Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication
نویسنده
چکیده
Car-2-Car communication requires the use of pseudonymous public keys to ensure the vehicle’s privacy by making its messages unlinkable over a longer period. The Pseudonymous PKI (PPKI) for Ubiquitous Computing by K. Zeng [Ze06] offers peer-side pseudonym generation, non-repudiation and an efficient revocation mechanism that excludes the revoked peers from the group of authorized participants. In addition, this work provides a new authorisation scheme that incorporates efficiently into the pseudonymous PKI, offers peer-side pseudonymous credential generation and preserves the peer's privacy during the initial authorisation obtainment from third party authentication authorities. The PKI scheme is also supplemented with a particular non-pseudonymous variation for roadside units as well as other adaptations based on Car-2-Car requirements. Finally, the signature verification performance and message sizes are analysed. We argue that the PPKI fulfils the security challenges of Car-2-Car communication and has advantages over a classical PKI.
منابع مشابه
Wissenschaftliche Leitung Veranstalter Der Automotive 2014 Sponsoren Fg Ezqn Implementation and Adaptation of the Pseudonymous Pki for Ubiquitous Computing for Car-2-car Communication.……….…………………….………. 95 Automotive Safety and Security Integration Challenges
The ever increasing complexity of automotive vehicular systems, their connection to external networks, to the internet of things as well as their greater internal networking opens doors to hacking and malicious attacks. Security and privacy risks in modern automotive vehicular systems are well publicized by now. That violation of security could lead to safety violations – is a well-argued and a...
متن کاملAutonomous Certification with List-Based Revocation for Secure V2V Communication
Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the ...
متن کاملDesign and implementation of an automatic car turning system
In this paper, a control system is designed for automatic car turning. At first, the necessary information of car turning that were collected from the traffic bylaw, car driving training centers and traffic police are explained. Then, car turning is studied experimentally on several streets with different widths. Afterward, a proper path is designed for the automatic car turning system consider...
متن کاملUsing the Reaction Delay as the Driver Effects in the Development of Car-Following Models
Car-following models, as the most popular microscopic traffic flow modeling, is increasingly being used by transportation experts to evaluate new Intelligent Transportation System (ITS) applications. A number of factors including individual differences of age, gender, and risk-taking behavior, have been found to influence car-following behavior. This paper presents a novel idea to calculate ...
متن کاملSurvey the safety culture and its relation with Just culture in the employees of the Car Manufacturing Industry
BACKGROUND AND POURPOSE: Due to the nature of the Car Manufacturing Industry and the risks and incidents in such industries, organizational commitment to safety and implementation of a safety culture is essential for working in these industries. The purpose of this study is to investigate the relationship between the safety culture and its possible association with just culture in the employees...
متن کامل