[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Didouh et al., 2020 - Google Patents

Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security

Didouh et al., 2020

View PDF
Document ID
4405568030134613578
Author
Didouh A
Lopez A
El Hillali Y
Rivenq A
Al Faruque M
Publication year
Publication venue
2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC)

External Links

Snippet

Cooperative intelligent transportation system (C-ITS) applications are generally susceptible to position spoofing-dependent attacks such as Sybil and DDoS attacks due to a lack of established solutions. This paper presents a novel cyber-physical blockchain cryptographic …
Continue reading at hal.science (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/017Detecting movement of traffic to be counted or controlled identifying vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Similar Documents

Publication Publication Date Title
Malhi et al. Security of vehicular ad-hoc networks: A comprehensive survey
Xie et al. Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs
Masood et al. Security and privacy challenges in connected vehicular cloud computing
Strohmeier et al. On the security of the automatic dependent surveillance-broadcast protocol
Raya et al. The security of vehicular ad hoc networks
Schmidt et al. Vehicle behavior analysis to enhance security in vanets
Raya et al. Securing vehicular ad hoc networks
Strohmeier et al. Security of ADS− B: State of the Art and Beyond
Didouh et al. Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security
CN106209777A (en) A kind of automatic driving car on-vehicle information interactive system and safety communicating method
Zhao et al. PBTM: A privacy-preserving announcement protocol with blockchain-based trust management for IoV
CN109362062B (en) ID-based group signature-based VANETs anonymous authentication system and method
Junejo et al. A privacy‐preserving attack‐resistant trust model for internet of vehicles ad hoc networks
Bouchelaghem et al. Reliable and secure distributed smart road pricing system for smart cities
Zhao et al. Security challenges for the intelligent transportation system
Bhargava et al. A Systematic Approach for Attack Analysis and Mitigation in V2V Networks.
Goyal et al. Systematic study of VANET: Applications, challenges, threats, attacks, schemes and issues in research
Didouh et al. Blockchain-based collaborative certificate revocation systems using clustering
CN115580488B (en) Vehicle-mounted network message authentication method based on block chain and physical unclonable function
Randriamasy et al. Formally validated of novel tolling service with the its-g5
Stübing Multilayered security and privacy protection in Car-to-X networks: solutions from application down to physical layer
Gayathri et al. An overview of security services and trust-based authentication schemes in VANET
Anwar et al. Cloud-based Sybil attack detection scheme for connected vehicles
Chen et al. Security in vehicular ad hoc networks (vanets)
Didouh et al. TileChain: A Blockchain-Based Framework for Security Service Management For Vehicular Communications