Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication

نویسنده

  • Stefan Kaufmann
چکیده

Car-2-Car communication requires the use of pseudonymous public keys to ensure the vehicle’s privacy by making its messages unlinkable over a longer period. The Pseudonymous PKI (PPKI) for Ubiquitous Computing by K. Zeng [Ze06] offers peer-side pseudonym generation, non-repudiation and an efficient revocation mechanism that excludes the revoked peers from the group of authorized participants. In addition, this work provides a new authorisation scheme that incorporates efficiently into the pseudonymous PKI, offers peer-side pseudonymous credential generation and preserves the peer's privacy during the initial authorisation obtainment from third party authentication authorities. The PKI scheme is also supplemented with a particular non-pseudonymous variation for roadside units as well as other adaptations based on Car-2-Car requirements. Finally, the signature verification performance and message sizes are analysed. We argue that the PPKI fulfils the security challenges of Car-2-Car communication and has advantages over a classical PKI.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wissenschaftliche Leitung Veranstalter Der Automotive 2014 Sponsoren Fg Ezqn Implementation and Adaptation of the Pseudonymous Pki for Ubiquitous Computing for Car-2-car Communication.……….…………………….………. 95 Automotive Safety and Security Integration Challenges

The ever increasing complexity of automotive vehicular systems, their connection to external networks, to the internet of things as well as their greater internal networking opens doors to hacking and malicious attacks. Security and privacy risks in modern automotive vehicular systems are well publicized by now. That violation of security could lead to safety violations – is a well-argued and a...

متن کامل

Autonomous Certification with List-Based Revocation for Secure V2V Communication

Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the ...

متن کامل

Design and implementation of an automatic car turning system

In this paper, a control system is designed for automatic car turning. At first, the necessary information of car turning that were collected from the traffic bylaw, car driving training centers and traffic police are explained. Then, car turning is studied experimentally on several streets with different widths. Afterward, a proper path is designed for the automatic car turning system consider...

متن کامل

Using the Reaction Delay as the Driver Effects in the Development of Car-Following Models

Car-following models, as the most popular microscopic traffic flow modeling, is increasingly being used by transportation experts to evaluate new Intelligent Transportation System (ITS) applications. A number of factors including individual differences of age, gender, and risk-taking behavior, have been found to influence car-following behavior. This paper presents a novel idea to calculate ...

متن کامل

Survey the safety culture and its relation with Just culture in the employees of the Car Manufacturing Industry

BACKGROUND AND POURPOSE: Due to the nature of the Car Manufacturing Industry and the risks and incidents in such industries, organizational commitment to safety and implementation of a safety culture is essential for working in these industries. The purpose of this study is to investigate the relationship between the safety culture and its possible association with just culture in the employees...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014