loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Formal Analysis of C-ITS PKI Protocols

Topics: Access Control; Anonymity; Critical Infrastructure Protection; Data Protection; Distributed Systems Security; Formal Methods for Security; Identification, Authentication and Non-Repudiation; Identity Management; IoT Security and Privacy; Network Security; Network Security; Privacy; Security and Privacy in Mobile Systems; Security Engineering; Security in Distributed Systems; Security Information Systems Architecture; Security Protocols; Sensor and Mobile Ad Hoc Network Security; Trust Management and Reputation Systems; Ubiquitous Computing Security; Web Security and Privacy; Wireless Network Security

Authors: Mounira Msahli 1 ; Pascal Lafourcade 2 and Dhekra Mahmoud 2

Affiliations: 1 Télécom Paris, LTCI, IP Paris, France ; 2 Université Clermont Auvergne, CNRS, LIMOS, F-63000 Clermont, France

Keyword(s): C-ITS Protocols, Formal Verification, Authentication, Privacy, Security, ProVerif.

Abstract: Vehicular networking is gaining a lot of popularity and attraction from among the industry and academic research communities in the last decade. The communication between vehicles will lead to more efficient and secured roads because we will be able to provide information about traffic and road conditions to vehicle’s drivers. However, ensuring the security of these networks and devices still remains a main major concern to guarantee the expected services. Secure Public Key Infrastructure (PKI) represents a common solution to achieve many security and privacy requirements. Unfortunately, current Cooperative Intelligent Transport Systems (C-ITS) PKI protocols were not verified in terms of security and privacy. In this paper, we propose a security analysis of C-ITS PKI protocols in the symbolic model using ProVerif. We formally modeled C-ITS PKI protocols based on the specifications given in the ETSI standard. We model C-ITS PKI protocols and formalize their security properties in the applied Pi-calculus. We used an automatic privacy verifier UKano to analyse Enrolment protocol. We found attacks on authentication properties, in Authorization and Validation protocols when considering a dishonest Authorization Authority (AA). We analysed proof results and we fixed identified attacks by introducing new parameters in protocol request. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.147.126.36

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Msahli, M., Lafourcade, P. and Mahmoud, D. (2024). Formal Analysis of C-ITS PKI Protocols. In Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-709-2; ISSN 2184-7711, SciTePress, pages 198-210. DOI: 10.5220/0012766100003767

@conference{secrypt24,
author={Mounira Msahli and Pascal Lafourcade and Dhekra Mahmoud},
title={Formal Analysis of C-ITS PKI Protocols},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT},
year={2024},
pages={198-210},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012766100003767},
isbn={978-989-758-709-2},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT
TI - Formal Analysis of C-ITS PKI Protocols
SN - 978-989-758-709-2
IS - 2184-7711
AU - Msahli, M.
AU - Lafourcade, P.
AU - Mahmoud, D.
PY - 2024
SP - 198
EP - 210
DO - 10.5220/0012766100003767
PB - SciTePress