Z. Pethö, Tamás Márton Kazár, Roland Kraudy, Z. Szalay, Á. Török
{"title":"Considering PKI safety impact on network performance during V2X-based AD/ADAS function development processes","authors":"Z. Pethö, Tamás Márton Kazár, Roland Kraudy, Z. Szalay, Á. Török","doi":"10.1109/CogMob55547.2022.10118227","DOIUrl":null,"url":null,"abstract":"In this research, we examine the impact of PKI on vehicle safety and thus make suggestions for further improvements to V2X-based safety application design processes. In the first step, we introduce the novel methodological background of characterizing the safety impact of the network performance metrics on the V2X-based automotive applications. Following this, we investigated two cases: with and without Public Key Infrastructure (PKI) authorization, to identify the potential safety effect if the V2X device is unprepared for the additional computational overhead caused by the authentication framework-related processes. Based on our results, we can identify the operational domain of a specific V2X-based application that can be used safely.","PeriodicalId":430975,"journal":{"name":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CogMob55547.2022.10118227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this research, we examine the impact of PKI on vehicle safety and thus make suggestions for further improvements to V2X-based safety application design processes. In the first step, we introduce the novel methodological background of characterizing the safety impact of the network performance metrics on the V2X-based automotive applications. Following this, we investigated two cases: with and without Public Key Infrastructure (PKI) authorization, to identify the potential safety effect if the V2X device is unprepared for the additional computational overhead caused by the authentication framework-related processes. Based on our results, we can identify the operational domain of a specific V2X-based application that can be used safely.