Affiliation:
1. School of Information and Engineering, Dalarna University, Röda Vägen 3, SE-781 70 Borlänge, Sweden
2. School of Informatics, University of Skövde, SE-541 31 Skövde, Sweden
Abstract
Cooperative Intelligent Transport Systems (C-ITSs) are an important development for society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable transportation through interconnected and intelligent communication between vehicles, infrastructure, and traffic-management systems. Many real-world implementations still consider traditional Public Key Infrastructures (PKI) as the underlying trust model and security control. However, there are challenges with the PKI-based security control from a scalability and revocation perspective. Lately, certificateless cryptography has gained research attention, also in conjunction with C-ITSs, making it a new type of security control to be considered. In this study, we use certificateless cryptography as a candidate to investigate factors affecting decisions (not) to adopt new types of security controls, and study its current gaps, key challenges and possible enablers which can influence the industry. We provide a qualitative study with industry specialists in C-ITSs, combined with a literature analysis of the current state of research in certificateless cryptographic in C-ITS. It was found that only 53% of the current certificateless cryptography literature for C-ITSs in 2022–2023 provide laboratory testing of the protocols, and 0% have testing in real-world settings. However, the trend of research output in the field has been increasing linearly since 2016 with more than eight times as many articles in 2022 compared to 2016. Based on our analysis, using a five-phased Innovation-Decision Model, we found that key reasons affecting adoption are: availability of proof-of-concepts, knowledge beyond current best practices, and a strong buy-in from both stakeholders and standardization bodies.
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference83 articles.
1. Potential cyberattacks on automated vehicles;Petit;IEEE Trans. Intell. Transp. Syst.,2014
2. Paulsen, C., and Byers, R. (2019). Glossary of Key Information Security Terms, National Institute of Standards and Technology.
3. Dynamic interplay in the information security risk management process;Lundgren;Int. J. Risk Assess. Manag.,2019
4. (2013). Information Technology-Security Techniques -Information Security Risk Management. Standard No. ISO/IEC 27005.
5. Understanding key skills for information security managers;Haqaf;Int. J. Inf. Manag.,2018