Performance Comparison of Security Credential Management Systems for V2X: North American Standard IEEE 1609.2.1 and European Standard ETSI TS 102 941
- URL: http://arxiv.org/abs/2501.03237v1
- Date: Tue, 17 Dec 2024 00:19:08 GMT
- Title: Performance Comparison of Security Credential Management Systems for V2X: North American Standard IEEE 1609.2.1 and European Standard ETSI TS 102 941
- Authors: Abel C. H. Chen,
- Abstract summary: This study examines the performance and structural differences between the two primary standards for Security Credential Management Systems (SCMS) in Vehicular-to-Everything (V2X) communication.<n>It focuses on comparing their respective Public Key Infrastructure (PKI) architectures, certificate application, and the formats of request/response messages used during certificate applications.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This study examines the performance and structural differences between the two primary standards for Security Credential Management Systems (SCMS) in Vehicular-to-Everything (V2X) communication: the North American IEEE standards and the European ETSI standards. It focuses on comparing their respective Public Key Infrastructure (PKI) architectures, certificate application workflows, and the formats of request/response messages used during certificate applications. The research includes a theoretical analysis of message length and security features inherent in each standard. Additionally, practical implementations of both systems are conducted to evaluate their efficiency in certificate management processes. Based on the findings, the study provides recommendations to guide future development of SCMS.
Related papers
- Semi-Automated Design of Data-Intensive Architectures [49.1574468325115]
This paper introduces a development methodology for data-intensive architectures.
It guides architects in (i) designing a suitable architecture for their specific application scenario, and (ii) selecting an appropriate set of concrete systems to implement the application.
We show that the description languages we adopt can capture the key aspects of data-intensive architectures proposed by researchers and practitioners.
arXiv Detail & Related papers (2025-03-21T16:01:11Z) - Network Centrality as a New Perspective on Microservice Architecture [48.55946052680251]
The adoption of Microservice Architecture has led to the identification of various patterns and anti-patterns, such as Nano/Mega/Hub services.
This study investigates whether centrality metrics (CMs) can provide new insights into MSA quality and facilitate the detection of architectural anti-patterns.
arXiv Detail & Related papers (2025-01-23T10:13:57Z) - An Efficient Key Expansion Method Applied to Security Credential Management System [0.0]
U.S. Department of Transportation has adopts IEEE 1609 series to build the security credential management system (SCMS) for being the standard of connected cars in U.S.
A butterfly key expansion (BKE) method in SCMS has been designed to provide certificates for improving the privacy of connected cars.
This study proposes an original efficient key expansion method, and the mathematical principles have been proposed to prove the encryption/decryption feasibility, car privacy, and method efficiency.
arXiv Detail & Related papers (2025-01-09T23:59:46Z) - Interplay of ISMS and AIMS in context of the EU AI Act [0.0]
The EU AI Act (AIA) mandates the implementation of a risk management system (RMS) and a quality management system (QMS) for high-risk AI systems.<n>This paper examines the interfaces between an information security management system (ISMS) and an AI management system (AIMS)<n>Four new AI modules are introduced, proposed for inclusion in the BSI Grundschutz framework to comprehensively ensure the security of AI systems.
arXiv Detail & Related papers (2024-12-24T20:13:19Z) - ECBD: Evidence-Centered Benchmark Design for NLP [95.50252564938417]
We propose Evidence-Centered Benchmark Design (ECBD), a framework which formalizes the benchmark design process into five modules.
Each module requires benchmark designers to describe, justify, and support benchmark design choices.
Our analysis reveals common trends in benchmark design and documentation that could threaten the validity of benchmarks' measurements.
arXiv Detail & Related papers (2024-06-13T00:59:55Z) - How to Measure TLS, X.509 Certificates, and Web PKI: A Tutorial and Brief Survey [0.8749675983608172]
Transport Layer Security (TLS) is the base for many Internet applications and services to achieve end-to-end security.
We provide guidance on how to measure TLS deployments, including X.509 certificates and Web PKI.
arXiv Detail & Related papers (2024-01-31T18:20:36Z) - Transformer-based Entity Legal Form Classification [43.75590166844617]
We propose the application of Transformer-based language models for classifying legal forms.
We employ various BERT variants and compare their performance against multiple traditional baselines.
Our findings demonstrate that pre-trained BERT variants outperform traditional text classification approaches in terms of F1 score.
arXiv Detail & Related papers (2023-10-19T14:11:43Z) - Evaluation and Analysis of Standard Security Technology in V2X Communication -- Exploring ECQV Implicit Certificate Cracking [0.0]
This study evaluates the computational time for key generation, key expansion, signature generation, and signature verification under different security strengths.
This study proposes mathematical models to demonstrate the probability of ECQV cracking and provides suggestions for mitigating ECQV cracking risks.
arXiv Detail & Related papers (2023-09-27T01:13:24Z) - On the relationship between Benchmarking, Standards and Certification in
Robotics and AI [1.1421942894219899]
Benchmarking, standards and certification are closely related processes.
Benchmarking, standards and certification are not only useful but vital to the broader practice of Responsible Innovation.
arXiv Detail & Related papers (2023-09-21T14:59:36Z) - Performance Analysis of Security Certificate Management System in
Vehicle-to-Everything (V2X) [0.0]
This study implements end entities and a Security Credential Management System conforming to IEEE 1609.2 and IEEE 1609.2.1 standards.
It measures the computation and transmission times for each security communication action within the system from the perspective of end entities.
arXiv Detail & Related papers (2023-09-18T02:24:33Z) - A General Framework for Verification and Control of Dynamical Models via Certificate Synthesis [54.959571890098786]
We provide a framework to encode system specifications and define corresponding certificates.
We present an automated approach to formally synthesise controllers and certificates.
Our approach contributes to the broad field of safe learning for control, exploiting the flexibility of neural networks.
arXiv Detail & Related papers (2023-09-12T09:37:26Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - KPEval: Towards Fine-Grained Semantic-Based Keyphrase Evaluation [69.57018875757622]
We propose KPEval, a comprehensive evaluation framework consisting of four critical aspects: reference agreement, faithfulness, diversity, and utility.
Using KPEval, we re-evaluate 23 keyphrase systems and discover that established model comparison results have blind-spots.
arXiv Detail & Related papers (2023-03-27T17:45:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.