Performance Comparison of Security Credential Management Systems for V2X: North American Standard IEEE 1609.2.1 and European Standard ETSI TS 102 941
- URL: http://arxiv.org/abs/2501.03237v1
- Date: Tue, 17 Dec 2024 00:19:08 GMT
- Title: Performance Comparison of Security Credential Management Systems for V2X: North American Standard IEEE 1609.2.1 and European Standard ETSI TS 102 941
- Authors: Abel C. H. Chen,
- Abstract summary: This study examines the performance and structural differences between the two primary standards for Security Credential Management Systems (SCMS) in Vehicular-to-Everything (V2X) communication.
It focuses on comparing their respective Public Key Infrastructure (PKI) architectures, certificate application, and the formats of request/response messages used during certificate applications.
- Score: 0.0
- License:
- Abstract: This study examines the performance and structural differences between the two primary standards for Security Credential Management Systems (SCMS) in Vehicular-to-Everything (V2X) communication: the North American IEEE standards and the European ETSI standards. It focuses on comparing their respective Public Key Infrastructure (PKI) architectures, certificate application workflows, and the formats of request/response messages used during certificate applications. The research includes a theoretical analysis of message length and security features inherent in each standard. Additionally, practical implementations of both systems are conducted to evaluate their efficiency in certificate management processes. Based on the findings, the study provides recommendations to guide future development of SCMS.
Related papers
- Network Centrality as a New Perspective on Microservice Architecture [48.55946052680251]
The adoption of Microservice Architecture has led to the identification of various patterns and anti-patterns, such as Nano/Mega/Hub services.
This study investigates whether centrality metrics (CMs) can provide new insights into MSA quality and facilitate the detection of architectural anti-patterns.
arXiv Detail & Related papers (2025-01-23T10:13:57Z) - An Efficient Key Expansion Method Applied to Security Credential Management System [0.0]
U.S. Department of Transportation has adopts IEEE 1609 series to build the security credential management system (SCMS) for being the standard of connected cars in U.S.
A butterfly key expansion (BKE) method in SCMS has been designed to provide certificates for improving the privacy of connected cars.
This study proposes an original efficient key expansion method, and the mathematical principles have been proposed to prove the encryption/decryption feasibility, car privacy, and method efficiency.
arXiv Detail & Related papers (2025-01-09T23:59:46Z) - Interplay of ISMS and AIMS in context of the EU AI Act [0.0]
The EU AI Act (AIA) mandates the implementation of a risk management system (RMS) and a quality management system (QMS) for high-risk AI systems.
This paper examines the interfaces between an information security management system (ISMS) and an AI management system (AIMS)
Four new AI modules are introduced, proposed for inclusion in the BSI Grundschutz framework to comprehensively ensure the security of AI systems.
arXiv Detail & Related papers (2024-12-24T20:13:19Z) - ECBD: Evidence-Centered Benchmark Design for NLP [95.50252564938417]
We propose Evidence-Centered Benchmark Design (ECBD), a framework which formalizes the benchmark design process into five modules.
Each module requires benchmark designers to describe, justify, and support benchmark design choices.
Our analysis reveals common trends in benchmark design and documentation that could threaten the validity of benchmarks' measurements.
arXiv Detail & Related papers (2024-06-13T00:59:55Z) - Service Level Agreements and Security SLA: A Comprehensive Survey [51.000851088730684]
This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management.
It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic.
It proposes a novel classification criterium to organize the analysis based on SLA life cycle phases.
arXiv Detail & Related papers (2024-01-31T12:33:41Z) - Rethinking Word-Level Auto-Completion in Computer-Aided Translation [76.34184928621477]
Word-Level Auto-Completion (WLAC) plays a crucial role in Computer-Assisted Translation.
It aims at providing word-level auto-completion suggestions for human translators.
We introduce a measurable criterion to answer this question and discover that existing WLAC models often fail to meet this criterion.
We propose an effective approach to enhance WLAC performance by promoting adherence to the criterion.
arXiv Detail & Related papers (2023-10-23T03:11:46Z) - Evaluation and Analysis of Standard Security Technology in V2X Communication -- Exploring ECQV Implicit Certificate Cracking [0.0]
This study evaluates the computational time for key generation, key expansion, signature generation, and signature verification under different security strengths.
This study proposes mathematical models to demonstrate the probability of ECQV cracking and provides suggestions for mitigating ECQV cracking risks.
arXiv Detail & Related papers (2023-09-27T01:13:24Z) - On the relationship between Benchmarking, Standards and Certification in
Robotics and AI [1.1421942894219899]
Benchmarking, standards and certification are closely related processes.
Benchmarking, standards and certification are not only useful but vital to the broader practice of Responsible Innovation.
arXiv Detail & Related papers (2023-09-21T14:59:36Z) - Performance Analysis of Security Certificate Management System in
Vehicle-to-Everything (V2X) [0.0]
This study implements end entities and a Security Credential Management System conforming to IEEE 1609.2 and IEEE 1609.2.1 standards.
It measures the computation and transmission times for each security communication action within the system from the perspective of end entities.
arXiv Detail & Related papers (2023-09-18T02:24:33Z) - A General Framework for Verification and Control of Dynamical Models via Certificate Synthesis [54.959571890098786]
We provide a framework to encode system specifications and define corresponding certificates.
We present an automated approach to formally synthesise controllers and certificates.
Our approach contributes to the broad field of safe learning for control, exploiting the flexibility of neural networks.
arXiv Detail & Related papers (2023-09-12T09:37:26Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.