A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC)

被引:2
作者
Lim, Jiho [1 ]
Oh, Hansu [2 ]
Sim, Kichun [1 ]
Kim, Sunyoung [1 ]
Kim, Ki-Hyung [2 ]
机构
[1] Ajou Univ, Dept Knowledge Informat Engn, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
来源
2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN | 2023年
关键词
Blockchain; V2X; SCMS; Authorization; DID; VC;
D O I
10.1109/ICOIN56518.2023.10048986
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose DID/VC-based V2X Access Authorization Mechanism that improves the CA-centered structure problem of the V2X security authentication system developed to ensure the anonymity of V2X users and create a safe operating basis for ITS. The CA-centered PKI structure represents a structure in which there is a CA that can lead or control the identity of the identity subject. In this structure, the identity subject's personal information and certificate can be stolen by a Misbehavior CA, and there is a risk of external attack such as MITM attack. Building trust in V2X networks is a major problem because it is difficult to evaluate reliability between vehicles and infrastructure in an untrustworthy environment. In this paper, we propose a DID/VC-based V2X Access Authorization Mechanism that selects a trusted authority to improve reliability, guarantees data sovereignty and privacy protection of identity subjects, and generates safe digital credentials.
引用
收藏
页码:801 / 805
页数:5
相关论文
共 13 条
[1]   The effects of OFDM design parameters on the V2X communication performance: Asurvey [J].
Arslan, Sibel ;
Saritas, Muzeyyen .
VEHICULAR COMMUNICATIONS, 2017, 7 :1-6
[2]   RBFT: Redundant Byzantine Fault Tolerance [J].
Aublin, Pierre-Louis ;
Ben Mokhtar, Sonia ;
Quema, Vivien .
2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, :297-306
[3]  
Chu YeonSung, 2020, 2020 IEEE INT C CONS
[4]   Security issues and challenges in V2X: A Survey [J].
Ghosal, Amrita ;
Conti, Mauro .
COMPUTER NETWORKS, 2020, 169
[5]  
Hyperledger Foundation, 2018, HYP IND
[6]  
Joshua K, 2018, NATL SECURITY CREDEN
[7]   Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria? [J].
Kristianto, Edy ;
Nguyen, Van Linh ;
Lin, Po-Ching .
IEEE SECURITY & PRIVACY, 2022, 20 (04) :40-50
[8]   Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks [J].
Malik, Nisha ;
Nanda, Priyadarsi ;
Arora, Arushi ;
He, Xiangjian ;
Puthal, Deepak .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :668-673
[9]  
Preukschat A., 2021, Self-sovereign identity: Decentralized digital idenentity and verifiable credentials
[10]  
Sporny M., 2022, Decentralized Identifiers (DIDS) V1.0