2016
DOI: 10.1007/s11276-016-1203-5
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic attribute based vehicle authentication

Abstract: Modern vehicles are proficient in establishing a spontaneous connection over a wireless radio channel, synchronizing actions and information. Security infrastructure is most important in such a sensitive scope of vehicle communication for coordinating actions and avoiding accidents on the road. One of the first security issues that need to be established is authentication via IEEE 1609.2 security infrastructure. According to our preliminary work, vehicle owners are bound to preprocess a certificate from the ce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 50 publications
0
2
0
Order By: Relevance
“…The proposed protocol is simple, efficient and ready to be employed in current and future vehicular networks. More sophisticated scheme that specifically requires additional communication hardware, which is not currently available in vehicles, may also verify dynamic attributes in case the adversary is able to clone the vehicle with license number [34].…”
Section: Discussionmentioning
confidence: 99%
“…The proposed protocol is simple, efficient and ready to be employed in current and future vehicular networks. More sophisticated scheme that specifically requires additional communication hardware, which is not currently available in vehicles, may also verify dynamic attributes in case the adversary is able to clone the vehicle with license number [34].…”
Section: Discussionmentioning
confidence: 99%
“…For example, vehicles usually spend most of their time moving at high speed and malicious attackers could cause serious traffic accidents by broadcasting false messages. Malicious attackers may also obtain a vehicle owner’s identity information, vehicle location information, driving trajectory, and so on by interception of data packets [24]. This violates user privacy.…”
Section: Introductionmentioning
confidence: 99%