바로가기메뉴

본문 바로가기 주메뉴 바로가기

ACOMS+ 및 학술지 리포지터리 설명회

  • 한국과학기술정보연구원(KISTI) 서울분원 대회의실(별관 3층)
  • 2024년 07월 03일(수) 13:30
 

프라이버시 보호를 위한 V2V 통신 인증 서비스의 간략화

The Simplified V2V Communication Authentication Service for Privacy Protection

한국사물인터넷학회논문지 / Journal of The Korea Internet of Things Society, (P)2466-0078;
2016, v.2 no.1, pp.35-40
https://doi.org/https://doi.org/10.20465/kiots.2016.2.1.035
박승수 (건국대학교 IT융합정보보호학과)
한근희 (고려대학교 정보보호대학원)
김기천 (건국대학교 컴퓨터공학과)
  • 다운로드 수
  • 조회수

초록

차세대 자동차 기술 중의 하나인 V2V 통신은 차량 간에 통신할 때 사용되는 기법으로 차세대 ITS의 핵심기술이다. 기존 V2V 통신 인증 서비스 구조를 살펴보면 프라이버시 보호에 대한 보안 요구사항을 충족시키기 위해 가명 인증서를 사용한다. 가명 인증서를 사용하기 위해 발급 및 관리하는 기관이 필요하고 한번 발급할 때 여러 개의 인증서를 발급하기 때문에 시간이 많이 소요된다. 본 논문에서는 가명 인증서를 사용하지 않고 프라이버시 보호에 대한 보안 요구사항을 충족시키기 위해 차량 ID를 활용한 기법을 제시하고자 한다.

keywords
WAVE, V2V, C-ITS, ITS, Authentication, Privacy Protection

Abstract

One of the next generation of automotive V2V communication technology is a core technology for next-generation ITS as a technique used for communications between the vehicle. Looking at the existing V2V communication using the pseudonym certificate authentication service structure to meet the security requirements for privacy protection. Since the issuance of multiple certificates when needed authority in issuing and managing to use the pseudonym certificate issued once and it takes a lot of time. In this paper, we present the method utilizing a vehicle ID to meet the security requirements for the privacy protection without the use of a pseudonym certificate.

keywords
WAVE, V2V, C-ITS, ITS, Authentication, Privacy Protection

참고문헌

1.

S. Dolev, L. Krzywiecki, N. Panwar, and M. Segal. (2014). Dynamic attribute based vehicle authentication (1-8). IEEE 13th International Symposium on Network Computing and Applications (NCA).

2.

S. Dolev, L. Krzywiecki, N. Panwar, and M. Segal. Optical puf for vehicles non-forwardable authentication, Technical Report 15-02.

3.

S. Dolev, L. Krzywiecki, N. Panwar, and M. Segal. Vehicle authentication via monolithically certified public key and attributes;Wireless Networks.

4.

Ernest, Foo, Christopher, Djamaludin and Andry, Rakotonirainy. (2015). Security Issues for Future Intelligent Transport Systems (14-16). Proceedings of the 2015 Australasian Road Safety Conference.

5.

Jong-Hun Byun and Byung-Woo Bae. The Implementation of Cooperative Intelligent Transport System Pilot Project.

6.

Aymen Boudguiga, Arnaud Kaiser and Pierpaolo Cincilla. (2015). Cooperative-ITS Architecture and Security Challenges: a Survey, Paper number ITS-2629 . 22nd ITS World Congress.

7.

TTA. Security Requirements for Vehicle-to-Vehicle Communication, TTAK.KO-12.0208.

8.

Jiang, D. and Delgrossi, L.. (2008). IEEE 802.11p: Towards an international standard for wireless access in vehicular environments . Proceedings of 67th IEEE Vehicular Technology Conference (VTC2008-Spring).

9.

Uzcategui, Roberto A. and Acosta-Marum, Guillermo. (2009). WAVE: A Tutorial. IEEE Communications Magazine, 47(5), 126-133.

10.

IEEE. IEEE Stnadard for Wireless Access in Vehicular Environments -Security Services for Applications and Management Message, IEEE Std. 1609.2TM-2013.

11.

TTA. Authentication Service Architecture for Vehicle-to-Vehicle Communication, TTAK.KO-12.0238.

12.

William Whyte, Andre Weimerskirch, Virendra Kumar, Thorsten Hehn. (2013). A Security Credential Management System for V2V Communications . IEEE Vehicular Networking Conference.

13.

Jung-oh Park, Do-Hyeon Choi. (2015). A Design of Framework for Secure Communication in Vehicular Cloud Environment. Journal of the Korea Institute of Information and Communication Engineering, 19(9), 2114-2120. 10.6109/jkiice.2015.19.9.2114.

14.

Seung-peom Park, Jae-won Ahn, Eun-gi Kim. (2015). Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 841-847. 10.6109/jkiice.2015.19.4.841.

15.

Su-Hyun Kim, Im-Yeong Lee. (2014). A Secure and Efficient Vehicle-to-Vehicle Communication Scheme using Bloom Filter in VANETs. International Journal of Security and Its Applications, 8(2), 9-24.

한국사물인터넷학회논문지