Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

simTD Security Architecture: Deployment of a security and privacy architecture in field operational tests

 
: Bißmeyer, N.; Stübing, H.; Mattheß, M.; Stotz, J.P.; Schütte, J.; Gerlach, M.; Friederici, F.

:
Volltext urn:nbn:de:0011-n-1355099 (850 KByte PDF)
MD5 Fingerprint: 44d0422f0ec313683f003e50d31be48a
Erstellt am: 14.7.2010


International School of IT Security -isits-:
The world's leading conference on all aspects of IT security in vehicles. 7th Conference Embedded Security in Cars, escar 2009. Proceedings : 24. - 25. November 2009, Düsseldorf, Germany
Düsseldorf, 2009
10 S.
Embedded Security in Cars Conference (escar) <7, 2009, Düsseldorf>
Englisch
Konferenzbeitrag, Elektronische Publikation
Fraunhofer SIT ()
car-2-cCar; C2X; V2X; VANET; security architecture; privacy; field operational test

Abstract
simTD is the worldwide first field operational trial for car-to-x (C2X) technology that applies several hundred vehicles and roadside stations in a real-life environment in order to evaluate the entire spectrum of applications with regard to effects on traffic safety and traffic efficiency. For a comprehensive integration of security into the simTD architecture several challenges have to be met. It has to be examined which security standards can be deployed with the given architecture. Adaptations and further extensions of common standards are necessary in order to fit the security and privacy mechanisms into the entire C2X architecture. Furthermore the security mechanisms have to deal with hardware restrictions due to the high availability requirements and the restrictions in terms of co sts and resources that are typical for automotive environments. Finally novel concepts have to be developed with regard to the scale factor of the large fleet consisting of vehicles and infrastructure. In this work we give a first glance on a near-series security architecture for C2X communications. We present the different concepts, protocols and cryptographic procedures used in simTD. Furthermore strategies to protect the driver´s privacy based on pseudonyms are proposed.

: http://publica.fraunhofer.de/dokumente/N-135509.html