Filters








372 Hits in 5.8 sec

Towards deploying a scalable & robust vehicular identity and credential management infrastructure

Mohammad Khodaei, Hongyu Jin, Panos Papadimitratos
2014 2014 IEEE Vehicular Networking Conference (VNC)  
There is a growing consensus towards deploying a Vehicular Public-Key Infrastructure (VPKI) enables pseudonymous authentication, with standardization efforts in that direction.  ...  In particular, we depart from the common assumption that the VPKI entities are fully trusted and we improve user privacy in the face of an honest-but-curious security infrastructure.  ...  The cornerstone of all these efforts, along with continuing work towards Field Operational Testing (FOT), is a Vehicular Public-Key Infrastructure (VPKI) that comprises a set of authorities with distinct  ... 
doi:10.1109/vnc.2014.7013306 dblp:conf/vnc/KhodaeiJP14 fatcat:noxbaxscxvftnanyejg3lne5cy

Blockchain-based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure [article]

Kuljeet Kaur, Sahil Garg, Georges Kaddoum, François Gagnon, Syed Hassan Ahmed
2019 arXiv   pre-print
In order to fully realize the potential of vehicular networks, the challenges of efficient communication and computation need to be addressed.  ...  Thus, an effective cross-datacenter authentication and key-exchange scheme based on blockchain and elliptic curve cryptography (ECC) is proposed in this paper.  ...  [18] proposed an efficient and privacy preserving carpooling scheme using blockchain. Accordingly, Yao et al.  ... 
arXiv:1904.01168v1 fatcat:ut3sc3sh2nfj3msdc6xsnltpbu

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  In this paper, an up-to-date privacy method mapping and relevant use cases are surveyed for II services.  ...  Nevertheless, designing well-balanced efficient, privacy-preserving, and constant-sized or logarithmic-sized ring signature schemes is still ongoing. B.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems [article]

Mohammad Khodaei, Hongyu Jin, Panos Papadimitratos
2017 arXiv   pre-print
There is a growing consensus towards deploying a special-purpose identity and credential management infrastructure, i.e., a Vehicular Public-Key Infrastructure (VPKI), enabling pseudonymous authentication  ...  We provide a detailed description of our state-of-the-art VPKI that improves upon existing proposals in terms of security and privacy protection, and efficiency.  ...  ACKNOWLEDGEMENT We would like to show our gratitude to Sebastian Mauthofer (Fraunhofer SIT) and Daniel Estor (Escrypt) to provide us the processing delays of their systems.  ... 
arXiv:1707.05518v1 fatcat:bofu7tdezrdfpgvbbrpx3mkjty

A privacy aware and efficient security infrastructure for vehicular ad hoc networks

Klaus Plößl, Hannes Federrath
2008 Computer Standards & Interfaces  
While fulfilling the requirements, our proposal is especially designed to protect privacy of the VANET users and proves to be very efficient in terms of computational needs and bandwidth overhead.  ...  To prevent abuse of VANETs, a security infrastructure is needed that ensures security requirements like message integrity, confidentiality, and availability.  ...  After a once-only initialization it employs asymmetric cryptography within a public key infrastructure (PKI) for messages influencing road safety.  ... 
doi:10.1016/j.csi.2008.03.007 fatcat:ur3hdo7gr5ga5efzob7r2somvy

SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems

Mohammad Khodaei, Hongyu Jin, Panagiotis Papadimitratos
2018 IEEE transactions on intelligent transportation systems (Print)  
There is a growing consensus towards deploying a special-purpose identity and credential management infrastructure, i.e., a Vehicular Public-Key Infrastructure (VPKI), enabling pseudonymous authentication  ...  We provide a detailed description of our state-of-the-art VPKI that improves upon existing proposals in terms of security and privacy protection, and efficiency.  ...  ACKNOWLEDGEMENT We would like to show our gratitude to Sebastian Mauthofer (Fraunhofer SIT) and Daniel Estor (Escrypt) to provide us the processing delays of their systems.  ... 
doi:10.1109/tits.2017.2722688 fatcat:yjxybt6ewjfvraadwauroqxwnq

Securing the Electric Vehicle Charging Infrastructure [article]

Roberto Metere, Myriam Neaimeh, Charles Morisset, Carsten Maple, Xavier Bellekens, Ricardo M. Czekster
2022 arXiv   pre-print
and energy efficiency.  ...  Such control assists in balancing electricity supply and demand across a green electricity system and could reduce costs for consumers.  ...  , and authenticate users and companies with the aid of a Public Key Infrastructure (PKI).  ... 
arXiv:2105.02905v3 fatcat:e7hzmpejsrdfzjxkwnkvt6pwdi

Recent Advances and Challenges in Security and Privacy for V2X Communications

Jiaqi Huang, Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2020 IEEE Open Journal of Vehicular Technology  
For privacy, we summarize and compare general solutions in preserving identity privacy and location privacy.  ...  SYSTEM ARCHITECTURE, ATTACKS, SECURITY SERVICES, AND BASIC SOLUTIONS IN VEHICULAR NETWORKS In this section, first, we introduce a generic system architecture of vehicular networks.  ...  time, efficient revocation requires that the revocation scheme should be scalable and efficient to meet the stringent requirement of vehicular networks. 9) Location Privacy Preservation: Location privacy  ... 
doi:10.1109/ojvt.2020.2999885 fatcat:d3ut2edr7jhvvltv6x56snw36u

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication

H. Xiong, K. Beznosov, Z. Qin, M. Ripeanu
2010 2010 IEEE International Conference on Communications  
This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature.  ...  Third, it is efficient: it offers fast message authentication and verification, cost-effective identity tracking in case of a dispute, and has low storage requirements.  ...  EFFICIENT AND SPONTANEOUS VEHICULAR COMMUNICATIONS SCHEME This section describes in detail our efficient and spontaneous privacy-preserving protocol for VANETs.  ... 
doi:10.1109/icc.2010.5502673 dblp:conf/icc/XiongBQR10 fatcat:njeegq4ke5bc7lvrc54ekguogu

SEROSA: SERvice oriented security architecture for Vehicular Communications

Stylianos Gisdakis, Marcello Lagana, Thanassis Giannetsos, Panos Papadimitratos
2013 2013 IEEE Vehicular Networking Conference  
While this transformation has driven major advancements in road safety and transportation efficiency, significant work remains to be done to support the security and privacy requirements of the envisioned  ...  In the era when "service is everything and everything is a service", Vehicular Communication (VC) systems cannot escape from this ongoing trend towards multi-service environments accessible from anywhere  ...  Intensive efforts in academia, industry, and standardization bodies have converged to the use of Vehicular Public Key Infrastructures (VPKIs) [5, 9] for credential and identity management.  ... 
doi:10.1109/vnc.2013.6737597 dblp:conf/vnc/GisdakisLGP13 fatcat:fnfddgvj3rb3xgweartsbzmila

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications [article]

Hu Xiong, Matei Ripeanu, Zhiguang Qin
2009 arXiv   pre-print
This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature.  ...  Third, it is efficient by offering fast message authentication and verification, cost-effective identity tracking in case of a dispute, and low storage requirements.  ...  EFFICIENT AND SPONTANEOUS VEHICULAR COMMUNICATIONS SCHEME This section describes in detail our efficient and spontaneous privacy-preserving protocol for VANET.  ... 
arXiv:0909.1590v1 fatcat:hqq2qxbo5jalfhmswrx6qqq6oy

Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey

Taimur Khan, Naveed Ahmad, Yue Cao, Syed Asim Jalal, Muhammad Asif, Sana ul Haq, Haitham Cruichshank
2017 Science China Information Sciences  
Security and Privacy: Security is a major challenge in VANETs [43] as well as the privacy. The network should be kept secure while keeping a reasonable balance between privacy and security.  ...  To reduce the overhead, Elliptic Curve Cryptography (ECC) Public Key Infrastructure PKI establishes a trustworthy network environment by providing digital certificate management and key services to  ... 
doi:10.1007/s11432-017-9203-x fatcat:buh7ximm6fhzrbl6mlorle5joa

Secure Anonymous Broadcasting in Vehicular Networks

Christine Laurendeau, Michel Barbeau
2007 32nd IEEE Conference on Local Computer Networks (LCN 2007)  
The Dedicated Short Range Communications (DSRC) framework's Wireless Access in Vehicular Environments (WAVE) application development architecture mandates the use of Public Key Infrastructure (PKI) mechanisms  ...  Vehicular networks face a typical quandary in their requirement for communications that are at once secure and private.  ...  Acknowledgements The authors gratefully acknowledge the financial support received for this research from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Automobile of the  ... 
doi:10.1109/lcn.2007.37 dblp:conf/lcn/LaurendeauB07 fatcat:ads3rfnjbzau3dt3ponvm5xrma

Euler's Totient based Group Formation Scheme in VANET

Thounaojam KorouhanbiDevi, Shabnam Sharma, Aditya Prakash
2015 International Journal of Computer Applications  
This paper proposes a scheme for cluster formation in VANET, to perform group authentication. A group based authentication provides anonymity and conditional privacy to the vehicles.  ...  Vehicular ad-hoc network is an emerging technology that facilitates vehicles within the network range to communicate with one another or with the roadside infrastructure, sharing useful information.  ...  RELATED WORK Many research works has been carried out till date to provide authentication in VANET. The Public key infrastructure is used to ensure user validity.  ... 
doi:10.5120/21227-3963 fatcat:3amm25ckvjeplcskcdsrlo26fq

VANETs Security Issues and Challenges: A Survey

Muawia Abdelmagid Elsadig, Yahia A. Fadlalla
2016 Indian Journal of Science and Technology  
It (VANET) is a piece of critical infrastructure that bolsters traffic management efficiency and road safety.  ...  Vehicular Ad-hoc Networks (VANETs) are sought to control traffic, avoid accidents, and control other aspects of traffic.  ...  However, as stated in 36 , the proposal in 35 uses a single authority to authenticate the vehicles and issue private/public key pairs for them.  ... 
doi:10.17485/ijst/2016/v9i28/97782 fatcat:7uuywegg5vdg5nyfsl2zqebsm4
« Previous Showing results 1 — 15 out of 372 results