Change search
Link to record
Permanent link

Direct link
BETA
Publications (4 of 4) Show all publications
Alexiou, N., Gisdakis, S., Laganà, M. & Papadimitratos, P. (2013). Towards a secure and privacy-preserving multi-service vehicular architecture. In: 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013: . Paper presented at 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013; Madrid; Spain; 4 June 2013 through 7 June 2013 (pp. 6583472). IEEE
Open this publication in new window or tab >>Towards a secure and privacy-preserving multi-service vehicular architecture
2013 (English)In: 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013, IEEE , 2013, p. 6583472-Conference paper, Published paper (Refereed)
Abstract [en]

Intensive efforts in industry, academia and standardization bodies have brought vehicular communications (VC) one step before commercial deployment. In fact, future vehicles will become significant mobile platforms, extending the digital life of individuals with an ecosystem of applications and services. To secure these services and to protect the privacy of individuals, it is necessary to revisit and extend the vehicular Public Key Infrastructure (PKI)-based approach towards a multi-service security architecture. This is exactly what this work does, providing a design and a proof-of-concept implementation. Our approach, inspired by long-standing standards, is instantiated for a specific service, the provision of short-term credentials (pseudonyms). Moreover, we elaborate on its operation across multiple VC system domains, and craft a roadmap for further developments and extensions that leverage Web-based approaches. Our current results already indicate our architecture is efficient and can scale, and thus can meet the needs of the foreseen broad gamut of applications and services, including the transportation and safety ones.

Place, publisher, year, edition, pages
IEEE, 2013
Keywords
efficiency, privacy, security, VPKI
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-123079 (URN)10.1109/WoWMoM.2013.6583472 (DOI)2-s2.0-84883714070 (Scopus ID)978-146735827-9 (ISBN)
Conference
2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013; Madrid; Spain; 4 June 2013 through 7 June 2013
Note

QC 20130820

Available from: 2013-05-31 Created: 2013-05-31 Last updated: 2016-01-29Bibliographically approved
Alexiou, N., Laganá, M., Gisdakis, S., Khodaei, M. & Papadimitratos, P. (2013). VeSPA: Vehicular security and privacy-preserving architecture. In: HotWiSec 2013: Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy. Paper presented at 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'13), Budapest; Hungary; 19 April 2013 through 19 April 2013 (pp. 19-23).
Open this publication in new window or tab >>VeSPA: Vehicular security and privacy-preserving architecture
Show others...
2013 (English)In: HotWiSec 2013: Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy, 2013, p. 19-23Conference paper, Published paper (Refereed)
Abstract [en]

Vehicular Communications (VC) are reaching a near deploment phase and will play an important role in improving road safety, driving efficiency and comfort. The industry and the academia have reached a consensus for the need of a Public Key Infrastructure (PKI), in order to achieve security, identity management, vehicle authentication, as well as preserve vehicle privacy. Moreover, a gamut of proprietary and safety applications, such as location-based services and pay-as-you-drive systems, are going to be offered to the vehicles. The emerging applications are posing new challenges for the existing Vehicular Public Key Infrastructure (VPKI) architectures to support Authentication, Authorization and Accountability (AAA), without exposing vehicle privacy. In this work we present an implementation of a VPKI that is compatible with the VC standards. We propose the use of tickets as cryptographic tokens to provide AAA and also preserve vehicle privacy against adversaries and the VPKI. Finally, we present the efficiency results of our implementation to prove its applicability.

Keywords
Credential management, PKI, Privacy, Security, VANETs
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-123090 (URN)10.1145/2463183.2463189 (DOI)2-s2.0-84879543302 (Scopus ID)9781450320030 (ISBN)
Conference
6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'13), Budapest; Hungary; 19 April 2013 through 19 April 2013
Note

QC 20130819

Available from: 2013-05-31 Created: 2013-05-31 Last updated: 2017-12-18Bibliographically approved
Ehdaie, M., Alexiou, N., Ahmadian, M., Aref, M. R. & Papadimitratos, P. (2012). Key splitting for random key distribution schemes. In: Network Protocols (ICNP), 2012 20th IEEE International Conference on: . Paper presented at 2012 20th IEEE International Conference on Network Protocols, ICNP 2012, 30 October 2012 through 2 November 2012, Austin, TX (pp. 6459951). IEEE
Open this publication in new window or tab >>Key splitting for random key distribution schemes
Show others...
2012 (English)In: Network Protocols (ICNP), 2012 20th IEEE International Conference on, IEEE , 2012, p. 6459951-Conference paper, Published paper (Refereed)
Abstract [en]

A large number of Wireless Sensor Network (WSN) security schemes have been proposed in the literature, relying primarily on symmetric key cryptography. To enable those, Random Key pre-Distribution (RKD) systems have been widely accepted. However, WSN nodes are vulnerable to physical compromise. Capturing one or more nodes operating with RKD would give the adversary keys to compromise communication of other benign nodes. Thus the challenge is to enhance resilience of WSN to node capture, while maintaining the flexibility and low-cost features of RKD. We address this problem, without any special-purpose hardware, proposing a new and simple idea: key splitting. Our scheme does not increase per-node storage, and computation and communication overheads, and it can increase connectivity. More important, it achieves a significant increase in resilience to compromise compared to the state of the art, notably when the adversary does not have overwhelming computational power.

Place, publisher, year, edition, pages
IEEE, 2012
Series
Proceedings - International Conference on Network Protocols, ICNP, ISSN 1092-1648
Keywords
Communication, Network protocols, Network security
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-119865 (URN)10.1109/ICNP.2012.6459951 (DOI)2-s2.0-84874572518 (Scopus ID)978-146732447-2 (ISBN)
Conference
2012 20th IEEE International Conference on Network Protocols, ICNP 2012, 30 October 2012 through 2 November 2012, Austin, TX
Funder
ICT - The Next Generation
Note

QC 20130325

Available from: 2013-03-25 Created: 2013-03-25 Last updated: 2013-10-30Bibliographically approved
Ehdaie, M., Alexiou, N., Ahmadian, M., Reza Aref, M. & Papadimitratos, P. (2012). Key Splitting for Random Key Distribution Schemes. In: 7th Workshop on Secure Network Protocols (NPSec12): . Paper presented at 7th Workshop on Secure Network Protocols (NPSec12).
Open this publication in new window or tab >>Key Splitting for Random Key Distribution Schemes
Show others...
2012 (English)In: 7th Workshop on Secure Network Protocols (NPSec12), 2012Conference paper, Published paper (Refereed)
Keywords
security, wireless sensor networks, key distribution
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-118456 (URN)
Conference
7th Workshop on Secure Network Protocols (NPSec12)
Note

QP 20130529

Available from: 2013-02-18 Created: 2013-02-18 Last updated: 2013-10-30Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-1382-1313

Search in DiVA

Show all publications