Abstract
With the rise of smart cities, Cooperative intelligent Transportation Systems (C-ITS) became one of the main use case scenarios. Within these environments, Public Key Infrastructures (PKI) represent the major solution to ensure the needed security requirements. Knowing that communications between the PKI and the vehicle stations or the Road Side Unit stations must be secure, the traditional way to request certificates is too costly in terms of execution time, computation and amount of exchanged data on the network. Besides, it exists a new scheme to request certificates called butterfly keys, which was designed in a way to optimize certificates request process. However it was also designed to fit SCMS ITS project architecture. In this work we adapt butterfly keys scheme to traditional PKI architectures. Then, we implement both of certificate requests schemes and provide a deep performance comparison. This performance comparison shows clearly the efficiency of the butterfly keys scheme over the other one.
| Original language | English |
|---|---|
| Title of host publication | 2017 1st Cyber Security in Networking Conference, CSNet 2017 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 1-6 |
| Number of pages | 6 |
| ISBN (Electronic) | 9781538613320 |
| DOIs | |
| Publication status | Published - 29 Dec 2017 |
| Event | 1st Cyber Security in Networking Conference, CSNet 2017 - Rio de Janeiro, Brazil Duration: 18 Oct 2017 → 20 Oct 2017 |
Publication series
| Name | 2017 1st Cyber Security in Networking Conference, CSNet 2017 |
|---|---|
| Volume | 2017-January |
Conference
| Conference | 1st Cyber Security in Networking Conference, CSNet 2017 |
|---|---|
| Country/Territory | Brazil |
| City | Rio de Janeiro |
| Period | 18/10/17 → 20/10/17 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 11 Sustainable Cities and Communities
Keywords
- Butterfly keys
- Certificate
- Certificate request
- Certification Authority
- PKI
- PKI communications
- PKI requests
- Privacy
- Pseudonym Certificate
Fingerprint
Dive into the research topics of 'Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver