2008
DOI: 10.1109/mcom.2008.4689253
|View full text |Cite
|
Sign up to set email alerts
|

Secure vehicular communication systems: implementation, performance, and research challenges

Abstract: Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been tackled only recently. In order to show the feasibility of secure VC, implementations are required. In [8] we have discussed the design of a VC security system that has emerged as a result of the European SeVeCom project. In this second paper, we discuss various issues related to the implementation and deployment aspects of secure VC systems. Mo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
116
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 206 publications
(123 citation statements)
references
References 13 publications
0
116
0
Order By: Relevance
“…Kargl et al [1] discussed implementation, performance, and research challenges in VANET in detail. Similarly, Papadimatroits et al [11] outlined design and architectural issues in VANET.…”
Section: State Of the Art Regarding Vanet And Vanet-based Cloudsmentioning
confidence: 99%
See 1 more Smart Citation
“…Kargl et al [1] discussed implementation, performance, and research challenges in VANET in detail. Similarly, Papadimatroits et al [11] outlined design and architectural issues in VANET.…”
Section: State Of the Art Regarding Vanet And Vanet-based Cloudsmentioning
confidence: 99%
“…VANET has gone through ample amount of research to provide drivers and consumers with safe, reliable, and infotainment-rich driving experience. Nevertheless, automobile companies are still reluctant to deploy VANET in full scale due to security and privacy challenges [1]. Since VANET is directly related to human lives, security and privacy issues are of paramount importance and have been addressed for a considerably long time by the academia and industry [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…First, a secure boot-up process exists through which the appropriate Authority (e.g. a Certification Authority, CA) installs all cryptography-related materials into vehicles, particularly in a secure cryptographic device called Hardware Security Module (HSM) [8]. This material contains the public-private keypairs along with the corresponding pseudonym-based public key certificates (referred to as Cert E(t) ).…”
Section: Working Assumptionsmentioning
confidence: 99%
“…Although, given the dynamic nature of the involved communications nodes, the ubiquity along the road becomes a mandatory requirement. This might implies a high-affordable effort, due to the demanded deployment of extended communication infrastructure road-sided [5].…”
Section: Introductionmentioning
confidence: 99%