Proposed Potential Security Infrastructure in VANETS using Tamper Registered Hardware

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extending Tamper-Proof Hardware Security to Untrusted Execution Environments

This paper addresses mobile code protection with respect to potential integrity and confidentiality violations originating from the untrusted runtime environment where the code execution takes place. Both security properties are defined in a framework where code is modeled using Boolean circuits. Two protection schemes are presented. The first scheme addresses the protection of a function that ...

متن کامل

Trustworthy Peer-to-peer Infrastructure Using Hardware Based Security

Peer-to-Peer (P2P) infrastructure, thanks to its scalability, has been used for designing many large-scale distributed systems. Of the two types of P2P infrastructure: unstructured and structured, the latter has received a greater amount of research attention. Security is one of many challenging problems faced by existing systems based on structured P2P. Having trust in such the P2P environment...

متن کامل

Infrastructure based Authentication in VANETs

In a vehicular ad-hoc networks (VANETs), the veracity of a message requires authentication of the source vehicle. In this work, a technique for mutual authentication of a vehicle and road side unit (RSU) that preserves the privacy of the vehicle is proposed. The technique relies on the traffic authorities and assumes a hierarchical structure comprising a central trusted authority (TA) with stat...

متن کامل

Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token

Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...

متن کامل

Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering

Traditionally, secure cryptographic algorithms provide security against an adversary who has only black-box access to the secret information of honest parties. However, such models are not always adequate. In particular, the security of these algorithms may completely break under (feasible) attacks that tamper with the secret key. In this paper we propose a theoretical framework to investigate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)

سال: 2016

ISSN: 2088-8708,2088-8708

DOI: 10.11591/ijece.v6i1.pp344-348