{"title":"一种保护车载自组织网络架构的四阶段设计方法","authors":"Raghu Sunnadkal, B. Soh, H. Phan","doi":"10.1109/DELTA.2010.49","DOIUrl":null,"url":null,"abstract":"In this paper we propose a four-stage design approach towards securing a VANET architecture with an improved PKI structure. The new PKI structure helps in keeping the users autonomous, whilst achieving the security alongside. Communication between the central certificate authority is minimized by employing self authorization by the users. This is attained by self generation of pseudonyms. This scheme will help in providing the security to users when not in coverage with the central certificate authority. The paper also proposes an efficient way of deploying CRL’s during revocation scheme which employs car-to-car forwarding of CRL’s along with the RSU’s.","PeriodicalId":421336,"journal":{"name":"2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications","volume":"143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Four-Stage Design Approach Towards Securing a Vehicular Ad Hoc Networks Architecture\",\"authors\":\"Raghu Sunnadkal, B. Soh, H. Phan\",\"doi\":\"10.1109/DELTA.2010.49\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we propose a four-stage design approach towards securing a VANET architecture with an improved PKI structure. The new PKI structure helps in keeping the users autonomous, whilst achieving the security alongside. Communication between the central certificate authority is minimized by employing self authorization by the users. This is attained by self generation of pseudonyms. This scheme will help in providing the security to users when not in coverage with the central certificate authority. The paper also proposes an efficient way of deploying CRL’s during revocation scheme which employs car-to-car forwarding of CRL’s along with the RSU’s.\",\"PeriodicalId\":421336,\"journal\":{\"name\":\"2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications\",\"volume\":\"143 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DELTA.2010.49\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DELTA.2010.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Four-Stage Design Approach Towards Securing a Vehicular Ad Hoc Networks Architecture
In this paper we propose a four-stage design approach towards securing a VANET architecture with an improved PKI structure. The new PKI structure helps in keeping the users autonomous, whilst achieving the security alongside. Communication between the central certificate authority is minimized by employing self authorization by the users. This is attained by self generation of pseudonyms. This scheme will help in providing the security to users when not in coverage with the central certificate authority. The paper also proposes an efficient way of deploying CRL’s during revocation scheme which employs car-to-car forwarding of CRL’s along with the RSU’s.