Research Article
V2V and V2I Communications Security in VII (Extended Abstract)
@INPROCEEDINGS{10.4108/ICST.ISVCS2008.4182, author={William Whyte}, title={V2V and V2I Communications Security in VII (Extended Abstract)}, proceedings={1st International ICST Symposium on Vehicular Computing Systems}, proceedings_a={ISVCS}, year={2010}, month={5}, keywords={Intelligent transportation systems communications security cryptography VII IEEE 1609}, doi={10.4108/ICST.ISVCS2008.4182} }
- William Whyte
Year: 2010
V2V and V2I Communications Security in VII (Extended Abstract)
ISVCS
ICST
DOI: 10.4108/ICST.ISVCS2008.4182
Abstract
We present recent work funded by the US Department of Transportation to secure Vehicle-to-Vehicle (V2V) and Vehicleto- Infrastructure (V2I) messages. The setting requires custom secure message formats for two reasons: first, the transmission success probability drops off significantly with packet size, so the message formats need to be optimized for bandwidth; second, the system must guarantee anonymity to private drivers, while still authenticating messages to protect the integrity of information within the system. We describe the secure messaging functionality specified in IEEE Draft Standard 1609.2-2006, and also discuss the extensions to that functionality that were developed within the recent Vehicle Infrastructure Integration (VII) Proof of Concept project.. We estimate the cost of the security processing, in terms of financial impact, additional bandwidth, additional network traffic, and additional processing time. Finally, we discuss issues which may need to be addressed before the system can be deployed and gain the confidence of the public.