2015
DOI: 10.1109/mvt.2015.2479367
|View full text |Cite
|
Sign up to set email alerts
|

The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems

Abstract: Vehicular Communication (VC) systems will greatly enhance intelligent transportation systems. But their security and the protection of their users' privacy are a prerequisite for deployment. Efforts in industry and academia brought forth a multitude of diverse proposals. These have now converged to a common view, notably on the design of a security infrastructure, a Vehicular Public Key Infrastructure (VPKI) that shall enable secure conditionally anonymous VC. Standardization efforts and industry readiness to … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 54 publications
(29 citation statements)
references
References 22 publications
0
29
0
Order By: Relevance
“…We assume that each vehicle is registered only with its Home-LTCA (H-LTCA), the policy decision and enforcement point, reachable by the registered vehicles. Without loss of generality, a domain can be defined as a set of vehicles in a region, registered with the H-LTCA, subject to the same administrative regulations and policies [50]. There can be several PCAs, each active in one or more domains.…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…We assume that each vehicle is registered only with its Home-LTCA (H-LTCA), the policy decision and enforcement point, reachable by the registered vehicles. Without loss of generality, a domain can be defined as a set of vehicles in a region, registered with the H-LTCA, subject to the same administrative regulations and policies [50]. There can be several PCAs, each active in one or more domains.…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…We assume that each vehicle is registered only with its Home-LTCA (H-LTCA), the policy decision and enforcement point, reachable by the registered vehicles. Without loss of generality, a domain can be defined as a set of vehicles in a region, registered with the H-LTCA, subject to the same administrative regulations and policies [61,70]. There can be several PCAs, each active in one or more domains; any legitimate, i.e., registered, vehicle is able to obtain pseudonyms from any PCA, the pseudonym provider (as long as there is a trust established between the two CAs).…”
Section: System Model and Objectives 31 Overview And Assumptionsmentioning
confidence: 99%
“…Sybil resilience in VSNs remains an open challenge in the absence of consensus because the standardization bodies [16], [30] and harmonization efforts do not have conclusive views on that front. For example, Car2Car Communication Consortium (C2C-CC) [10] proposes to issue pseudonyms with overlapping lifetimes in order to keep the safety applications operational at any given point in time [34], while [44], [33] (works in the context of SeVeCom [35] and PRESERVE EU project [50] respectively) proposes to issue pseudonyms with non-overlapping lifetimes in order to eliminate the possibility of equipping a vehicle with multiple simultaneously valid short-term identities. However, beyond enforcing this constraint within a domain, malicious users could exploit the existence of multiple domains [1], [26], [18] to obtain simultaneously valid pseudonyms from different domains, depending on the pseudonym usage policies.…”
Section: A Resilience Considerationsmentioning
confidence: 99%
“…Facilitating cross domain operations is one of the main operational challenges in VC systems [34]. Similar to VC systems, trust establishment has to be taken into consideration before deploying a secure and privacy-preserving multidomain VSN.…”
Section: Operational Challenges In Identity Managementmentioning
confidence: 99%