Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond

نویسندگان

  • Shlomi Dolev
  • Lukasz Krzywiecki
  • Nisha Panwar
  • Michael Segal
چکیده

Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers. Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work we propose a viable solution for coping with Man-in-the-Middle attacks. To the best of our knowledge, this is the first work that propose to certify both the public key and out-of-band sense-able attributes to enable mutual authentication of the communicating vehicles. Vehicle owners are bound to preprocess (periodically) a certificate for both a public key and a list of fixed unchangeable attributes of the vehicle.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Certificating Vehicle Public Key with Vehicle Attributes

Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers. Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work we propose a viable solution for coping with Man-in-the-Middle attacks. To the best of our knowledge, this is the first work that prop...

متن کامل

Vehicle Authentication via Monolithically Certified Public Key and Attributes

Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work, we propose a viable solution for coping with Man-in-the-Middle attacks. Conventionally, Public ...

متن کامل

The ZRTP Protocol - Security Considerations

ZRTP is draft of key agreement protocol by Phil Zimmermann, which relies on a Di e-Hellman exchange to generate SRTP session parameters, providing con dentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure or endpoint certi cates. This is an analysis of the protocol performed with AVISPA and ProVerif, which tests security properties of ZRTP; in orde...

متن کامل

Effect of ventilation air velocities on diesel particulate matter dispersion in underground coal mines

This paper presents a detailed account of computational fluid dynamics (CFD) simulations undertaken to investigate the influence of intake (ventilation) air velocities on the flow patterns of diesel particulate matter (DPM) generated by a man-riding vehicle operating in a straight rectangular cross section tunnel in an underground coal mine. The simulation results are validated against an earli...

متن کامل

VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity

Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have become mandatory because black box images and voice data have served as forensic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013