{"id":"https://openalex.org/W2968346293","doi":"https://doi.org/10.1145/3339252.3340523","title":"Securing V2X Communications for the Future","display_name":"Securing V2X Communications for the Future","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2968346293","doi":"https://doi.org/10.1145/3339252.3340523","mag":"2968346293"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3340523","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbit.dtu.dk/en/publications/ab2546a8-b98d-4c25-b107-16ef7e96cf90","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070813911","display_name":"Thanassis Giannetsos","orcid":"https://orcid.org/0000-0003-0663-2263"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Thanassis Giannetsos","raw_affiliation_strings":["Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark"],"affiliations":[{"raw_affiliation_string":"Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077236897","display_name":"Ioannis Krontiris","orcid":null},"institutions":[{"id":"https://openalex.org/I4210129353","display_name":"Huawei Technologies (Germany)","ror":"https://ror.org/038cdme44","country_code":"DE","type":"company","lineage":["https://openalex.org/I2250955327","https://openalex.org/I4210129353"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ioannis Krontiris","raw_affiliation_strings":["European Research Center, Huawei Technologies, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"European Research Center, Huawei Technologies, Munich, Germany","institution_ids":["https://openalex.org/I4210129353"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070813911"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":1.2601,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.8519304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7620986700057983},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7503219842910767},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.6804138422012329},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.6720820665359497},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5841910243034363},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5584788918495178},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.5374714732170105},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5339860320091248},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5239208340644836},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.47798317670822144},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.475038081407547},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4248940944671631},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4245324432849884},{"id":"https://openalex.org/keywords/enabling","display_name":"Enabling","score":0.42299407720565796},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.36461251974105835},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.22781577706336975},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17877084016799927},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17471176385879517},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.10792827606201172}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7620986700057983},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7503219842910767},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.6804138422012329},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.6720820665359497},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5841910243034363},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5584788918495178},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.5374714732170105},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5339860320091248},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5239208340644836},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.47798317670822144},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.475038081407547},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4248940944671631},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4245324432849884},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.42299407720565796},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36461251974105835},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.22781577706336975},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17877084016799927},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17471176385879517},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.10792827606201172},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3339252.3340523","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/ab2546a8-b98d-4c25-b107-16ef7e96cf90","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/ab2546a8-b98d-4c25-b107-16ef7e96cf90","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Giannetsos , T &amp; Krontiris , I 2019 , Securing V2X Communications for the Future - Can PKI Systems offer the answer? in Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019 . , 3340523 , Association for Computing Machinery , ACM International Conference Proceeding Series , 14th International Conference on Availability, Reliability and Security , Canterbury , United Kingdom , 26/08/2019 . https://doi.org/10.1145/3339252.3340523","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/ab2546a8-b98d-4c25-b107-16ef7e96cf90","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/ab2546a8-b98d-4c25-b107-16ef7e96cf90","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Giannetsos , T &amp; Krontiris , I 2019 , Securing V2X Communications for the Future - Can PKI Systems offer the answer? in Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019 . , 3340523 , Association for Computing Machinery , ACM International Conference Proceeding Series , 14th International Conference on Availability, Reliability and Security , Canterbury , United Kingdom , 26/08/2019 . https://doi.org/10.1145/3339252.3340523","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1536564267","https://openalex.org/W1540322871","https://openalex.org/W1758578440","https://openalex.org/W1969035815","https://openalex.org/W1970606468","https://openalex.org/W1978183200","https://openalex.org/W2016380441","https://openalex.org/W2032167935","https://openalex.org/W2065076704","https://openalex.org/W2082512729","https://openalex.org/W2095881341","https://openalex.org/W2096647703","https://openalex.org/W2107542607","https://openalex.org/W2108357061","https://openalex.org/W2113860890","https://openalex.org/W2122587458","https://openalex.org/W2159584786","https://openalex.org/W2189078465","https://openalex.org/W2483049553","https://openalex.org/W2806181434","https://openalex.org/W3098762454"],"related_works":["https://openalex.org/W1548793402","https://openalex.org/W2063275421","https://openalex.org/W2338482546","https://openalex.org/W2916013893","https://openalex.org/W70223653","https://openalex.org/W2567217073","https://openalex.org/W1940522861","https://openalex.org/W2363630143","https://openalex.org/W2609140868","https://openalex.org/W2157089184"],"abstract_inverted_index":{"Over":[0],"recent":[1],"years,":[2],"emphasis":[3],"in":[4,54,74],"secure":[5],"V2X":[6],"communications":[7],"research":[8],"has":[9],"converged":[10],"on":[11,50,62,100,128,142,185],"the":[12,29,82,102,120,124,129,134,143,178],"use":[13,103,144],"of":[14,43,89,104,136,145,168],"Vehicular":[15],"Public":[16],"Key":[17],"Infrastructures":[18],"(VPKIs)":[19],"for":[20,111,180],"credential":[21],"management":[22],"and":[23,31,68,86,132,166,174,192,194],"privacy-friendly":[24],"authentication":[25],"services.":[26],"However,":[27],"despite":[28],"security":[30],"privacy":[32,165],"guarantees":[33],"offered":[34,131],"by":[35,94],"such":[36,78,137],"solutions,":[37],"there":[38],"are":[39],"still":[40],"a":[41,138,155,172],"number":[42],"challenges":[44],"to":[45,123,161,198],"be":[46],"conquered.":[47],"By":[48],"reflecting":[49],"state-of-the-art":[51],"PKI-based":[52],"architectures,":[53],"this":[55],"paper,":[56],"we":[57,97,188],"identify":[58],"their":[59,75],"limitations":[60],"focusing":[61],"scalability,":[63],"interoperability,":[64],"pseudonym":[65],"reusage":[66],"policies":[67],"revocation":[69],"mechanisms.":[70],"We":[71,126],"argue":[72],"that":[73],"current":[76],"form":[77],"mechanisms":[79],"cannot":[80],"capture":[81],"strict":[83],"security,":[84,164],"privacy,":[85],"trust":[87,116],"requirements":[88],"all":[90],"involved":[91],"stakeholders.":[92],"Motivated":[93],"these":[95],"weaknesses,":[96],"then":[98],"proceed":[99],"proposing":[101],"trusted":[105],"computing":[106],"technologies":[107],"as":[108,154],"an":[109],"enabler":[110],"more":[112],"decentralized":[113,175],"approaches":[114],"where":[115],"is":[117,160],"shifted":[118],"from":[119],"back-end":[121],"infrastructure":[122,182],"edge.":[125],"debate":[127],"advantages":[130],"underline":[133],"specifis":[135],"novel":[139],"approach":[140],"based":[141],"advanced":[146],"cryptographic":[147],"primitives,":[148],"using":[149],"Direct":[150],"Anonymous":[151],"Attestation":[152],"(DAA)":[153],"concrete":[156],"example.":[157],"Our":[158],"goal":[159],"enhance":[162],"run-time":[163],"trustworthiness":[167],"edge":[169],"devices":[170],"with":[171],"scalable":[173],"solution":[176],"eliminating":[177],"need":[179],"federated":[181],"trust.":[183],"Based":[184],"our":[186],"findings,":[187],"posit":[189],"open":[190],"issues":[191],"challenges,":[193],"discuss":[195],"possible":[196],"ways":[197],"address":[199],"them.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
