Certificate Assignment Strategies for a PKI-based Security Architecture in a Vehicular Network

被引:7
|
作者
Bellur, Bhargav [1 ]
机构
[1] Gen Motors India Sci Lab, Bangalore 560066, Karnataka, India
关键词
D O I
10.1109/GLOCOM.2008.ECP.355
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes novel certificate assignment strategies for use in vehicular networks in order to significantly reduce the complexity of managing the Public Key Infrastructure (PKI) framework. The strategy involves segmenting a country into a number of geographic regions, and the assignment of region-specific certificates to an OBU resident on a vehicle. A vehicle is also assigned multiple certificates corresponding to several regions in its vicinity as advance preparation for migration into nearby regions. Segmentation based on geographic regions is shown to significantly reduce the size of Certificate Revocation Lists (CRLs). Next, a scalable design for the back-end Certifying Authority (CA) with region-based certificates is presented. The paper concludes with a simple analysis of the performance of the proposed strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A PKI-based track and trace network for cross-boundary container security
    Ting, S.L.
    Ip, W.H.
    Lam, W.H.K.
    Ngai, E.W.T.
    International Journal of Computer Science Issues, 2011, 8 (5 5-1): : 20 - 27
  • [2] Design of PKI-based mobile bank security system
    Yin Can-ju
    Wei Zu-kuan
    ASGIS 2007: 5TH ASIAN SYMPOSIUM ON GEOGRAPHIC INFORMATION SYSTEMS, 2007, : 381 - 385
  • [3] A PKI-based scalable security infrastructure for scalable grid
    Huang, LC
    Wu, ZH
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1051 - 1054
  • [4] Design of PKI-based mobile bank security system
    YIN Canju WEI Zukuan School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengdu PRChina
    重庆邮电大学学报(自然科学版), 2007, (03) : 381 - 385
  • [5] Attacks in a PKI-Based Architecture for M-Commerce
    Vishwakarma, Sandeep
    Samant, Pramit Kumar
    Sharma, Amit
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 52 - 56
  • [6] Security in a PKI-based networking environment: A multi-agent architecture for distributed Security Management system & Control
    Torrellas, GAS
    Cruz, DV
    ICCC 2004: SECOND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL CYBERNETICS, PROCEEDINGS, 2004, : 183 - 188
  • [7] PKI-based security for peer-to-peer information sharing
    Berket, K
    Essiari, A
    Muratas, A
    FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 45 - 52
  • [8] Research on PKI-Based E-Commerce Security Mechanism
    Geng Li-xiao
    Zeng Zhen-xiang
    Zhang Xue-min
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3545 - 3548
  • [9] Performance of PKI-based security mechanisms in mobile ad hoc networks
    Schwingenschlögl, C
    Eichler, S
    Müller-Rathgeber, B
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2006, 60 (01) : 20 - 24
  • [10] Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce
    MENG Xiangsong
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1907 - 1910