Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles

Jun Han, Yue Hsun Lin, Adrian Perrig, Fan Bai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

With the increasing popularity of mobile devices, drivers and passengers will naturally want to connect their devices to their cars. Malicious entities can and likely will try to attack such systems in order to compromise other vehicular components or eavesdrop on privacy-sensitive information. It is imperative, therefore, to address security concerns from the onset of these technologies. While guaranteeing secure wireless vehicle-to-mobile communication is crucial to the successful integration of mobile devices in vehicular environments, usability is of equally critical importance. With MVSec, we propose novel approaches to secure vehicle-to-mobile communication tailored specifically for vehicular environments. We present novel security protocols and provide complete implementation and user study results.

Original languageEnglish
Title of host publicationWiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks
PublisherAssociation for Computing Machinery
Pages51-56
Number of pages6
ISBN (Print)9781450329729
DOIs
Publication statusPublished - 2014
Event7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014 - Oxford, United Kingdom
Duration: 2014 Jul 232014 Jul 25

Publication series

NameWiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks

Conference

Conference7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014
Country/TerritoryUnited Kingdom
CityOxford
Period14/7/2314/7/25

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles'. Together they form a unique fingerprint.

Cite this