Computer Science in Cars Symposium 2020
DOI: 10.1145/3385958.3430483
|View full text |Cite
|
Sign up to set email alerts
|

HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…To address the requirements from Section 3, we propose an extension for protocols of the PnC charging architecture to enable privacy-preserving charge authorization and billing. We use a TPM in an EV for protecting ISO 15118 credentials similar to [19] and extend this solution with a TPM-based DAA scheme [61] (adapted to be compatible with the PnC architecture) to provide unlinkability of personal data whenever possible. Notably, the use of a TPM is a suitable option in this context, since TPMs have already seen adoption in the automotive industry [26] and moreover the current draft of the next version of ISO 15118 [29] already offers explicit support for a TPM (based on the concept of [16]).…”
Section: Privacy-preserving Pnc Extensionmentioning
confidence: 99%
See 4 more Smart Citations
“…To address the requirements from Section 3, we propose an extension for protocols of the PnC charging architecture to enable privacy-preserving charge authorization and billing. We use a TPM in an EV for protecting ISO 15118 credentials similar to [19] and extend this solution with a TPM-based DAA scheme [61] (adapted to be compatible with the PnC architecture) to provide unlinkability of personal data whenever possible. Notably, the use of a TPM is a suitable option in this context, since TPMs have already seen adoption in the automotive industry [26] and moreover the current draft of the next version of ISO 15118 [29] already offers explicit support for a TPM (based on the concept of [16]).…”
Section: Privacy-preserving Pnc Extensionmentioning
confidence: 99%
“…Our privacy-extension requires five different types of TPM keys (cf. Table 2): (i) an endorsement credential (EC) key pair following the Trusted Computing Group's endorsement credential profile [56], (ii) a provisioning credential (P C) key pair following [19], (iii) a DAA contract credential (CC DAA ) key pair following that of the DAA key in [61] with the addition of an authorization policy, (iv) a session contract credential (CC Sess ) key pair (generated anew for every communication session), and (v) a symmetric eMAID key (SK eM AID ) defined for the generation of Hash-based Message Authentication Code (HMAC)-based charge authorization values.…”
Section: Tpm 20 Key Profilesmentioning
confidence: 99%
See 3 more Smart Citations