Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond
نویسندگان
چکیده
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers. Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work we propose a viable solution for coping with Man-in-the-Middle attacks. To the best of our knowledge, this is the first work that propose to certify both the public key and out-of-band sense-able attributes to enable mutual authentication of the communicating vehicles. Vehicle owners are bound to preprocess (periodically) a certificate for both a public key and a list of fixed unchangeable attributes of the vehicle.
منابع مشابه
Certificating Vehicle Public Key with Vehicle Attributes
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers. Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work we propose a viable solution for coping with Man-in-the-Middle attacks. To the best of our knowledge, this is the first work that prop...
متن کاملVehicle Authentication via Monolithically Certified Public Key and Attributes
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work, we propose a viable solution for coping with Man-in-the-Middle attacks. Conventionally, Public ...
متن کاملThe ZRTP Protocol - Security Considerations
ZRTP is draft of key agreement protocol by Phil Zimmermann, which relies on a Di e-Hellman exchange to generate SRTP session parameters, providing con dentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure or endpoint certi cates. This is an analysis of the protocol performed with AVISPA and ProVerif, which tests security properties of ZRTP; in orde...
متن کاملEffect of ventilation air velocities on diesel particulate matter dispersion in underground coal mines
This paper presents a detailed account of computational fluid dynamics (CFD) simulations undertaken to investigate the influence of intake (ventilation) air velocities on the flow patterns of diesel particulate matter (DPM) generated by a man-riding vehicle operating in a straight rectangular cross section tunnel in an underground coal mine. The simulation results are validated against an earli...
متن کاملVBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have become mandatory because black box images and voice data have served as forensic...
متن کامل