Secure Hybrid ITS Communication with Data Protection

by   Jonas Vogt, et al.

In the future world of safe traffic, intelligent transportation systems play a vital role. The connections between traffic participants and systems on the one and infrastructure and service providers on the other side are a necessary prerequisite for informed and safe driving. The key for the connection between all stakeholders is a reliable and secure connection. Reliability can be achieved in different ways. For the information exchange, we utilize hybrid communication technologies in different scenarios. This includes long-range technologies like DAB+ and cellular networks and short- and medium-range technologies like ETSI ITS G5 or RFID. Those technologies can only be used if messages transmitted via the wireless communication links are protected. Protection not only means encryption but most importantly means to verify if the data was sent by a legit sender. This is a necessary requirement for a recipient to trust the data received. In ITS, transmitted data could be used for user tracing and collection of user data. Therefore, a communication system should be designed in such a way that personal user data is protected. The user must be untraceable, but nevertheless able to use all services without limitations. In this paper, we describe the approach and ideas we took to design a secure hybrid communication architecture that is at the same time data protection friendly.


page 1

page 2

page 3

page 4

page 5

page 6

page 7


Multi-RATs Support to Improve V2X Communication

As the next generation of wireless system targets at providing a wider r...

Secure V2V and V2I Communication in Intelligent Transportation using Cloudlets

Intelligent Transportation System (ITS) is a vision which offers safe, s...

SafeEmail A safe and reliable email communication system without any spam

Using multi group asymmetric public and private keys, this paper propose...

An Object Oriented Approach For the Protection of Information Systems

We provide a protection system making use of encapsulation, messages com...

CONVERGE – Future IRS-Infrastructures as Open Service Networks

In the past years there has been significant progress in Intelligent Tra...

COMA: Communication and Obfuscation Management Architecture

In this paper, we introduce a novel Communication and Obfuscation Manage...

Hiding in the Clouds and Building a Stealth Communication Network

Social networks, instant messages and file sharing systems are common co...