Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

A generic public key infrastructure for securing Car-to-X communication

: Bißmeyer, Norbert; Stübing, Hagen; Schoch, Elmar; Götz, Stefan; Stotz, Jan Peter; Lonc, Brigitte

Fulltext urn:nbn:de:0011-n-1971265 (812 KByte PDF)
MD5 Fingerprint: 50bdbaa55580ed5298c0ff3b0ae9b961
Created on: 13.3.2012

Intelligent Transportation Society of America -ITS-:
18th World Congress on Intelligent Transport Systems featuring ITS America's annual meeting and exposition 2011. Proceedings. CD-ROM : October 16 - 20, 2011, Orlando, Florida
Washington/DC, 2011
12 pp.
World Congress on Intelligent Transport Systems (ITS) <18, 2011, Orlando/Fla.>
Conference Paper, Electronic Publication
Fraunhofer SIT ()
public key infrastructure; ECC; ECDSA; PKI; C2X; Car-to-x; C2C; C2I; VANET; C2C Communication Consortium

Security and privacy in Car-to-X (C2X) communication is a major aspect that affects all applications used in the network. Due to the wireless communication and the decentralized character of the ad-hoc network attacks are inevitable and are hardly detectable by central entities. Especially, safety critical applications which trigger their actions based on data received from other network entities are relying on the trustworthiness of the exchanged messages. To achieve this trust in messages, the worldwide commonly followed approach is to introduce a Public Key Infrastructure (PKI). The PKI issues certificates to C2X enabled units and therefore assures their validity. Yet, C2X has several special requirements on the design of a suitable PKI, like minimum overhead and privacy preservation. This paper presents a PKI organisation and structure, which was created in the context of the Car 2 Car Communication Consortium (C2C-CC), the European industry forum on C2X communication technologies. In the design of our proposed PKI, great importance is attached laid on interoperability with other PKIs (e.g. in the U.S.) and extensibility for future additional implementations. Processes are defined for message verification, certificate updates and entity revocation. Likewise, flexible privacy protection measures and anonymity aspects in the ad-hoc communication as well as in the PKI backend are also a major topic.