An interoperability system for authentication and authorisation in VANETs
نویسندگان
چکیده
Vehicular ad hoc networks (VANETs) have evolved considerably over the last years, but despite the wide number of potential applications, VANETs also raise a broad range of critical security and privacy challenges. To achieve privacy, VANETs enforce the concepts of authentication and authorisation via public key infrastructures, relying on a large set of regional certification authorities with explicit cross-certification agreements to provide interoperability for vehicles and services. To avoid the burden of managing these cross-certificates, our research proposes the interoperability system (IS), an architecture to provide VANETs’ nodes with a security mechanism for mutually untrusted domains. The IS supplies vehicles with a trusted set of credentials by implementing a certificate status service and a security level evaluator. This paper shows that the proposed architecture can be used to implement a mandatory access control mechanism in two VANET scenarios with a protocol independent of the underlying communication system.
منابع مشابه
Full Paper: Flexible, Extensible, and Efficient VANET Authentication
The authentication of VANET messages continues to be an important research challenge. Although much research has been conducted in the area of message authentication in wireless networks, VANETs pose unique challenges, such as real-time constraints, processing limitations, memory constraints, requirements for interoperability with existing standards, extensibility and flexibility for future req...
متن کاملImproving QoS in VANETs: A Survey
The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads ...
متن کاملIntegration of Data-Minimising Authentication into Authorisation Systems
Authentication and authorisation are essential ingredients for effective protection of data in distributed information systems. Currently, they are being treated as separate components with specified input and output relations. Traditional authorisation components require all of the users’ information that is possibly relevant to an authorisation decision and consequently the authentication com...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملE-identification technologies for e-government interoperability in the EU
The EU commission has set the Pan-European Interoperability of secure authentication and authorisation systems for access to e-government services as a priority target for 2010. To this effect a large number of EU member states have implemented e-identification schemes. These are at varying stages of completion and use a range of technologies. All of them though aim at meeting the above target ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJAACS
دوره 3 شماره
صفحات -
تاریخ انتشار 2010