IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference 2008
DOI: 10.1109/glocom.2008.ecp.355
|View full text |Cite
|
Sign up to set email alerts
|

Certificate Assignment Strategies for a PKI-Based Security Architecture in a Vehicular Network

Abstract: This paper proposes novel certificate assignment strategies for use in vehicular networks in order to significantly reduce the complexity of managing the Public Key Infrastructure (PKI) framework. The strategy involves segmenting a country into a number of geographic regions, and the assignment of region-specific certificates to an OBU resident on a vehicle. A vehicle is also assigned multiple certificates corresponding to several regions in its vicinity as advance preparation for migration into nearby regions… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 3 publications
0
14
0
Order By: Relevance
“…Recently, many privacy-preserving authentication approaches have been proposed. These approaches can be broadly classified into group-based approaches [6] and pseudonymous-based approaches [7] and [8]. Alongside, there are Mix-zones, RSU-assisted [7], and a silent period [9].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, many privacy-preserving authentication approaches have been proposed. These approaches can be broadly classified into group-based approaches [6] and pseudonymous-based approaches [7] and [8]. Alongside, there are Mix-zones, RSU-assisted [7], and a silent period [9].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have been devoted to resolve traffic problems and proposed various models. Existing techniques are based on group signature [7], pseudonymous [8], mix zones radio off [9], Efficient Conditional Privacy Preservation (ECPP) [10], AMOEBA [11], Communications Architecture for Reliable Adaptive Vehicular Ad Hoc Networks (CARAVAN) [12,13], and so on. These methods are an effort to resolve many issues associated with location privacy in VANETs, but every method has its own limitation.…”
Section: Source Location Privacy In Vanetsmentioning
confidence: 99%
“…However, due to the limited bandwidth of wireless communication and the high-speed mobility of vehicles, it is difficult to distribute a large CRL to all vehicles in a timely fashion. To decrease the CRL size, Bellur [11] suggests to segment a country into a number of geographic regions, and assign region-specific certificates with validity period to a vehicle. Lu et al [10] develop the efficient conditional privacy preservation protocol which is the first one to support legitimate vehicles updating short-time pseudonymous certificates from the RSUs frequently.…”
Section: Related Workmentioning
confidence: 99%