2014 IEEE Vehicular Networking Conference (VNC) 2014
DOI: 10.1109/vnc.2014.7013306
|View full text |Cite
|
Sign up to set email alerts
|

Towards deploying a scalable & robust vehicular identity and credential management infrastructure

Abstract: Abstract---Several years of academic and industrial research efforts have converged to a common understanding on fundamental security building blocks for the upcoming Vehicular Communication (VC) systems. There is a growing consensus towards deploying a Vehicular Public-Key Infrastructure (VPKI) enables pseudonymous authentication, with standardization efforts in that direction. However, there are still significant technical issues that remain unresolved. Existing proposals for instantiating the VPKI either ne… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
78
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 32 publications
(78 citation statements)
references
References 22 publications
0
78
0
Order By: Relevance
“…Moreover, we assume that there is a misbehavior detection system, e.g., [51], that triggers the revocation. The Resolution Authority (RA) can initiate a process to resolve and revoke all pseudonyms of a misbehaving vehicle: it interacts with the corresponding PCAs and LTCA (a detailed protocol description in [27], [43], [52]) to resolve and revoke all credentials issued for a misbehaving vehicle. Consequently, the misbehaving vehicle can no longer obtain credentials from the VPKI.…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…Moreover, we assume that there is a misbehavior detection system, e.g., [51], that triggers the revocation. The Resolution Authority (RA) can initiate a process to resolve and revoke all pseudonyms of a misbehaving vehicle: it interacts with the corresponding PCAs and LTCA (a detailed protocol description in [27], [43], [52]) to resolve and revoke all credentials issued for a misbehaving vehicle. Consequently, the misbehaving vehicle can no longer obtain credentials from the VPKI.…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…However, this would not work if there exist multiple pseudonym providers (so that a vehicle can request pseudonyms from the closest one) and a vehicle can request pseudonyms from different pseudonym providers. This is due to the separation of duties among authorities is enforced in VC domain so that the pseudonym providers are not allowed to share their records (otherwise the authorities could collude and infer extra information) [33], [24]. [33] proposes a ticket-based scheme: an anonymized ticket is obtained from identity provider, then the ticket is used to obtain pseudonyms from a pseudonym provider.…”
Section: Sybil Resiliencementioning
confidence: 99%
“…This is due to the separation of duties among authorities is enforced in VC domain so that the pseudonym providers are not allowed to share their records (otherwise the authorities could collude and infer extra information) [33], [24]. [33] proposes a ticket-based scheme: an anonymized ticket is obtained from identity provider, then the ticket is used to obtain pseudonyms from a pseudonym provider. Each ticket is bound to a specific pseudonym provider without disclosing the targeted pseudonym provider to the identity provider, so that each ticket can be used only once while not revealing location of the vehicle to the identity provider.…”
Section: Sybil Resiliencementioning
confidence: 99%
See 1 more Smart Citation
“…EVITA [22] and PRESERVE [40] are designated projects on the design and specification of the secure architecture of on-board units. Driven by the PRESERVE instantiation, Raya et al [42] described the need for a Vehicular Public-Key Infrastructure (VPKI), and Khodaei et al [34] proposed a generic pseudonymization approach to preserve the unlinkability of messages exchanged between vehicles and VPKI servers. None of these solutions provides a full-fledged keyless car sharing system.…”
Section: Introductionmentioning
confidence: 99%