• Computer Science
  • Published in ASCoMS@SAFECOMP 2013

Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond

@inproceedings{Dolev2013CertificatingVP,
  title={Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond},
  author={Shlomi Dolev and Lukasz Krzywiecki and Nisha Panwar and Michael Segal},
  booktitle={ASCoMS@SAFECOMP},
  year={2013}
}
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers. Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work we propose a viable solution for coping with Man-in-the-Middle attacks. To the best of our knowledge, this is the first work that propose to certify both the public key and out-of-band sense-able attributes to enable mutual… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 50 REFERENCES

Mutual Chip Authentication

  • 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
  • 2013
VIEW 2 EXCERPTS

Oppliger . Certification authorities under attack : A plea for certificate legitimation

L. Buttyan, T. Holczer, +6 authors J.-P. Hubaux
  • 2013

A novel dynamic user authentication scheme

  • 2012 International Symposium on Communications and Information Technologies (ISCIT)
  • 2012
VIEW 1 EXCERPT

Mjlsnes. A vulnerability in the umts and lte authentication and key agreement protocols

S.J.-K. Tsay
  • In Computer Network Security,
  • 2012
VIEW 1 EXCERPT

SPIN-Based Verification of Authentication Protocols in WiMAX Networks

  • 2012 IEEE Vehicular Technology Conference (VTC Fall)
  • 2012
VIEW 1 EXCERPT