Cart (Loading....) | Create Account
Close category search window
 

On the potential of PUF for pseudonym generation in vehicular networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
4 Author(s)
Petit, J. ; Distrib. & Embedded Security Group, Univ. of Twente, Enschede, Netherlands ; Bosch, C. ; Feiri, M. ; Kargl, F.

Most proposals for security of vehicular networks foresee the generation of a comparatively large number of changing pseudonyms to prevent vehicles from being identified or tracked. Most proposals rely on communication with backend pseudonym providers to refill a vehicle's pseudonym pool which creates a number of problems, one being secure storage and handling of a large amount of private key material. In this paper we investigate the usage of Physical Unclonable Functions (PUFs) and Public PUFs (PPUFs) instead of Hardware Security Modules for this purpose. We describe a possible solution that uses PUF and Fuzzy Extractors to provide the necessary stability.

Published in:

Vehicular Networking Conference (VNC), 2012 IEEE

Date of Conference:

14-16 Nov. 2012

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.