturally remove the certificate of inactive cars.
References
More filters
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Journal ArticleDOI
The protection of information in computer systems
TL;DR: In this article, the authors explore the mechanics of protecting computer-stored information from unauthorized use or modification, focusing on those architectural structures-whether hardware or software-that are necessary to support information protection.
Book ChapterDOI
Short Group Signatures
TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Proceedings Article
Group signatures
David Chaum,Eugène van Heyst +1 more
TL;DR: A new type of signature for a group of persons, called a group signature, which has the following properties: only members of the group can sign messages; and if necessary, the signature can be "opened", so that the person who signed the message is revealed.
Journal Article
Short group signatures
TL;DR: In this paper, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.