Skip to main content
Top

2012 | OriginalPaper | Chapter

Threat Model, Authentication, and Key Management

Author : Stan Pietrowicz

Published in: Handbook of Intelligent Vehicles

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is an essential part of all vehicle networks. Communication among vehicles and roadside infrastructure needs to be secure, preserve vehicle privacy, and support efficient and effective removal of bad actors. The threat model for vehicle networks describes three categories of threat agents whose motives range from obtaining preferential treatment to tracking vehicles and disrupting transportation. Vehicle and roadside equipment, wireless communications, and network and software technologies are vulnerable to attack. The notion of privacy in vehicle networks encompasses the properties of anonymity and unlinkability. Vehicle tracking is a privacy threat that exploits vehicle communications, application transactions, and roadway conditions. Public Key Infrastructure is the predominant security architecture among vehicle networks, providing message authentication, integrity protection, and data encryption. The certificate management scheme affects privacy, the removal of bad actors, and system robustness. The combinatorial certificate scheme used in the US DOT proof-of-concept trial is an example of a shared certificate scheme. Removing bad actors in shared certificate schemes is challenging. Certificate revocation may affect many innocent vehicles, which may lose their network privileges. The short-lived, unlinked certificate scheme is an example of a unique certificate scheme that avoids the “one affects many” problem. It separates the certificate authority authorization and assignment functions and issues a large number of short-lived certificates, where certificate expiration may eliminate the need for revocation. Efficient and effective intrusion detection is critical to maintaining vehicle network integrity. Vehicle and roadside equipment, the certificate authority, application servers, and other network-based systems can participate in intrusion detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Di Crescenzo G, Pietrowicz S, Van Den Berg E, White R, Zhang T (2008) Vehicle segment certificate management using shared certificate schemes. US Patent Application 20080232583. www.uspto.org Di Crescenzo G, Pietrowicz S, Van Den Berg E, White R, Zhang T (2008) Vehicle segment certificate management using shared certificate schemes. US Patent Application 20080232583. www.​uspto.​org
go back to reference Di Crescenzo G, Zhang T, Pietrowicz S (2010) Anonymity notions and techniques for public-key infrastructures in vehicle networks. In: Wiley Inter Science Security and Communications Networks Di Crescenzo G, Zhang T, Pietrowicz S (2010) Anonymity notions and techniques for public-key infrastructures in vehicle networks. In: Wiley Inter Science Security and Communications Networks
go back to reference IEEE P1609.2 (2006) Trial-use standard for wireless access in vehicular environments – security services for applications and management messages IEEE P1609.2 (2006) Trial-use standard for wireless access in vehicular environments – security services for applications and management messages
go back to reference Pietrowicz S, Shim H, Di Crescenzo G, Zhang T (2008) VDTLS – providing secure communications in vehicular networks. INFOCOM 2008, Phoenix Pietrowicz S, Shim H, Di Crescenzo G, Zhang T (2008) VDTLS – providing secure communications in vehicular networks. INFOCOM 2008, Phoenix
go back to reference Pietrowicz S, Zhang T, Shim H (2010) Short-lived, unlinked certificates for privacy-preserving secure vehicular communications. In: ITS world congress, Busan Pietrowicz S, Zhang T, Shim H (2010) Short-lived, unlinked certificates for privacy-preserving secure vehicular communications. In: ITS world congress, Busan
go back to reference Telcordia Technologies (2007) VII vehicle segment certificate management Telcordia Technologies (2007) VII vehicle segment certificate management
go back to reference Tengler S, Andrews S, Heft R (2007b) Security for anonymous vehicular broadcast messages. US Patent Application 20070222555, www.uspto.org Tengler S, Andrews S, Heft R (2007b) Security for anonymous vehicular broadcast messages. US Patent Application 20070222555, www.​uspto.​org
go back to reference van den Berg E, Zhang T, Pietrowicz S (2009) Blend-in: a privacy-enhancing certificate-selection method for vehicular communication van den Berg E, Zhang T, Pietrowicz S (2009) Blend-in: a privacy-enhancing certificate-selection method for vehicular communication
go back to reference White R, Pietrowicz S, Van den Berg E, Di Crescenzo G, Mok D, Ferrer R, Zhang T, Shim H (2009) Privacy and scalability analysis of vehicular combinatorial certificate schemes. In: 2009 IEEE CCNC, Las Vegas, 10–13 Jan 2009 White R, Pietrowicz S, Van den Berg E, Di Crescenzo G, Mok D, Ferrer R, Zhang T, Shim H (2009) Privacy and scalability analysis of vehicular combinatorial certificate schemes. In: 2009 IEEE CCNC, Las Vegas, 10–13 Jan 2009
Metadata
Title
Threat Model, Authentication, and Key Management
Author
Stan Pietrowicz
Copyright Year
2012
Publisher
Springer London
DOI
https://doi.org/10.1007/978-0-85729-085-4_48

Premium Partner