Proposed Potential Security Infrastructure in VANETS using Tamper Registered Hardware
نویسندگان
چکیده
منابع مشابه
Extending Tamper-Proof Hardware Security to Untrusted Execution Environments
This paper addresses mobile code protection with respect to potential integrity and confidentiality violations originating from the untrusted runtime environment where the code execution takes place. Both security properties are defined in a framework where code is modeled using Boolean circuits. Two protection schemes are presented. The first scheme addresses the protection of a function that ...
متن کاملTrustworthy Peer-to-peer Infrastructure Using Hardware Based Security
Peer-to-Peer (P2P) infrastructure, thanks to its scalability, has been used for designing many large-scale distributed systems. Of the two types of P2P infrastructure: unstructured and structured, the latter has received a greater amount of research attention. Security is one of many challenging problems faced by existing systems based on structured P2P. Having trust in such the P2P environment...
متن کاملInfrastructure based Authentication in VANETs
In a vehicular ad-hoc networks (VANETs), the veracity of a message requires authentication of the source vehicle. In this work, a technique for mutual authentication of a vehicle and road side unit (RSU) that preserves the privacy of the vehicle is proposed. The technique relies on the traffic authorities and assumes a hierarchical structure comprising a central trusted authority (TA) with stat...
متن کاملUnconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...
متن کاملAlgorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering
Traditionally, secure cryptographic algorithms provide security against an adversary who has only black-box access to the secret information of honest parties. However, such models are not always adequate. In particular, the security of these algorithms may completely break under (feasible) attacks that tamper with the secret key. In this paper we propose a theoretical framework to investigate ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2016
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v6i1.pp344-348