2018 IEEE 88th Vehicular Technology Conference (VTC-Fall) 2018
DOI: 10.1109/vtcfall.2018.8690839
|View full text |Cite
|
Sign up to set email alerts
|

Key Management System for Private Car-Sharing Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Thus, it allows the SP to collect the information exchanged between the vehicle, SP, and each of the users for every vehicle access provision. Hernandez et al [81] proposed a secure key management system enabling vehicle sharing, utilizing a central key and a distributed management server with PKI infrastructure. Groza et al [82] focused on the use of HSMs utilizing identity-based signatures aiming at providing and delegating access to a vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, it allows the SP to collect the information exchanged between the vehicle, SP, and each of the users for every vehicle access provision. Hernandez et al [81] proposed a secure key management system enabling vehicle sharing, utilizing a central key and a distributed management server with PKI infrastructure. Groza et al [82] focused on the use of HSMs utilizing identity-based signatures aiming at providing and delegating access to a vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…However, the use of ML for achieving confidentiality is not much studied in the literature. Most of the works in the literature are about the use of keys to secure data and achieve confidentiality within a system [99]- [102].…”
Section: Security Attacks and Requirementsmentioning
confidence: 99%
“…In the context of privacy, the use of ML is at an infant stage and is receiving attention recently. The use of ML for achieving confidentiality is not much studied in the literature, and it appears that most of the work use key-based approaches which seem enough to achieve confidentiality within in a system [99]- [102].…”
Section: Observations and Lessons Learnedmentioning
confidence: 99%