Analysis of Vehicle-Based Security Operations

نویسنده

  • Jason M. Carter
چکیده

Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated ShortRange Communication (DSRC) device use becomes mandatory. The system’s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications must be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that may be applicable to a VBSS, and suggest some additional research directions in order to find a practical solution that appropriately addresses security and privacy. Section 1: Introduction Dedicated Short-Range Communication (DSRC) can support V2V and V2I communications; however, bandwidth and range limitations challenge integration of safety and privacy features. In order to ensure interoperability between different OEMs, vehicle safety messages (i.e., Basic Safety Messages or BSMs) must be trusted while protecting the identity of the driver or vehicle. In a traditional public key infrastructure (PKI), participants create, receive, manage, and revoke certificates. A certificate encapsulates a participant’s public key and identifies that participant within the system. Each participant signs data using their private key. When a message recipient receives a signed message, the recipient verifies the message signature using the sender’s public key to ensure the message has not been altered. Assuming that the sender’s private signing key has not been compromised or exposed, the recipient will trust that the sender signed and sent the received message. The proposed Public Key Infrastructure (PKI) for the Intelligent Transportation System (ITS) Vehicle-toVehicle (V2V) safety initiative will be the largest PKI ever deployed. The PKI needs to address the basic security properties (authentication, integrity, and non-repudiation) of a traditional PKI while protecting individual privacy. In the rest of this document, assume that unless otherwise stated, a PKI refers to a PKI for use in a transportation infrastructure and will be used for V2V and V2I. As in most PKIs, revocation is

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A time-dependent vehicle routing problem for disaster response phase in multi-graph-based network

Logistics planning in disaster response phase involves dispatching commodities such as medical materials, personnel, food, etc. to affected areas as soon as possible to accelerate the relief operations. Since transportation vehicles in disaster situations can be considered as scarce resources, thus, the efficient usage of them is substantially important. In this study, we provide a dynamic vehi...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Signaling Game-based Misbehavior Inspection in V2I-enabled Highway Operations

Vehicle-to-Infrastructure (V2I) communications are increasingly supporting highway operations such as electronic toll collection, carpooling, and vehicle platooning. In this paper we study the incentives of strategic misbehavior by individual vehicles who can exploit the security vulnerabilities in V2I communications and impact the highway operations. We consider a V2I-enabled highway segment f...

متن کامل

A multi-product vehicle routing scheduling model with time window constraints for cross docking system under uncertainty: A fuzzy possibilistic-stochastic programming

Mathematical modeling of supply chain operations has proven to be one of the most complex tasks in the field of operations management and operations research. Despite the abundance of several modeling proposals in the literature; for vast majority of them, no effective universal application is conceived. This issue renders the proposed mathematical models inapplicable due largely to the fact th...

متن کامل

MIMO Based Transceiver System for Unmanned Ground Vehicle for Surveillance In War Field

Unmanned ground vehicle is an autonomous vehicle that mainly capable to do tasks independent of humans. Automated vehicle works during off road navigation and mainly used in military operations. The radio environment on electrically small platforms is changing rapidly. In order to support high speed audio and video, processing needs higher data rates concerned with sending and receiving data pa...

متن کامل

Postural Ergonomic Risk Assessment (Pera) in The Workers of the Automobile Parts Assembly Line: A New Observational Method for the Cube Model

Assembly lines are associated with health risk and musculoskeletal disorders, particularly in the upper limbs. The aim of this study was to analyze three risk factors of posture, duration and force by using the postural ergonomic risk assessment (PERA) method in the workers of the assembly unit of automobile parts. Material and Methods: This descriptive cross-sectional study was conducted in th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015