Security challenges for the intelligent transportation system

Meiyuan Zhao, Jesse Walker, Chieh-Chih Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Abstract

There has been considerable work addressing security in vehicular network systems for Intelligent Transportation System (ITS) usages. We examine the risks and proposed security solutions in this space. Our analysis leads to several key observations. The current security work misses many practical ITS usage and security requirements, since it fails to consider practical economic models and critical ITS functional requirements as a control system. Consequently, the standardized ITS communication message authenticity solutions have little utility relative to addressing the real threats. Furthermore, we discovered that fundamental re-thinking of the public key infrastructure support for secure vehicular communication is essential, because of the multi-stakeholder and cross-domain nature of many ITS usages. Based on our analysis, we call for future research directions in analyzing practical problems and designing solutions to secure vehicular communication in order to achieve its full potential. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: General - Security and protection. General Terms Security, Reliability, Verification, Design, Human Factors.

Original languageEnglish
Title of host publicationProceedings - 1st International Conference on Security of Internet of Things, SecurIT 2012
Pages107-115
Number of pages9
DOIs
StatePublished - 1 Dec 2012
Event1st International Conference on Security of Internet of Things, SecurIT 2012 - Kerala, India
Duration: 17 Aug 201219 Aug 2012

Publication series

NameACM International Conference Proceeding Series

Conference

Conference1st International Conference on Security of Internet of Things, SecurIT 2012
CountryIndia
CityKerala
Period17/08/1219/08/12

Keywords

  • Message authentication protocol
  • Security infrastructure
  • Trust management
  • Usage model
  • Vehicular communication

Fingerprint Dive into the research topics of 'Security challenges for the intelligent transportation system'. Together they form a unique fingerprint.

  • Cite this

    Zhao, M., Walker, J., & Wang, C-C. (2012). Security challenges for the intelligent transportation system. In Proceedings - 1st International Conference on Security of Internet of Things, SecurIT 2012 (pp. 107-115). (ACM International Conference Proceeding Series). https://doi.org/10.1145/2490428.2490444