Z. Pethö, Tamás Márton Kazár, Roland Kraudy, Z. Szalay, Á. Török
{"title":"在基于v2x的AD/ADAS功能开发过程中,考虑PKI安全对网络性能的影响","authors":"Z. Pethö, Tamás Márton Kazár, Roland Kraudy, Z. Szalay, Á. Török","doi":"10.1109/CogMob55547.2022.10118227","DOIUrl":null,"url":null,"abstract":"In this research, we examine the impact of PKI on vehicle safety and thus make suggestions for further improvements to V2X-based safety application design processes. In the first step, we introduce the novel methodological background of characterizing the safety impact of the network performance metrics on the V2X-based automotive applications. Following this, we investigated two cases: with and without Public Key Infrastructure (PKI) authorization, to identify the potential safety effect if the V2X device is unprepared for the additional computational overhead caused by the authentication framework-related processes. Based on our results, we can identify the operational domain of a specific V2X-based application that can be used safely.","PeriodicalId":430975,"journal":{"name":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Considering PKI safety impact on network performance during V2X-based AD/ADAS function development processes\",\"authors\":\"Z. Pethö, Tamás Márton Kazár, Roland Kraudy, Z. Szalay, Á. Török\",\"doi\":\"10.1109/CogMob55547.2022.10118227\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this research, we examine the impact of PKI on vehicle safety and thus make suggestions for further improvements to V2X-based safety application design processes. In the first step, we introduce the novel methodological background of characterizing the safety impact of the network performance metrics on the V2X-based automotive applications. Following this, we investigated two cases: with and without Public Key Infrastructure (PKI) authorization, to identify the potential safety effect if the V2X device is unprepared for the additional computational overhead caused by the authentication framework-related processes. Based on our results, we can identify the operational domain of a specific V2X-based application that can be used safely.\",\"PeriodicalId\":430975,\"journal\":{\"name\":\"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CogMob55547.2022.10118227\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CogMob55547.2022.10118227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Considering PKI safety impact on network performance during V2X-based AD/ADAS function development processes
In this research, we examine the impact of PKI on vehicle safety and thus make suggestions for further improvements to V2X-based safety application design processes. In the first step, we introduce the novel methodological background of characterizing the safety impact of the network performance metrics on the V2X-based automotive applications. Following this, we investigated two cases: with and without Public Key Infrastructure (PKI) authorization, to identify the potential safety effect if the V2X device is unprepared for the additional computational overhead caused by the authentication framework-related processes. Based on our results, we can identify the operational domain of a specific V2X-based application that can be used safely.