Proceedings Fourth International Workshop on Automotive and Autonomous Vehicle Security 2022
DOI: 10.14722/autosec.2022.23044
|View full text |Cite
|
Sign up to set email alerts
|

Towards a TEE-based V2V Protocol for Connected and Autonomous Vehicles

Abstract: any misbehavior in the CAV communication should be prohibited and investigated. Therefore, the data management of the CAV network should include dynamic revocation and accountability of (malicious or compromised) vehicles.To address these challenges, many prior efforts (e.g., [3], [12], [28]) advocate the use of certificate-based authentication to meet the demands of CAV infrastructure security such as authentication as well as scalability and efficiency, inspired by the practice from Internet-based network [1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Implementation. Due to the lack of open-source V2X implementations, we implemented a custom V2X protocol based on [28], in which a group symmetric key is shared among all vehicles to sign and verify V2V messages. In addition, TCs are able to autonomously generate their own pseudonyms (similar to [46], [12]), which are random identifiers attached to messages as metadata.…”
Section: A Revocation Timementioning
confidence: 99%
See 1 more Smart Citation
“…Implementation. Due to the lack of open-source V2X implementations, we implemented a custom V2X protocol based on [28], in which a group symmetric key is shared among all vehicles to sign and verify V2V messages. In addition, TCs are able to autonomously generate their own pseudonyms (similar to [46], [12]), which are random identifiers attached to messages as metadata.…”
Section: A Revocation Timementioning
confidence: 99%
“…A common approach to establish a root of trust in distributed systems is by relying on Trusted Components (TCs), such as Trusted Platform Modules (TPMs) or Trusted Execution Environments (TEEs) [33], which provide the means to securely store and use long-term credentials, perform key generation, remote attestation, and sealing. Several papers propose the use of trusted components inside vehicles to manage cryptographic credentials and increase security and privacy [23], [44], [28]. Based on the security features provided by TCs, Direct Anonymous Attestation (DAA) has been developed as a privacy-preserving protocol to remotely authenticate a system [7], [26].…”
Section: Introductionmentioning
confidence: 99%