Skip to main content

Threat Model, Authentication, and Key Management

  • Reference work entry
  • 12k Accesses

Abstract

Security is an essential part of all vehicle networks. Communication among vehicles and roadside infrastructure needs to be secure, preserve vehicle privacy, and support efficient and effective removal of bad actors. The threat model for vehicle networks describes three categories of threat agents whose motives range from obtaining preferential treatment to tracking vehicles and disrupting transportation. Vehicle and roadside equipment, wireless communications, and network and software technologies are vulnerable to attack. The notion of privacy in vehicle networks encompasses the properties of anonymity and unlinkability. Vehicle tracking is a privacy threat that exploits vehicle communications, application transactions, and roadway conditions. Public Key Infrastructure is the predominant security architecture among vehicle networks, providing message authentication, integrity protection, and data encryption. The certificate management scheme affects privacy, the removal of bad actors, and system robustness. The combinatorial certificate scheme used in the US DOT proof-of-concept trial is an example of a shared certificate scheme. Removing bad actors in shared certificate schemes is challenging. Certificate revocation may affect many innocent vehicles, which may lose their network privileges. The short-lived, unlinked certificate scheme is an example of a unique certificate scheme that avoids the “one affects many” problem. It separates the certificate authority authorization and assignment functions and issues a large number of short-lived certificates, where certificate expiration may eliminate the need for revocation. Efficient and effective intrusion detection is critical to maintaining vehicle network integrity. Vehicle and roadside equipment, the certificate authority, application servers, and other network-based systems can participate in intrusion detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   849.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Di Crescenzo G, Pietrowicz S, Van Den Berg E, White R, Zhang T (2008) Vehicle segment certificate management using shared certificate schemes. US Patent Application 20080232583. www.uspto.org

  • Di Crescenzo G, Zhang T, Pietrowicz S (2010) Anonymity notions and techniques for public-key infrastructures in vehicle networks. In: Wiley Inter Science Security and Communications Networks

    Google Scholar 

  • http://www.icann.org/tlds/org/questions-to-applicants-11.htm

  • http://www.intellidriveusa.org/library/research-reports/technical/dsrc-poc.php

  • IEEE P1609.2 (2006) Trial-use standard for wireless access in vehicular environments – security services for applications and management messages

    Google Scholar 

  • Pietrowicz S, Shim H, Di Crescenzo G, Zhang T (2008) VDTLS – providing secure communications in vehicular networks. INFOCOM 2008, Phoenix

    Google Scholar 

  • Pietrowicz S, Zhang T, Shim H (2010) Short-lived, unlinked certificates for privacy-preserving secure vehicular communications. In: ITS world congress, Busan

    Google Scholar 

  • Telcordia Technologies (2007) VII vehicle segment certificate management

    Google Scholar 

  • Tengler S, Andrews S, Heft R (2007a) Digital certificate pool. US Patent Application 20070223702. www.uspto.org

  • Tengler S, Andrews S, Heft R (2007b) Security for anonymous vehicular broadcast messages. US Patent Application 20070222555, www.uspto.org

  • van den Berg E, Zhang T, Pietrowicz S (2009) Blend-in: a privacy-enhancing certificate-selection method for vehicular communication

    Google Scholar 

  • White R, Pietrowicz S, Van den Berg E, Di Crescenzo G, Mok D, Ferrer R, Zhang T, Shim H (2009) Privacy and scalability analysis of vehicular combinatorial certificate schemes. In: 2009 IEEE CCNC, Las Vegas, 10–13 Jan 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stan Pietrowicz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London Ltd.

About this entry

Cite this entry

Pietrowicz, S. (2012). Threat Model, Authentication, and Key Management. In: Eskandarian, A. (eds) Handbook of Intelligent Vehicles. Springer, London. https://doi.org/10.1007/978-0-85729-085-4_48

Download citation

Publish with us

Policies and ethics