Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Scaling Pseudonymous Authentication for Large Mobile Systems
KTH, School of Electrical Engineering and Computer Science (EECS), Communication Systems, CoS. (Networked Systems Security Group)ORCID iD: 0000-0003-1778-1416
KTH, School of Electrical Engineering and Computer Science (EECS), Communication Systems, CoS. (Networked Systems Security Group)
KTH, School of Electrical Engineering and Computer Science (EECS), Communication Systems, CoS. (Networked Systems Security Group)ORCID iD: 0000-0002-3267-5374
2019 (English)In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA, 2019, p. 174-185Conference paper, Published paper (Refereed)
Abstract [en]

The central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used to ensure message authenticity and integrity while preserving vehicle (thus passenger) privacy. In the light of emerging large-scale multi-domain VC environments, the efficiency of the VPKI and, more broadly, its scalability are paramount. By the same token, preventing misuse of the credentials, in particular, Sybil-based misbehavior, and managing “honest-but-curious” insiders are other facets of a challenging problem. In this paper, we leverage the state-of-the-art VPKI system and enhance its functionality towards a highly-available, dynamically-scalable, and resilient design; this ensures that the system remains operational in the presence of benign failures or resource depletion attacks, and that it dynamically scales out, or possibly scales in, according to request arrival rates. Our full-blown implementation on the Google Cloud Platform shows that deploying large-scale and efficient VPKI can be cost-effective.

Place, publisher, year, edition, pages
Miami, FL, USA, 2019. p. 174-185
Keywords [en]
VANETs, VPKI, Security, Privacy, Availability, Scalability, Resilient, Micro-service, Container Orchestration, Cloud.
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-253012DOI: 10.1145/3317549.3323410Scopus ID: 2-s2.0-85066733902ISBN: 978-1-4503-6726-4 (print)OAI: oai:DiVA.org:kth-253012DiVA, id: diva2:1322998
Conference
12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019; Miami; United States; 15 May 2019 through 17 May 2019
Note

QC 20190619

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2019-06-19Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Khodaei, MohammadNoroozi, HamidPapadimitratos, Panagiotis

Search in DiVA

By author/editor
Khodaei, MohammadNoroozi, HamidPapadimitratos, Panagiotis
By organisation
Communication Systems, CoS
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 32 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf