{"title":"Cross-layered architecture for securing IPv6 ITS communication: Example of pseudonym change","authors":"Jong‐Hyouk Lee, T. Ernst, J. Bonnin","doi":"10.1109/IWCLD.2011.6123070","DOIUrl":null,"url":null,"abstract":"Recent technical breakthroughs in communications have facilitated a cross-layered communication architecture for Intelligent Transportation Systems (ITS) aiming at ameliorating road safety and traffic efficiency. In this paper, we introduce an ITS station reference architecture recently developed by the ETSI TC ITS and ISO TC204 WG16. Then, we develop service interfaces for securing IPv6 ITS communication: 1) generic commands for activating/deactivating the security services at the IPv6 layer; and 2) generic commands for requesting atomic security operations. We also provide an example showing how the proposed generic commands are used in the pseudonym change.","PeriodicalId":149596,"journal":{"name":"2011 Third International Workshop on Cross Layer Design","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Third International Workshop on Cross Layer Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCLD.2011.6123070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Recent technical breakthroughs in communications have facilitated a cross-layered communication architecture for Intelligent Transportation Systems (ITS) aiming at ameliorating road safety and traffic efficiency. In this paper, we introduce an ITS station reference architecture recently developed by the ETSI TC ITS and ISO TC204 WG16. Then, we develop service interfaces for securing IPv6 ITS communication: 1) generic commands for activating/deactivating the security services at the IPv6 layer; and 2) generic commands for requesting atomic security operations. We also provide an example showing how the proposed generic commands are used in the pseudonym change.