scispace - formally typeset
Proceedings ArticleDOI

A security credential management system for V2V communications

Reads0
Chats0
TLDR
This system is currently being finalized, and it is the leading candidate design for the V2V security backend design in the US, subject to review by the US Department of Transportation and other stakeholders.
Abstract
We present a security credential management system for vehicle-to-vehicle communications, which has been developed under a Cooperative Agreement with the US Department of Transportation. This system is currently being finalized, and it is the leading candidate design for the V2V security backend design in the US, subject to review by the US Department of Transportation and other stakeholders. It issues digital certificates to participating vehicles for establishing trust among them, which is necessary for safety applications based on vehicle-to-vehicle communications. It supports four main use cases, namely, bootstrapping, certificate provisioning, misbehavior reporting and revocation. The main design goal is to provide both security and privacy to the largest extent reasonable and possible. To achieve the latter, vehicles are issued pseudonym certificates, and the provisioning of those certificates is divided among multiple organizations. One of the main challenges is to facilitate efficient revocation while providing privacy against attacks from insiders.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Practical dynamic group signature with efficient concurrent joins and batch verifications

TL;DR: In this paper, the authors proposed a new dynamic group signatures scheme that supports efficient concurrent joins and batch verifications without knowledge extractor in security analysis, and the concurrent security is proven by showing that their join protocols are simulated without any knowledge extractors.
Journal ArticleDOI

A Privacy-Preserving and Transparent Identity Management Scheme for Vehicular Social Networking

TL;DR: Wang et al. as mentioned in this paper proposed a Privacy-Preserving Identity Management (PPTIM) scheme for vehicular social networking to securely and privately manage vehicles' social identities, which is based on the transparency log (distributed ledger) proposals for web PKI.
Proceedings ArticleDOI

Access Control for a Connected Vehicle Ecosystem

TL;DR: In this article, the authors present a vehicle data use case to identify the requirements and challenges for security and privacy in the automotive domain, and conduct a literature review of access control models and evaluate them against the identified requirements.
DissertationDOI

Dynamic pseudonym management for privacy preservation in vehicular communication systems.

Shihan Bao
TL;DR: The results demonstrate that the proposed scheme achieves a better degree of anonymity and low request delay at a lower cost than existing schemes.
Journal ArticleDOI

CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks

TL;DR: Design, detection and the mitigation of attacks in a vehicle platoon are focused on and priority call algorithm in combination with color-shift keying modulation is used to protect the platoon alleviating the undesirable impacts such as collisions, oscillations and disintegration in the platoon caused by the attacks.
References
More filters
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Journal ArticleDOI

The protection of information in computer systems

TL;DR: In this article, the authors explore the mechanics of protecting computer-stored information from unauthorized use or modification, focusing on those architectural structures-whether hardware or software-that are necessary to support information protection.
Book ChapterDOI

Short Group Signatures

TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Proceedings Article

Group signatures

TL;DR: A new type of signature for a group of persons, called a group signature, which has the following properties: only members of the group can sign messages; and if necessary, the signature can be "opened", so that the person who signed the message is revealed.
Journal Article

Short group signatures

TL;DR: In this paper, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Related Papers (5)