1st International ICST Symposium on Vehicular Computing Systems

Research Article

V2V and V2I Communications Security in VII (Extended Abstract)

  • @INPROCEEDINGS{10.4108/ICST.ISVCS2008.4182,
        author={William Whyte},
        title={V2V and V2I Communications Security in VII (Extended Abstract)},
        proceedings={1st International ICST Symposium on Vehicular Computing Systems},
        proceedings_a={ISVCS},
        year={2010},
        month={5},
        keywords={Intelligent transportation systems communications security cryptography VII IEEE 1609},
        doi={10.4108/ICST.ISVCS2008.4182}
    }
    
  • William Whyte
    Year: 2010
    V2V and V2I Communications Security in VII (Extended Abstract)
    ISVCS
    ICST
    DOI: 10.4108/ICST.ISVCS2008.4182
William Whyte1,*
  • 1: NTRU Cryptosystems 35 Nagog Park Ste 301 Acton, MA 01720, USA +1 978 844 5200
*Contact email: wwhyte@ntru.com

Abstract

We present recent work funded by the US Department of Transportation to secure Vehicle-to-Vehicle (V2V) and Vehicleto- Infrastructure (V2I) messages. The setting requires custom secure message formats for two reasons: first, the transmission success probability drops off significantly with packet size, so the message formats need to be optimized for bandwidth; second, the system must guarantee anonymity to private drivers, while still authenticating messages to protect the integrity of information within the system. We describe the secure messaging functionality specified in IEEE Draft Standard 1609.2-2006, and also discuss the extensions to that functionality that were developed within the recent Vehicle Infrastructure Integration (VII) Proof of Concept project.. We estimate the cost of the security processing, in terms of financial impact, additional bandwidth, additional network traffic, and additional processing time. Finally, we discuss issues which may need to be addressed before the system can be deployed and gain the confidence of the public.