DOI QR코드

DOI QR Code

Pseudonym Management in Autonomous Driving Environment

자율주행환경에서 가명성 관리

  • Hong, Jin Keun (Division of Information and Communication, Baekseok University)
  • 홍진근 (백석대학교 정보통신학부)
  • Received : 2017.08.29
  • Accepted : 2017.10.20
  • Published : 2017.10.28

Abstract

In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

본 논문에서는 협업 지능형교통시스템과 연동되는 자율주행 차량과 연동되는 환경에서 인증서 정책과 특성에 대해 살펴보았다. 차량의 인증 기능가운데는 가명 인증기능이 있다. 이 가명성은 차량 운전자, 승객이나 차량을 식별하는 정보에 대한 프라이버시를 보호할 목적으로 제공된다. 그러므로 가명인증서의 사용 목적은 BSM 인증이나 오 동작에 대한 리포팅을 위해 사용한다. 그런데 이 가명 인증서는 차량의 OBE에서 사용되며 암호 키는 없는 것이 특징이다. 본 논문에서는 이 가명인증서의 주요 기능인 위치 개인정보 보호나 가명기능, 그리고 링키지 값이나 CRL의 폐기 처리, 등록 기관에서 요청 셔플링 처리, 버터플라이 키 처리 등을 살펴보면서, 동시에 가명인증 기능 관리를 위한 제반 인증정책과 그 특성들을 세부적으로 고찰하였다. 차량의 가명관리와 관련하여 공격자는 BSM 전송을 기록하여 운전자나 차량의 추적할 수 있으므로 이에 대한 대책으로 연결 해제 기능을 부여해야 한다. 이러 측면에서 본 연구의 결과는 기여하고 있다고 할 수 있다.

Keywords

References

  1. Vrizylynn L. L. Thing, Jiaxi Wu, "Autonomous Vehicle Security : A Taxonomy of attacks and Defences," GreenCom & CPSCom-SmartData2016, pp.164-170, 2016.
  2. Michael Jaynes, Ram Dantu, Roland Varriale, Nathaniel Evans, "Automating ECU Idenfitication for Vehicle Security," ICMLA2016, pp.632-635, 2016.
  3. Xiaoyu Lan, Liangtian Wan, Guangjie Han, Lei Shu, "A Fast modified DOA estimation algorithm with rotation array for vehicle security in intellignet transportation system," UIC-ATC-ScalCom2015, pp.484-489.
  4. Leonar Petnga, Huan Xu, "Security of unmanned aerial vehicles:dynamic state estimation under cyber physical attacks," ICUAS2016, pp.811-819, 2016.
  5. Jan Lastinec, Ladislav Hudec, "Comparative analysis of TCP/IP security protocols for use in vehicle communication," ICCC2016, pp.429-433.
  6. K. A. Mamun, Z. Ashraf, "Anti theft vehicle security system with preventive action," APWC on CSE 2015, pp.1-6, 2015.
  7. Chandra Shekar Ramaiah, S. Zahid Hussain, S. Asif Hussain, Yahya Al Balushi, "Smart vehicle security system for defending against collabrative attacks by malware," ICBDSC2016, pp.1-5, 2016.
  8. Pravin Selukoto Paupiah, "Vehicle security and forensics in Mauritius and abroad," ICCCS2015, pp.1-5, 2015.
  9. Pritpal Singh, Tanjot Sethi, Bunil Kumar Balabantaray, Bibhuti Bhushan Biswal, "Advance vehicle security system," ICIIECS2015, pp.1-6, 2015.
  10. Zachary Birnbaum, Andrey Dolgikh, Victor Skormin, Edward O'Brein, Daniel Muller, Christian Stracquodaine, "Unmanned Aerial Vehicle security using behavioral profiling," ICUAS2015, pp.1310-1319, 2015.
  11. Badis Hammi, Jean Philippe Monteuuis, Eduardo Salles Daniel, Houda Labiod, "ASN.1 Specification for ETSI Certificates and Encoding Performance Study," MMD2017, pp.291-298, DOI: 10.1109/MDM.2017.47, 2017.
  12. Pierpaolo Cincilla, Omar Hicham, Benoit Charles, "Vehicular PKI scalability consistency trad offs in large scale distributed scenarios," VNC2016, pp.1-6, DOI: 10.1109/VNC.2016. 7835970, 2016.
  13. Jan Durech, Maria Franekova, Peter Luley, Emilia Bubenikova, "Safety aspects of PKI architecture within C-ITS and their modelling," ELECTRO2016, pp.400-405, DOI:10.1109/ELECTRO.2016.751210, 2016.
  14. Brigitte Lonc, Pierpaolo Cincilla, "Cooperative ITS security framework: standard and implementations progress in Europe," WoWMoM2016, 1-6, DOI: 10.1109/WoWMoM.2016.7523576, 2016.
  15. Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah, "Multi-domain Public Key infrastructure for vehicle to grid net work," MILCOM2015, pp.1572-1577, DOI: 10.1109/MILCOM.2015.7357669. 2015.