2007 7th International Conference on ITS Telecommunications 2007
DOI: 10.1109/itst.2007.4295890
|View full text |Cite
|
Sign up to set email alerts
|

Architecture for Secure and Private Vehicular Communications

Abstract: The deployment of vehicular communication (VC) systems is strongly dependent on their security and privacy features. In this paper, we propose a security architecture for VC. The primary objectives of the architecture include the management of identities and cryptographic keys, the security of communications, and the integration of privacy enhancing technologies. Our design approach aims at a system that relies on well-understood components which can be upgraded to provide enhanced security and privacy prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
109
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 172 publications
(118 citation statements)
references
References 15 publications
0
109
0
Order By: Relevance
“…The E-safety Vehicle Intrusion protected Applications (EVITA) [16] project developed a prototype for securing in-car networks, while the Secure Vehicle Communication (SeVeCom) [17] and Privacy Enabled Capability in Co-operative Systems and Safety Applications (PRECIOSA) [18] projects addressed the complex security and privacy challenges over the wireless channel. The Preparing Secure Vehicle-to-X Communication Systems (PRESERVE) [19] project is working towards the design, implementation, and evaluation of a complete secure and privacy-preserving subsystem that employs a Hardware Security Module (HSM).…”
Section: Introductionmentioning
confidence: 99%
“…The E-safety Vehicle Intrusion protected Applications (EVITA) [16] project developed a prototype for securing in-car networks, while the Secure Vehicle Communication (SeVeCom) [17] and Privacy Enabled Capability in Co-operative Systems and Safety Applications (PRECIOSA) [18] projects addressed the complex security and privacy challenges over the wireless channel. The Preparing Secure Vehicle-to-X Communication Systems (PRESERVE) [19] project is working towards the design, implementation, and evaluation of a complete secure and privacy-preserving subsystem that employs a Hardware Security Module (HSM).…”
Section: Introductionmentioning
confidence: 99%
“…However, it is possible to prevent the success of eavesdropping by using encryption to achieve data privacy or using anonymity techniques to achieve identity and location privacy. Anonymity is typically implemented using group signatures [12] or shortterm certificates (pseudonyms) [13]. Many privacy-preserving security architectures in VANET are using pseudonym-based schemes to keep the information private, but their applicability in a platoon requires more detailed investigation, and is out of the scope of this paper.…”
Section: Privacy Leakage Attacksmentioning
confidence: 99%
“…Arbitrary Tree demonstrates the best outcomes in general while the calculations that have high recognition rate and low false caution rate were C4.5 and Random Forest. In [7] the creators demonstrate how helpful the NSL-KDD for different intrusion location models is. For dimensionality lessening, PCA (Principle Component Analysis) system was utilized as a part of this paper.…”
Section: Related Workmentioning
confidence: 99%