Abstract
Three vehicle-to-vehicle communication schemes by
Kounga et al. were recently published
in the IEEE Transactions on Vehicular Technology to address the issues
of certificate management, scalability and privacy.
We present a number of attacks on one of the schemes. Our result shows that,
contrary to what is claimed, this scheme does not provide
the following four security features: authenticity of a message,
privacy of drivers and vehicles, reliability of distributed
information, and revocation of illegitimate vehicles.
Kounga et al. were recently published
in the IEEE Transactions on Vehicular Technology to address the issues
of certificate management, scalability and privacy.
We present a number of attacks on one of the schemes. Our result shows that,
contrary to what is claimed, this scheme does not provide
the following four security features: authenticity of a message,
privacy of drivers and vehicles, reliability of distributed
information, and revocation of illegitimate vehicles.
Original language | English |
---|---|
Pages (from-to) | 1503-1505 |
Number of pages | 3 |
Journal | IEEE Transaction on Vehicular Technology |
Volume | 59 |
Issue number | 3 |
DOIs |
|
Publication status | Published - 2010 |
Keywords
- Vehicular communication
- Authentication
- Anonymity