About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Securing V2X Communications for the Future - Can PKI Systems offer the answer? : Can PKI Systems offer the answer?

In Proceedings of the 14th International Conference on Availability, Reliability and Security, Ares 2019 — 2019, pp. 1-8
From

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Huawei Technologies Co., Ltd.3

Over recent years, emphasis in secure V2X communications research has converged on the use of Vehicular Public Key Infrastructures (VPKIs) for credential management and privacy-friendly authentication services. However, despite the security and privacy guarantees offered by such solutions, there are still a number of challenges to be conquered.

By reflecting on state-of-the-art PKI-based architectures, in this paper, we identify their limitations focusing on scalability, interoperability, pseudonym reusage policies and revocation mechanisms. We argue that in their current form such mechanisms cannot capture the strict security, privacy, and trust requirements of all involved stakeholders.

Motivated by these weaknesses, we then proceed on proposing the use of trusted computing technologies as an enabler for more decentralized approaches where trust is shifted from the back-end infrastructure to the edge. We debate on the advantages offered and underline the specifis of such a novel approach based on the use of advanced cryptographic primitives, using Direct Anonymous Attestation (DAA) as a concrete example.

Our goal is to enhance run-time security, privacy and trustworthiness of edge devices with a scalable and decentralized solution eliminating the need for federated infrastructure trust. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them.

Language: English
Publisher: Association for Computing Machinery
Year: 2019
Pages: 1-8
Proceedings: 14th International Conference on Availability, Reliability and Security
Series: Acm International Conference Proceeding Series
ISBN: 1450371647 and 9781450371643
Types: Conference paper
DOI: 10.1145/3339252.3340523

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis