Didouh et al., 2020 - Google Patents
Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection securityDidouh et al., 2020
View PDF- Document ID
- 4405568030134613578
- Author
- Didouh A
- Lopez A
- El Hillali Y
- Rivenq A
- Al Faruque M
- Publication year
- Publication venue
- 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC)
External Links
Snippet
Cooperative intelligent transportation system (C-ITS) applications are generally susceptible to position spoofing-dependent attacks such as Sybil and DDoS attacks due to a lack of established solutions. This paper presents a novel cyber-physical blockchain cryptographic …
- 238000005516 engineering process 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/017—Detecting movement of traffic to be counted or controlled identifying vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Malhi et al. | Security of vehicular ad-hoc networks: A comprehensive survey | |
Xie et al. | Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs | |
Masood et al. | Security and privacy challenges in connected vehicular cloud computing | |
Strohmeier et al. | On the security of the automatic dependent surveillance-broadcast protocol | |
Raya et al. | The security of vehicular ad hoc networks | |
Schmidt et al. | Vehicle behavior analysis to enhance security in vanets | |
Raya et al. | Securing vehicular ad hoc networks | |
Strohmeier et al. | Security of ADS− B: State of the Art and Beyond | |
Didouh et al. | Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security | |
CN106209777A (en) | A kind of automatic driving car on-vehicle information interactive system and safety communicating method | |
Zhao et al. | PBTM: A privacy-preserving announcement protocol with blockchain-based trust management for IoV | |
CN109362062B (en) | ID-based group signature-based VANETs anonymous authentication system and method | |
Junejo et al. | A privacy‐preserving attack‐resistant trust model for internet of vehicles ad hoc networks | |
Bouchelaghem et al. | Reliable and secure distributed smart road pricing system for smart cities | |
Zhao et al. | Security challenges for the intelligent transportation system | |
Bhargava et al. | A Systematic Approach for Attack Analysis and Mitigation in V2V Networks. | |
Goyal et al. | Systematic study of VANET: Applications, challenges, threats, attacks, schemes and issues in research | |
Didouh et al. | Blockchain-based collaborative certificate revocation systems using clustering | |
CN115580488B (en) | Vehicle-mounted network message authentication method based on block chain and physical unclonable function | |
Randriamasy et al. | Formally validated of novel tolling service with the its-g5 | |
Stübing | Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer | |
Gayathri et al. | An overview of security services and trust-based authentication schemes in VANET | |
Anwar et al. | Cloud-based Sybil attack detection scheme for connected vehicles | |
Chen et al. | Security in vehicular ad hoc networks (vanets) | |
Didouh et al. | TileChain: A Blockchain-Based Framework for Security Service Management For Vehicular Communications |