Perspectives: improving SSH-style host authentication with multi-path probing
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Complementing public key infrastructure to secure vehicular ad hoc networks
IEEE Wireless Communications
Floating content: Information sharing in urban areas
PERCOM '11 Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications
All your droid are belong to us: a survey of current android attacks
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Design, implementation, and evaluation of a vehicular hardware security module
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Intelligent Transportation Systems that rely on Vehicle-to-Cloud communications are emerging. Of particular interest to us is the question how drivers can securely register their vehicle with cloud services and deploy keys for securing vehicular communications. We therefore present a secure smartphone-based registration and key deployment process for these applications. We combine an adapted OAuth flow for Smartphone-to-Cloud communications with a novel key deployment mechanism for Public Key Infrastructures in vehicular networks. The primary contributions of the proposed key deployment process are a high degree of independence from central authorities and feasible security audits due to an open protocol design. As an instance of future Intelligent Transportation System applications that facilitate Vehicle-to-Cloud communications, we utilize the V-Charge project as a running example to discuss potential attack scenarios and their mitigations.