Résumé
With the rise of smart cities, Cooperative intelligent Transportation Systems (C-ITS) became one of the main use case scenarios. Within these environments, Public Key Infrastructures (PKI) represent the major solution to ensure the needed security requirements. Knowing that communications between the PKI and the vehicle stations or the Road Side Unit stations must be secure, the traditional way to request certificates is too costly in terms of execution time, computation and amount of exchanged data on the network. Besides, it exists a new scheme to request certificates called butterfly keys, which was designed in a way to optimize certificates request process. However it was also designed to fit SCMS ITS project architecture. In this work we adapt butterfly keys scheme to traditional PKI architectures. Then, we implement both of certificate requests schemes and provide a deep performance comparison. This performance comparison shows clearly the efficiency of the butterfly keys scheme over the other one.
| langue originale | Anglais |
|---|---|
| titre | 2017 1st Cyber Security in Networking Conference, CSNet 2017 |
| Editeur | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 1-6 |
| Nombre de pages | 6 |
| ISBN (Electronique) | 9781538613320 |
| Les DOIs | |
| état | Publié - 29 déc. 2017 |
| Evénement | 1st Cyber Security in Networking Conference, CSNet 2017 - Rio de Janeiro, Brésil Durée: 18 oct. 2017 → 20 oct. 2017 |
Série de publications
| Nom | 2017 1st Cyber Security in Networking Conference, CSNet 2017 |
|---|---|
| Volume | 2017-January |
Une conférence
| Une conférence | 1st Cyber Security in Networking Conference, CSNet 2017 |
|---|---|
| Pays/Territoire | Brésil |
| La ville | Rio de Janeiro |
| période | 18/10/17 → 20/10/17 |
SDG des Nations Unies
Ce résultat contribue à ou aux Objectifs de développement durable suivants
-
SDG 11 Villes et communautés durables
Empreinte digitale
Examiner les sujets de recherche de « Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS ». Ensemble, ils forment une empreinte digitale unique.Contient cette citation
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver