Efficient and secure storage of private keys for pseudonymous vehicular communication

Michael Feiri, Jonathan Petit, Frank Kargl

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    13 Citations (Scopus)

    Abstract

    Current standardization efforts for cooperative Intelligent Transportation Systems both in the U.S. and Europe foresee vehicles to use a large number of changeable pseudonyms for privacy protection. Provisioning and storage of these pseu- donyms require efficient and secure mechanisms to prevent malicious use of pseudonyms. In this paper we investigate several techniques to improve secure and efficient storage of pseudonyms. Specifically, we propose schemes based on Physical Unclonable Functions (PUFs) that allow to replace expensive secure key storage by regular unsecured memory and still provide fully secure pseudonyms storage.
    Original languageUndefined
    Title of host publicationFirst Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013)
    Place of PublicationNew York
    PublisherAssociation for Computing Machinery
    Pages9-18
    Number of pages10
    ISBN (Print)978-1-4503-2487-8
    DOIs
    Publication statusPublished - Nov 2013
    EventFirst International Academic Workshop on Security, Privacy and Dependability for CyberVehicles, CyCar 2013 - Berlin, Germany
    Duration: 4 Nov 20134 Nov 2013
    Conference number: 1

    Publication series

    Name
    PublisherACM

    Workshop

    WorkshopFirst International Academic Workshop on Security, Privacy and Dependability for CyberVehicles, CyCar 2013
    Abbreviated titleCyCar
    Country/TerritoryGermany
    CityBerlin
    Period4/11/134/11/13
    Other20th ACM Conference on Computer and Communications Security, ACM CCS 2013

    Keywords

    • EWI-24228
    • SCS-Cybersecurity
    • ITS
    • HSM
    • METIS-302601
    • VANET
    • KDF
    • PUF
    • IR-88722
    • Secure Storage

    Cite this