2015
DOI: 10.3390/electronics4030380
|View full text |Cite
|
Sign up to set email alerts
|

Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

Abstract: Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS). Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 154 publications
(74 citation statements)
references
References 64 publications
0
64
0
Order By: Relevance
“…The authors of [1] have reviewed the current research challenges and opportunities related to the development of secure and safe ITS applications. They first explore the architecture and main characteristics of ITS systems and survey the key enabling standards and projects.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [1] have reviewed the current research challenges and opportunities related to the development of secure and safe ITS applications. They first explore the architecture and main characteristics of ITS systems and survey the key enabling standards and projects.…”
Section: Related Workmentioning
confidence: 99%
“…In [1], the author reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main OPEN ACCESS characteristics of ITS systems and surveys the key enabling standards and projects.…”
Section: The Present Issuementioning
confidence: 99%
“…A key limitation of the priority based schemes is their dependence on transmitter-receiver distance which could not be calculated before the packet is authenticated. Indeed, since these location information are exploited prior to their verification (using ECDSA), existing approaches can be vulnerable to various security threats, including broadcast tampering and denial of service (5), impacting thus the safety of the end-to-end ITS application.…”
Section: Receiver Side Security Mechanismsmentioning
confidence: 99%
“…This is especially true in high density VANETs scenarios, where each vehicle might receive several hundred (or thousand) BSMs per second from neighboring vehicles, and which could not all be verified due to the limited computational resources. As a result, several important BSMs from close by neighbors get dropped due to timeout, resulting in loss of awareness for safety applications (5). A number of techniques have been proposed in the literature to optimize verification processing time of BSMs (10; 11; 12; 13; 14; 15; 16), and thus to improve the vehicle situational awareness.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation