Browse > Article
http://dx.doi.org/10.15207/JKCS.2017.8.10.029

Pseudonym Management in Autonomous Driving Environment  

Hong, Jin Keun (Division of Information and Communication, Baekseok University)
Publication Information
Journal of the Korea Convergence Society / v.8, no.10, 2017 , pp. 29-35 More about this Journal
Abstract
In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.
Keywords
Vehicle; Security; Driving; Certificate; Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zachary Birnbaum, Andrey Dolgikh, Victor Skormin, Edward O'Brein, Daniel Muller, Christian Stracquodaine, "Unmanned Aerial Vehicle security using behavioral profiling," ICUAS2015, pp.1310-1319, 2015.
2 Badis Hammi, Jean Philippe Monteuuis, Eduardo Salles Daniel, Houda Labiod, "ASN.1 Specification for ETSI Certificates and Encoding Performance Study," MMD2017, pp.291-298, DOI: 10.1109/MDM.2017.47, 2017.
3 Pierpaolo Cincilla, Omar Hicham, Benoit Charles, "Vehicular PKI scalability consistency trad offs in large scale distributed scenarios," VNC2016, pp.1-6, DOI: 10.1109/VNC.2016. 7835970, 2016.
4 Jan Durech, Maria Franekova, Peter Luley, Emilia Bubenikova, "Safety aspects of PKI architecture within C-ITS and their modelling," ELECTRO2016, pp.400-405, DOI:10.1109/ELECTRO.2016.751210, 2016.
5 Brigitte Lonc, Pierpaolo Cincilla, "Cooperative ITS security framework: standard and implementations progress in Europe," WoWMoM2016, 1-6, DOI: 10.1109/WoWMoM.2016.7523576, 2016.
6 Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah, "Multi-domain Public Key infrastructure for vehicle to grid net work," MILCOM2015, pp.1572-1577, DOI: 10.1109/MILCOM.2015.7357669. 2015.
7 Michael Jaynes, Ram Dantu, Roland Varriale, Nathaniel Evans, "Automating ECU Idenfitication for Vehicle Security," ICMLA2016, pp.632-635, 2016.
8 Xiaoyu Lan, Liangtian Wan, Guangjie Han, Lei Shu, "A Fast modified DOA estimation algorithm with rotation array for vehicle security in intellignet transportation system," UIC-ATC-ScalCom2015, pp.484-489.
9 Leonar Petnga, Huan Xu, "Security of unmanned aerial vehicles:dynamic state estimation under cyber physical attacks," ICUAS2016, pp.811-819, 2016.
10 Jan Lastinec, Ladislav Hudec, "Comparative analysis of TCP/IP security protocols for use in vehicle communication," ICCC2016, pp.429-433.
11 K. A. Mamun, Z. Ashraf, "Anti theft vehicle security system with preventive action," APWC on CSE 2015, pp.1-6, 2015.
12 Chandra Shekar Ramaiah, S. Zahid Hussain, S. Asif Hussain, Yahya Al Balushi, "Smart vehicle security system for defending against collabrative attacks by malware," ICBDSC2016, pp.1-5, 2016.
13 Pravin Selukoto Paupiah, "Vehicle security and forensics in Mauritius and abroad," ICCCS2015, pp.1-5, 2015.
14 Pritpal Singh, Tanjot Sethi, Bunil Kumar Balabantaray, Bibhuti Bhushan Biswal, "Advance vehicle security system," ICIIECS2015, pp.1-6, 2015.
15 Vrizylynn L. L. Thing, Jiaxi Wu, "Autonomous Vehicle Security : A Taxonomy of attacks and Defences," GreenCom & CPSCom-SmartData2016, pp.164-170, 2016.