Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the rise of smart cities, Cooperative intelligent Transportation Systems (C-ITS) became one of the main use case scenarios. Within these environments, Public Key Infrastructures (PKI) represent the major solution to ensure the needed security requirements. Knowing that communications between the PKI and the vehicle stations or the Road Side Unit stations must be secure, the traditional way to request certificates is too costly in terms of execution time, computation and amount of exchanged data on the network. Besides, it exists a new scheme to request certificates called butterfly keys, which was designed in a way to optimize certificates request process. However it was also designed to fit SCMS ITS project architecture. In this work we adapt butterfly keys scheme to traditional PKI architectures. Then, we implement both of certificate requests schemes and provide a deep performance comparison. This performance comparison shows clearly the efficiency of the butterfly keys scheme over the other one.

Original languageEnglish
Title of host publication2017 1st Cyber Security in Networking Conference, CSNet 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538613320
DOIs
Publication statusPublished - 29 Dec 2017
Event1st Cyber Security in Networking Conference, CSNet 2017 - Rio de Janeiro, Brazil
Duration: 18 Oct 201720 Oct 2017

Publication series

Name2017 1st Cyber Security in Networking Conference, CSNet 2017
Volume2017-January

Conference

Conference1st Cyber Security in Networking Conference, CSNet 2017
Country/TerritoryBrazil
CityRio de Janeiro
Period18/10/1720/10/17

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 11 - Sustainable Cities and Communities
    SDG 11 Sustainable Cities and Communities

Keywords

  • Butterfly keys
  • Certificate
  • Certificate request
  • Certification Authority
  • PKI
  • PKI communications
  • PKI requests
  • Privacy
  • Pseudonym Certificate

Fingerprint

Dive into the research topics of 'Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS'. Together they form a unique fingerprint.

Cite this