<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">

<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" category="std"
    docName="draft-jeong-ipwave-security-privacy-02">

<front>
    <title abbrev="Basic Support for Security and Privacy">
    Basic Support for Security and Privacy in IP-Based Vehicular Networks
    </title>

    <author role='editor' initials="J." surname="Jeong"
            fullname="Jaehoon (Paul) Jeong">		
        <organization abbrev="Sungkyunkwan University">
           Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
    		</uri>
        </address>
    </author>

    <author initials="Y." surname="Shen"
            fullname="Yiwen (Chris) Shen">		
        <organization abbrev="Sungkyunkwan University">
           Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4106</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>chrisshen@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-chris-shen.php
    		</uri>
        </address>
    </author>

    <author initials="J." surname="Park"
            fullname="Jung-Soo Park">		
        <organization abbrev="ETRI">
            Electronics and Telecommunications Research Institute
        </organization>

        <address>
            <postal>
                <street>218 Gajeong-Ro, Yuseong-Gu</street>
                <city>Daejeon</city> <region></region>
                <code>34129</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 42 860 6514</phone>
            <email>pjs@etri.re.kr</email>
        </address>
    </author>
    
    <date month="November" day="2" year="2020" />
	
    <area>Internet</area>

    <workgroup>IPWAVE Working Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
     the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>       

    <abstract>
    <t>
    This document describes possible attacks of security and privacy in 
	IP Wireless Access in Vehicular Environments (IPWAVE). It also proposes
	countermeasures for those attacks.
    </t>
    </abstract>
</front>

<middle>

<section anchor="section:Introduction" title="Introduction"> 
    <t>
    Vehicular networking has become popular by the enhancement of Intelligent 
	Transportation Systems (ITS) <xref target="ISO-ITS-IPv6"/>. 
	The vehicular networking can work based on Dedicated Short-Range 
	Communications (DSRC) <xref target="DSRC"/>.
    This DSRC is realized by the IEEE Wireless Access in Vehicular Environments 
	(WAVE) <xref target="WAVE-1609.0"/>.
    Especially, IEEE 802.11-OCB (Outside the Context of Basic Support Set) 
	<xref target="IEEE-802.11-OCB"/> provides the Media Access Control (MAC) 
	for vehicles in vehicular networks.
    IP-based vehicular networking can be supported with IPv6 over 
    IEEE 802.11-OCB <xref target="RFC8691"/>, which defines the IPv6
    Neighbor Discovery (ND), Maximum Transmission Unit (MTU), and MAC layer 
    adaptation.
	</t>
	
    <t>	
    Vehicles can construct Vehicular Ad Hoc Networks (VANET) by
    themselves without any infrastructure node such as a Road-Side Unit (RSU).
	Cooperative Adaptive Cruise Control and Autonomous Driving 
	(i.e., Self-Driving) services can take advantage of this vehicular networking for
	safe driving through the wireless communications among vehicles.
	</t>
	
    <t>
    When using IP-based vehicular networks in self-driving environments, the
    information exchange among self-driving vehicles are critical to the safety
    of vehicles since the information received from other vehicles may be used
    as inputs for vehicle maneuvers. Thus, identifying potential loopholes in
    the IP-based vehicular networks becomes crucial.
    </t>

    <t>
    This document describes possible attacks on security and vulnerabilities of 
    privacy in IP Wireless Access in Vehicular Environments (IPWAVE). 
    It also proposes countermeasures for those attacks and vulnerabilities.
    </t>

</section>	<!--  end section "Introduction"  --> 

<section anchor="section:Terminology" title="Terminology">
    <t>
    This document uses the definitions defined in the IPWAVE problem statement
	document <xref target="ID-IPWAVE-PS"/>.
    </t>
</section>	<!--  end section "Terminology"  --> 

<section anchor="section:Security-Attacks"
         title="Security Attacks">
    <t>
    This section explains possible attacks of security and vulnerabilities of 
    privacy in IP-based vehicular networks.
	</t>
	
    <t>
    Security and privacy are very important in V2I, V2V, and V2X communications in 
    vehicular networks. Only identified and authorized vehicles should be allowed to 
	be involved in vehicular networking. Furthermore, in-vehicle devices in a vehicle
	and mobile devices of a driver and passengers are required to communicate with 
	other devices in VANET or the Internet in a secure and reliable way.
	</t>
	
	<t>
	In reality, there are many possible security attacks in vehicular networks.
	The exemplary security attacks are false information attack, impersonation attack,
	denial-of-service attack, message suspension attack, tampering attack, and tracking.
	By these attacks, the vehicles can be put into dangerous situations by false 
	information	and information loss.
	</t>
	
	<t>
    For those attacks, security countermeasures are required to protect vehicles.
	With these countermeasures, vehicles can exchange their driving data with 
	neighboring vehicles and infrastructure nodes (e.g., edge computing device and 
	cloud server) for safe driving as well as efficient navigation in road networks.	
    </t>
	
    <section anchor="section:False-Information-Attack"
             title="False Information Attack">
	<t>
    Malicious vehicles may intentionally disseminate false driving information 
	(e.g., location, speed, and direction) to deceive other vehicles, which may put those vehicles in danger.
    Especially, a representative example is Sybil attack.
	This Sybil attack makes multiple false identities of non-existing vehicles 
	(i.e., virtual bogus vehicles) in order to confuse other real vehicles 
	in safe driving, and possibly make these real vehicles to make wrong maneuver decisions, leading to fatalities.  
    </t>

    <t>
    A malicious vehicle can also create multiple virtual 
	bogus vehicles, and generate global IPv6 addresses and register them with
    a Mobility Anchor (MA) via an RSU. This IP address autoconfiguration and registration procedure from many virtual vehicles can occupy the computation power and storage resources of a RSU and an MA and even paralyze the two entities. 
	Thus, the RSU and MA need to determine whether a vehicle is genuine or 
	bogus in the IP address autoconfiguration and mobility management.
    </t>

    </section> <!--  end section "False Information Attack"  --> 
	
    <section anchor="section:Impersonation-Attack"
             title="Impersonation Attack">
    <t>
	Malicious vehicles can pretend to be other vehicles with forged IP addresses or 
	MAC address as IP address spoofing and MAC address spoofing, respectively.
	This attack is called impersonation attack to masquerade a vehicle and user. 
    </t>
	
	<t>
	To detect such an impersonation attack, an authentication scheme needs to check
	whether the MAC address and IPv6 address of a vehicle is associated with 
	the vehicle's permanent identifier (e.g., a driver's certificate identifier) or not.
	</t>
	

    </section> <!--  end section "Impersonation Attack"  --> 

    <section anchor="section:Denial-of-Service-Attack"
             title="Denial-of-Service Attack">

    <t>
    Malicious vehicles (or compromised vehicles) can generate bogus services 
	requests to either a vehicle or a server in the vehicular cloud so that 
	either the vehicle or the server is extremely busy with the requests, 
	and cannot process valid request in a prompt way. This attack is called
	Denial-of-Service (DoS) attack.
	</t>
	
<!-- 	<t> 
    For example, in the IPv6 ND for vehicular networks, the vehicular-network-wide 
	DAD can be performed via an RSU and a MA to guarantee that the IPv6 address of 
	a vehicle's wireless interface is unique in the vehicular network. The ND 
	packets for the DAD process are forwarded to other vehicles, an RSU, and an MA.
    </t> -->
	
	<t>
	To detect and mitigate this DoS attack, the vehicles need to collaborate with 
	each other to monitor a suspicious activity related to the DoS attack, that is,
	the generation of messages more than the expected threshold in a certain service.
	</t>

    </section> <!--  end section "Denial-of-Service Attack"  -->
	    
    <section anchor="section:Message-Suspension-Attack"
             title="Message Suspension Attack">
    <t>
	Malicious vehicles can drop packets originated by other vehicles in multihop 
	V2V or V2I communications, which is called a Message Suspension Attack. 
    This packet dropping can hinder the data exchange for safe driving in cooperative 
    driving environments. Also, in multihop V2V or V2I communications, this packet 
	dropping can interfere with the reliable data forwarding among the communicating 
	entities (e.g., vehicle, client, and server).
	</t>
	
	<t> For the reliable data transfer, a vehicle performing the message suspension 
    attack needs to be detected by good vehicles and a good RSU, and it should be 
	excluded in vehicular communications.
    </t>   
    </section> <!--  end section "Message Suspension Attack"  --> 

    <section anchor="section:Tampering-Attack"
             title="Tampering Attack">

    <t>
    An authorized and legitimate vehicle may be compromised by a hacker
    so that it can run a malicious firmware or software (malware), which is called
    a tampering attack. This tampering attack may endanger the vehicle's 
    computing system, steal the vehicle's information, and track the vehicle. 
    Also, such a malware can generate bogus data traffic for DoS attack against
    other vehicles, and track other vehicles, and collect other vehicles' information.
    </t>

    <t>
    The forgery of firmware or software in a vehicle needs to be protected against hackers.
    The forgery prevention of firmware such as the bootloader of a vehicle's computing 
	system can be performed by a secure booting scheme. The safe update of the firmware can
	be performed by a secure firmware update protocol. The abnormal behaviors by 
	the forgery of firmware or software can be monitored by a remote attestation scheme.
    </t>
    </section> <!--  end section "Tampering Attack"  --> 

    <section anchor="section:Tracking"
             title="Tracking">
    <t>
    The MAC address and IPv6 address of a vehicle's wireless interface can be
    used as an identifier. An hacker can track a moving vehicle by collecting and 
    tracing the data traffic related to the MAC address or IPv6 address.
    </t>

    <t>
    To avoid the illegal tracking by a hacker, the MAC address and IPv6 address 
    of a vehicle need to be periodically updated. However, the change of those
	addresses needs to minimize the impact of ongoing sessions on performance. 
    </t> 

    </section> <!--  end section ""  --> 

</section>	<!--  end section "Security Attacks"  --> 	

<section anchor="section:Security-Countermeasures"
         title="Security Countermeasures">
    <t>
	This section proposes countermeasures against the attacks of security
	and privacy in IP-based vehicular networks.
	</t>

    <section anchor="section:Identification-and-Authentication"
             title="Identification and Authentication">
	<t>
    Good vehicles are ones having valid certificates (e.g., X.509 certificate), which can be validated
    by an authentication method through an authentication server <xref target="RFC5280"/>.
	</t>
	
    <t>
    Along with an X.509 certificate, a Vehicle Identification Number (VIN) can be used
    as a vehicle's identifier to efficiently authenticate the vehicle and its driver 
	through a road infrastructure node (e.g., RSU and MA), which is connected to an 
	authentication server in vehicular cloud. X.509 certificates can be used as 
	Transport Layer Security (TLS) certificates for the mutual authentication of  
	a TCP connection between two vehicles or between a vehicle and a corresponding node 
	(e.g., client and server) in the Internet.
    </t>
	
	<t>
	Good vehicles can also use a Decentralized Identifier (DID) with the help of a 
	verifiable claim service. In this case, vehicles can their DID as a unique identifier, 
	and then check the identity of any joining vehicle with its verifiable claim.
	</t>
    </section> <!--  end section "Identification and Authentication"  --> 

    <section anchor="section:Integrity-and-Confidentiality"
             title="Integrity and Confidentiality">
    <t>
    For secure V2I or V2V communications, a secure channel between two communicating 
	entities (e.g., vehicle, RSU, client, and server) needs to be used to check the integrity 
	of packets exchanged between them and support their confidentiality. 
	For this secure channel, a pair of session keys between two entities (e.g., vehicle, 
	RSU, MA, client, and server) needs to be set up.
    </t>
	
	<t>
	For the establishment of the session keys in V2V or V2I communications, an Internet 
	Key Exchange Protocol version 2 (IKEv2) can be used <xref target="RFC7296"/>. 
	Also, for the session key generation, either an RSU or an MA can play a role of a 
	Software-Defined Networking (SDN) Controller to make a pair of session keys and 
	other session parameters (e.g., a hash algorithm and an encryption algorithm) 
	between two communicating entities in vehicular networks <xref target="ID-SDN-IPsec"/>.	
	</t>
    </section> <!--  end section "Integrity and Confidentiality"  --> 
	
    <section anchor="section:Non-Repudiation"
             title="Non-Repudiation">
    <t>
	A malicious vehicle can disseminate bogus messages to its neighboring vehicles as a Sybil attack.
	This Sybil attack announces wrong information of a vehicle's existence and mobility information
	to normal vehicles. This may cause accidents (e.g., vehicle collision and pedestrian damage).
    In the case of the occurrence of an accident, it is important to localize and identify the criminal 
	vehicle with a non-repudiation method through the logged data during the navigation of vehicles.
	</t>
	
	<t>
    For non-repudiation, the messages generated by a vehicle can be logged by its neighboring vehicles.
    As an effective non-repudiation, a blockchain technology can be used. Each message can be treated as a transaction and the adjacent vehicles can play a role of peers in consensus methods such as Proof of Work (PoW) and Proof of Stake (PoS)
	<xref target="Bitcoin"/>.
	</t>
    </section> <!--  end section "Non-Repudiation"  --> 	

    <section anchor="section:Remote-Attestation"
             title="Remote Attestation">
    <t>
	To prevent a tampering attack by the forgery of firmware/software, 
	a secure booting can be performed by Root of Trust (RoT)
    and a remote attestation can be performed through both the secure booting and RoT 
	<xref target="ID-NSF-Remote-Attestation"/><xref target="ID-Remote-Attestation-Arch"/>. 
	</t>
	
	<t>
	The secure booting can make sure that the bootloader of the vehicle's computing 
	system is a legitimate one with the digital signature of the boofloader by using 
	the RoT of Trusted Platform Module (TPM) <xref target="ISO-IEC-TPM"/> or Google Titan Chip 
	<xref target="Google-Titan-Chip"/>.
	</t>
	
	<t>
	A firmware update service can be made in blockchain technologies
	<xref target="Vehicular-BlockChain"/>. The validity of a brand-new firmware 
	can be proven by a blockchain of the firmware, having the version history.
	Thus, This blockchain can manage a brand-new firmware or software and 
	distribute it in a secure way.
	</t>
	
	<t>
    The remote attestation can monitor the behaviors of the vehicle's computing system
    such that the system is working correctly according to the policy and configuration of
	an administrator or user <xref target="ID-NSF-Remote-Attestation"/><xref target="ID-Remote-Attestation-Arch"/>.
	For this remote attestation, a secure channel should be established between a verifier and a vehicle.	
    </t>
    </section> <!--  end section "Remote Attestation"  --> 	

    <section anchor="section:Privacy"
             title="Privacy">

    <t> To avoid the tracking of a vehicle with its MAC address, a MAC address 
    pseudonym can be used, which updates the MAC address periodically. 
    This update triggers the update of the vehicle's IPv6 address because the 
    IPv6 address of a network interface is generated with the interface's MAC 
    address. The MAC address and IPv6 address can be updated by the guideline 
    in <xref target="RFC4086" /> and a method in <xref target="RFC4941" />, 
    respectively.
    </t>

    <t>
    The update of the MAC address and the IPv6 address affects the on-going
    traffic flow because the source node or destination node of the packets of the 
    flow are identified with the node's MAC address and IPv6 address. This update
    on a vehicle requires the update of the neighbor caches of the vehicle's 
    neighboring vehicles for multihop V2V communications, as well as the neighbor 
    caches of the vehicle's neighboring vehicles and the neighbor tables of an RSU,
    and an MA in multihop V2I communications.
    </t>  
    
    <t>
    Without strong confidentiality, the update of the MAC address and IPv6 address
    can be observed by an adversary, so there is no privacy benefit in tracking 
    prevention. The update needs to be notified to only the trustworthy vehicles, RSU, 
    and MA.
    </t>
   
   <t>
	Also, for the continuity of an end-to-end (E2E) transport-layer (e.g., TCP, UDP, 
    and SCTP) session, the new IP address for the transport-layer session can be 
	notified to an appropriate end point through a mobility management scheme such as
	Mobile IP Protocols (e.g., Mobile IPv6 (MIPv6) <xref target="RFC6275" /> and 
	Proxy MIPv6 (PMIPv6) <xref target="RFC5213" />).
	This mobility management overhead and impact of pseudonyms should be minimized on
    the performance of vehicular networking.
    </t>

    </section> <!--  end section "Privacy"  --> 	
	
</section>	<!--  end section "Security Countermeasures"  --> 	


<!-- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -->

<section anchor="section:Security-Considerations"
				title="Security Considerations">
	<t>
    This document discussed security considerations for IPWAVE security and privacy
    in <xref target="section:Security-Attacks" /> and 
	<xref target="section:Security-Countermeasures" />.
    </t>	
</section>	<!--  end section "Security Considerations"  --> 


<section title="Acknowledgments">
    <t>
	This work was supported by Institute of Information &amp; Communications 
	Technology Planning &amp; Evaluation (IITP) grant funded by the Ministry 
	of Science and ICT (MSIT), Korea, (R-20160222-002755, Cloud based Security 
	Intelligence Technology Development for the Customized Security Service 
	Provisioning).
    </t>
	
    <t>
    This work was supported in part by the MSIT under the Information Technology Research Center (ITRC) support program (IITP-2020-2017-0-01633) supervised by the IITP.
    </t>
</section>


</middle>

<back>
   

<!--
  START: Referenced Papers and Standard Activities
-->


<references title="Normative References">
<!-- START: IETF RFCs and Drafts -->

    <reference anchor="RFC8691">
        <front>
            <title>Basic Support for IPv6 Networks Operating Outside the Context of a Basic Service Set over IEEE Std 802.11						
			</title>
            <author initials="N." surname="Benamar" />
            <author initials="J." surname="Haerri" />
            <author initials="J." surname="Lee" />
            <author initials="T." surname="Ernst" />
            <date month="December" year="2019" />
        </front>
        <seriesInfo name="RFC" value="8691" />
    </reference> 
	
    <reference anchor="ID-IPWAVE-PS">
        <front>
            <title>IPv6 Wireless Access in Vehicular Environments (IPWAVE): Problem Statement and Use Cases</title>
            <author initials="J." surname="Jeong" />
            <date month="July" year="2020" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-ipwave-vehicular-networking-19" />
    </reference> 
	
	<reference anchor="RFC5280">
        <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author initials="D." surname="Cooper" />
            <author initials="S." surname="Santesson" />
            <author initials="S." surname="Farrell" />
            <author initials="S." surname="Boeyen" />
            <author initials="R." surname="Housley" />
            <author initials="W." surname="Polk" />			
            <date month="May" year="2008" />
        </front>
        <seriesInfo name="RFC" value="5280" />
    </reference>  

	<reference anchor="RFC7296">
        <front>
            <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author initials="C." surname="Kaufman" />
            <author initials="P." surname="Hoffman" />
            <author initials="Y." surname="Nir" />
            <author initials="P." surname="Eronen" />
            <author initials="T." surname="Kivinen" />
            <date month="October" year="2014" />
        </front>
        <seriesInfo name="RFC" value="7296" />
    </reference>  

    <reference anchor="RFC4086">
        <front>
            <title>Randomness Requirements for Security</title>
            <author initials="D." surname="Eastlake 3rd" />
            <author initials="J." surname="Schiller" />
            <author initials="S." surname="Crocker" />
            <date month="June" year="2005" />
        </front>
        <seriesInfo name="RFC" value="4086" />
    </reference>  

    <reference anchor="RFC4941">
        <front>
            <title>Privacy Extensions for Stateless Address Autoconfiguration in IPv6</title>
            <author initials="T." surname="Narten" />
            <author initials="R." surname="Draves" />
            <author initials="S." surname="Krishnan" />
            <date month="September" year="2007" />
        </front>
        <seriesInfo name="RFC" value="4941" />
    </reference>  

    <reference anchor="RFC6275">
        <front>
            <title>Mobility Support in IPv6</title>
            <author role='editor' initials="C." surname="Perkins" />
            <author initials="D." surname="Johnson" />
            <author initials="J." surname="Arkko" />
            <date month="July" year="2011" />
        </front>
        <seriesInfo name="RFC" value="6275" />
    </reference>  

    <reference anchor="RFC5213">
        <front>
            <title>Proxy Mobile IPv6</title>
            <author role='editor' initials="S." surname="Gundavelli" />
            <author initials="K." surname="Leung" />
	    <author initials="V." surname="Devarapalli" />
            <author initials="K." surname="Chowdhury" />
            <author initials="B." surname="Patil" />
            <date month="August" year="2008" />
        </front>
        <seriesInfo name="RFC" value="5213" />
    </reference>  
	
<!-- END: IETF RFCs and Drafts -->
</references> <!--  end references "Normative References"  --> 

<references title="Informative References">

    <reference anchor="ID-SDN-IPsec">
        <front>
            <title>Software-Defined Networking (SDN)-based IPsec Flow Protection</title>
            <author initials="R." surname="Marin-Lopez" />
			<author initials="G." surname="Lopez-Millan" />
			<author initials="F." surname="Pereniguez-Garcia" />
            <date month="August" year="2019" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-i2nsf-sdn-ipsec-flow-protection-07" />
    </reference> 

    <reference anchor="ID-NSF-Remote-Attestation">
        <front>
            <title>Remote Attestation Procedures for Network Security Functions (NSFs) through the I2NSF Security Controller</title>
            <author initials="A." surname="Pastor" />
			<author initials="D." surname="Lopez" />
			<author initials="A." surname="Shaw" />
            <date month="February" year="2019" />
        </front>
        <seriesInfo name="Internet-Draft" value="draft-pastor-i2nsf-nsf-remote-attestation-07" />
    </reference>

    <reference anchor="ID-Remote-Attestation-Arch">
        <front>
            <title>Remote Attestation Procedures Architecture</title>
            <author initials="H." surname="Birkholz" />
			<author initials="D." surname="Thaler" />
			<author initials="M." surname="Richardson" />
			<author initials="N." surname="Smith" />
			<author initials="W." surname="Pan" />
            <date month="March" year="2020" />
 
 </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-02" />
    </reference>	
		
<!-- START: Other Standardization Body Documents -->
   <reference anchor="ISO-IEC-TPM">
        <front>
            <title>Information technology - Trusted Platform Module - Part 1: Overview</title>
            <author initials="" surname="ISO/IEC JTC 1" />
            <date month="August" year="2015" />
        </front>
        <seriesInfo name="ISO/IEC" value="11889-1:2015" />
    </reference>

   <reference anchor="Google-Titan-Chip">
        <front>
            <title>Titan in depth: Security in plaintext</title>
            <author initials="" surname="Google" />
            <date month="October" year="2018" />
        </front>
        <seriesInfo name="URL:" value="https://cloud.google.com/blog/products/gcp/titan-in-depth-security-in-plaintext" />
    </reference>

    <reference anchor="ISO-ITS-IPv6">
        <front>
            <title>Intelligent Transport Systems - Communications Access for Land Mobiles (CALM) - IPv6 Networking</title>
            <author initials="" surname="ISO/TC 204" />
            <date month="June" year="2012" />
        </front>
        <seriesInfo name="ISO" value="21210:2012" />
    </reference>

    <reference anchor="DSRC">
        <front>
            <title>Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems - 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <author>
                <organization>
                ASTM International
                </organization>
            </author>
            <date month="October" year="2010" />
        </front>
        <seriesInfo name="ASTM" value="E2213-03(2010)" />
    </reference> 
	
    <reference anchor="WAVE-1609.0">
        <front>
            <title>IEEE Guide for Wireless Access in Vehicular Environments (WAVE) - Architecture</title>
            <author initials="" surname="IEEE 1609 Working Group" />
            <date month="March" year="2014" />
        </front>
        <seriesInfo name="IEEE" value="Std 1609.0-2013" />
    </reference>

    <reference anchor="IEEE-802.11-OCB">
        <front>
            <title>Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    		<author surname="IEEE 802.11 Working Group" />
            <date month="December" year="2016" />
        </front>
    	<seriesInfo name="IEEE" value="Std 802.11-2016" />
    </reference>

   <reference anchor="Bitcoin">
        <front>
            <title>Bitcoin: A Peer-to-Peer Electronic Cash System</title>
            <author initials="S." surname="Nakamoto" />
            <date month="May" year="2009" />
        </front>
        <seriesInfo name="URL:" value="https://bitcoin.org/bitcoin.pdf" />
    </reference>

    <reference anchor="Vehicular-BlockChain">
        <front>
            <title>BlockChain: A Distributed Solution to Automotive Security and Privacy</title>
            <author initials="A." surname="Dorri" />
            <author initials="M." surname="Steger" />
            <author initials="S." surname="Kanhere" />
            <author initials="R." surname="Jurdak" />
            <date month="December" year="2017" />
        </front>
        <seriesInfo name="IEEE" value="Communications Magazine, Vol. 55, No. 12" />
    </reference>

</references> <!--  end references "Informative References"  --> 


<section title="Changes from draft-jeong-ipwave-security-privacy-01">
    <t> The following changes are made from draft-jeong-ipwave-security-privacy-01:
    
    <list style="symbols">
    <t>
    This version has a submission date update to maintain the active status of the draft.
    </t>

    <t>
    This version updates the version numbers of the referenced drafts.
    </t>

    <t>
        In <xref target="section:False-Information-Attack"/>, the paragraphs are updated to more clearly explain the false information attack.
    </t>

    <t>
        In <xref target="section:Denial-of-Service-Attack"/>, the 2nd paragraph is deleted for a better presentation.
    </t>

    <t>
        In <xref target="section:Message-Suspension-Attack"/>, the "multi-hop" is changed to "multihop" for consistency.
    </t>

    <t>
        In <xref target="section:Non-Repudiation"/>, the "sybil attack" is changed to "Sybil attack" for consistency.
    </t>


    </list>
    </t>
</section>


<!--
<section anchor="section:Contributors" title="Contributors">
    <t> 
    This document is a group work of IPWAVE working group.
    </t>
</section>
-->

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>

