Skip to main content

A Security Migration Concept for Vehicle-to-X Communication to Allow Long-Term PKI Operation

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10222))

Abstract

Applying appropriate security measures in wireless Vehicle-to-X (V2X) communication systems is very important since vehicles and roadside units must trust in information received over this channel. State-of-the-art V2X security solutions are based on Elliptic Curve Cryptography (ECC) using the NIST P-256 curve. For long-term use of such security infrastructure, updatability of security measures as well as cryptographic agility must be ensured.

In this paper a process for trust migration is proposed that maintains a fully functional Public Key Infrastructure (PKI) at all times for all entities. To ensure secure long-term operation, multiple security measures are highlighted, analyzed and evaluated. By adjusting the certificate format, new elliptic curves can be supported and flexibility is rendered possible. The evaluation provides a comprehensive analysis and identifies the steps required to deploy a secure and reliable V2X PKI even if cryptographic algorithms change in the future.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Autotalks: Autotalks V2X Security Portfolio. Technical report, Autotalks, September 2014. http://www.auto-talks.com/wp-content/uploads/2014/09/Autotalks_White_Paper_V2X_Security_Portfolio_V1.3_COMPANY.pdf

  2. Bißmeyer, N., Stübing, H., Schoch, E., Götz, S., Stotz, J.P., Lonc, B.: A generic public key infrastructure for securing car-to-X communication. In: 18th ITS World Congress, Orlando, vol. 14 (2011)

    Google Scholar 

  3. BSI: Smart Metering PKI - Public Key Infrastruktur für Smart Meter Gateways. TR 03109-4, BSI, v1.1.1, May 2015

    Google Scholar 

  4. European Commission: A European Strategy on Cooperative Intelligent Transport Systems, a Milestone Towards Cooperative, Connected and Automated Mobility, November 2016

    Google Scholar 

  5. ETSI: Intelligent Transport Systems (ITS); Security; ITS Communications Security Architecture and Security Management. TS 102 940, ETSI, v1.1.1, June 2012

    Google Scholar 

  6. ETSI: Intelligent Transport Systems (ITS); Security; Trust and Privacy Management. TS 102 941, ETSI, v1.1.1, June 2012

    Google Scholar 

  7. ETSI: Intelligent Transport Systems (ITS); Security; Security Header and Certificate Formats. TS 103 097, ETSI, v1.2.1, June 2013

    Google Scholar 

  8. ETSI: Intelligent Transport Systems (ITS); V2X Applications; Part 3: Longitudinal Collision Risk Warning (LCRW) Application Requirements Specification. TS 101 539–3, ETSI, v1.1.1, November 2013

    Google Scholar 

  9. ETSI: Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service. EN 302 637-2, ETSI, v1.3.2, November 2014

    Google Scholar 

  10. Kolkman, O., Gieben, R.: DNSSEC Operational Practices. RFC 4641 (Informational). http://www.ietf.org/rfc/rfc4641.txt. Obsoleted by RFC 6781

  11. Lange, T.: Initial recommendations of long-term secure post-quantum systems. In: PQCrypto (2015)

    Google Scholar 

  12. Lochter, M., Merkle, J.: Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation (2010)

    Google Scholar 

  13. NIST: Digital Signature Standard (DSS). FIPS 186-4, NIST, August 2013

    Google Scholar 

  14. NSA: Commercial National Security Algorithm (CSNA) Suite. Technical report, NSA, January 2016

    Google Scholar 

  15. The Legion of the Bouncy Castle: Bouncy Castle Crypto API (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jan-Felix Posielek , Norbert Bißmeyer or Annika Strobel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Posielek, JF., Bißmeyer, N., Strobel, A. (2017). A Security Migration Concept for Vehicle-to-X Communication to Allow Long-Term PKI Operation. In: Pirovano, A., et al. Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2017. Lecture Notes in Computer Science(), vol 10222. Springer, Cham. https://doi.org/10.1007/978-3-319-56880-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56880-5_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56879-9

  • Online ISBN: 978-3-319-56880-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics