Security challenges for the intelligent transportation system

Meiyuan Zhao, Jesse Walker, Chieh-Chih Wang

研究成果: Conference contribution

13 引文 斯高帕斯(Scopus)

摘要

There has been considerable work addressing security in vehicular network systems for Intelligent Transportation System (ITS) usages. We examine the risks and proposed security solutions in this space. Our analysis leads to several key observations. The current security work misses many practical ITS usage and security requirements, since it fails to consider practical economic models and critical ITS functional requirements as a control system. Consequently, the standardized ITS communication message authenticity solutions have little utility relative to addressing the real threats. Furthermore, we discovered that fundamental re-thinking of the public key infrastructure support for secure vehicular communication is essential, because of the multi-stakeholder and cross-domain nature of many ITS usages. Based on our analysis, we call for future research directions in analyzing practical problems and designing solutions to secure vehicular communication in order to achieve its full potential. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: General - Security and protection. General Terms Security, Reliability, Verification, Design, Human Factors.

原文English
主出版物標題Proceedings - 1st International Conference on Security of Internet of Things, SecurIT 2012
頁面107-115
頁數9
DOIs
出版狀態Published - 1 十二月 2012
事件1st International Conference on Security of Internet of Things, SecurIT 2012 - Kerala, India
持續時間: 17 八月 201219 八月 2012

出版系列

名字ACM International Conference Proceeding Series

Conference

Conference1st International Conference on Security of Internet of Things, SecurIT 2012
國家India
城市Kerala
期間17/08/1219/08/12

指紋 深入研究「Security challenges for the intelligent transportation system」主題。共同形成了獨特的指紋。

  • 引用此

    Zhao, M., Walker, J., & Wang, C-C. (2012). Security challenges for the intelligent transportation system. 於 Proceedings - 1st International Conference on Security of Internet of Things, SecurIT 2012 (頁 107-115). (ACM International Conference Proceeding Series). https://doi.org/10.1145/2490428.2490444