Results 1 - 10
of
51
Secure vehicular communication systems: Design and architecture,”
- IEEE Commun. Mag.,
, 2008
"... Abstract-Significant developments took place over the past few years in the area of vehicular communication (VC) systems. Now, it is well-understood in the community that security and protection of private user information are a prerequisite for the deployment of the technology. This is so exactly ..."
Abstract
-
Cited by 47 (2 self)
- Add to MetaCart
(Show Context)
Abstract-Significant developments took place over the past few years in the area of vehicular communication (VC) systems. Now, it is well-understood in the community that security and protection of private user information are a prerequisite for the deployment of the technology. This is so exactly because the benefits of VC systems, with the mission to enhance transportation safety and efficiency, are at stake. Without the integration of strong and practical security and privacy enhancing mechanisms, VC systems could be disrupted or disabled even by relatively unsophisticated attackers. We address this problem within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution. We present our results in a set of two papers in this issue. In this first one, we analyze threats and types of adversaries, we identify security and privacy requirements, and present a spectrum of mechanisms to secure VC systems. We provide a solution that can be quickly adopted and deployed. Our progress towards implementation of our architecture, along with results on the performance of the secure VC system, are presented in the second paper. We conclude with an investigation, based on current results, of upcoming elements to be integrated in our secure VC architecture.
Providing VANET Security Through Active Position Detection
"... Vehicle position is one of the most valuable pieces of information in a Vehicular Adhoc NETwork (VANET). The main contribution of this work is a novel approach to enhancing position security in VANETs. We achieve local security by enlisting the help of on-board radar to detect neighboring vehicles a ..."
Abstract
-
Cited by 45 (12 self)
- Add to MetaCart
(Show Context)
Vehicle position is one of the most valuable pieces of information in a Vehicular Adhoc NETwork (VANET). The main contribution of this work is a novel approach to enhancing position security in VANETs. We achieve local security by enlisting the help of on-board radar to detect neighboring vehicles and to confirm their announced coordinates. Local security is extended to achieve global security by using preset position-based groups to create a communication network and by using a dynamic challenging mechanism to confirm remote position information. Our solution is predicated on the widely accepted assumption that the vast majority of vehicles are honest and behave responsively. Extensive simulations confirm the quality of the proposed solution by measuring how fast compromised vehicles can be detected under various conditions.
Design and Analysis of a Lightweight Certificate Revocation Mechanism for VANET
"... In this paper, we propose a lightweight mechanism for revoking security certificates appropriate for the limited bandwidth and hardware cost constraints of a VANET. A Certificate Authority (CA) issues certificates to trusted nodes, i.e., vehicles. If the CA looses trust in a node (e.g., due to evide ..."
Abstract
-
Cited by 22 (2 self)
- Add to MetaCart
(Show Context)
In this paper, we propose a lightweight mechanism for revoking security certificates appropriate for the limited bandwidth and hardware cost constraints of a VANET. A Certificate Authority (CA) issues certificates to trusted nodes, i.e., vehicles. If the CA looses trust in a node (e.g., due to evidence of malfunction or malicious behavior), the CA must promptly revoke the certificates of the distrusted node. To distribute revocation information quickly even during incremental deployment, we propose CAs use Certificate Revocation Lists (CRLs). The CRL should be composed in a secure manner, and it should be exchanged in a way such that the CRL is both quickly and widely distributed. Laberteaux et al. [1] proposed a mechanism for the quick distribution of CRL updates that also covers a wide area by using car-to-car (C2C) communication. However, this revocation process, which involves both the CA and VANET nodes, must conform to the aforementioned bandwidth and hardware restrictions. In this paper, we present mechanisms that achieve the goals of reduced CRL size, a computationally efficient mechanism for determining if a certificate is on the CRL, and a lightweight mechanism for exchanging CRL updates. Additionally, we present a formal proof of the security of our mechanism for reducing the size of CRLs. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: General—Security and protections, (e.g., firewalls); C.2.1 [Computer-Communication
An Efficient Message Authentication Scheme for Vehicular Communications
"... Abstract—In this paper, we introduce a novel roadside unit (RSU)-aided message authentication scheme named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. In addition, RAISE adopts the k-anonymity prope ..."
Abstract
-
Cited by 21 (3 self)
- Add to MetaCart
(Show Context)
Abstract—In this paper, we introduce a novel roadside unit (RSU)-aided message authentication scheme named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. In addition, RAISE adopts the k-anonymity property for preserving user privacy, where a message cannot be associated with a common vehicle. In the case of the absence of an RSU, we further propose a supplementary scheme, where vehicles would cooperatively work to probabilistically verify only a small percentage of these message signatures based on their own computing capacity. Extensive simulations are conducted to validate the proposed scheme. It is demonstrated that RAISE yields a much better performance than previously reported counterparts in terms of message loss ratio (LR) and delay. Index Terms—Cooperation, privacy, security, vehicular communications.
Secure Location Verification for Vehicular Ad-Hoc Networks,”
- Proc. IEEE Globecom,
, 2008
"... ..."
(Show Context)
Providing Location Security in Vehicular Ad-hoc Networks
"... It is fair to say that most, if not all, Vehicular Ad-hoc Networks (VANET) applications rely on accurate location information. It is, therefore, imperative to provide mechanisms that ensure the integrity, availability, and confidentiality of location information. In this work, we present a number of ..."
Abstract
-
Cited by 13 (3 self)
- Add to MetaCart
(Show Context)
It is fair to say that most, if not all, Vehicular Ad-hoc Networks (VANET) applications rely on accurate location information. It is, therefore, imperative to provide mechanisms that ensure the integrity, availability, and confidentiality of location information. In this work, we present a number of location security mechanisms specifically designed for VANET. Proposed mechanisms for location integrity range from the use of on-board radar devices and GPS to simpler methods that rely on information fusion. We also address ways to enhance the availability of location information by selecting and maintaining stable routing paths. Finally, we discuss a mechanism that promotes location confidentiality through encryption/decryption and access control using geographical information. Our location information security mechanisms meet the requirements of the Confidentiality, Integrity, and Availability (CIA) information security model. I.
An identity-based security system for user privacy in vehicular ad hoc networks
- Parallel and Distributed Systems, IEEE Transactions on
, 2010
"... Abstract—Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend VANET systems against misbehavior, in order to ensure correct and smooth operations of the network. In this paper, we propose a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality. Moreover, we propose a privacy-preserving defense technique for network authorities to handle misbehavior in VANET access, considering the challenge that privacy provides avenue for misbehavior. The proposed system employs an identity-based cryptosystem where certificates are not needed for authentication. We show the fulfillment and feasibility of our system with respect to the security goals and efficiency.
On the Structure and Evolution of Vehicular Networks
"... Abstract—Vehicular ad hoc networks have emerged recently as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained and high mobility of the vehicles, their unbounded power source, and the emergence of roadside wireless infrastru ..."
Abstract
-
Cited by 8 (4 self)
- Add to MetaCart
(Show Context)
Abstract—Vehicular ad hoc networks have emerged recently as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained and high mobility of the vehicles, their unbounded power source, and the emergence of roadside wireless infrastructures make VANETs a challenging research topic. A key to the development of protocols for intervehicle communication and services lies in the knowledge of the topological characteristics of the VANET communication graph. This article provides answers to the general question: how does a VANET communication graph look like over time and space? This study is the first one that examines a very large-scale VANET graph and conducts a thorough investigation of its topological characteristics using several metrics, not examined in previous studies. Our work characterizes a VANET graph at the connectivity (link) level, quantifies the notion of “qualitative ” nodes as required by routing and dissemination protocols, and examines the existence and evolution of communities (dense clusters of vehicles) in the VANET. Several latent facts about the VANET graph are revealed and incentives for their exploitation in protocol design are examined. I.
SAT: Situation-Aware Trust Architecture for Vehicular Networks
, 2008
"... Establishing trust in vehicular networks is a critical but also difficult task. In this position paper, we present a new trust architecture and model- Situation-Aware Trust (SAT)- to address several important trust issues in vehicular networks that we believe are essential to overcome the weaknesses ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
(Show Context)
Establishing trust in vehicular networks is a critical but also difficult task. In this position paper, we present a new trust architecture and model- Situation-Aware Trust (SAT)- to address several important trust issues in vehicular networks that we believe are essential to overcome the weaknesses of the current vehicular network security and trust models. Our model also strengthens the tie between Internet infrastructure. The new SAT includes three main components: (a) an attribute based policy control model for highly dynamic communication environments, (b) a proactive trust model to build trust among vehicles and prevent the breakage of the existing trust, and (c) a social network based trust system to enhance trust and to allow the set up of a decentralized trust framework when the vehicular network is under infrastructure failure or under attacks.
EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks
"... Abstract—It is well recognized that security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the critical security issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from jeopardizing the safety of other veh ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
(Show Context)
Abstract—It is well recognized that security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the critical security issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from jeopardizing the safety of other vehicles. In this paper, we propose an efficient decentralized revocation (EDR) protocol based on a novel pairing-based threshold scheme and a probabilistic key distribution technique. Because of the decentralized nature of the EDR protocol, it enables a group of legitimate vehicles to perform fast revocation of a nearby misbehaving vehicle. Consequently, the EDR protocol improves the safety levels in VANETs as it diminishes the revocation vulnerability window existing in conventional certificate revocation lists (CRLs). By conducting detailed performance evaluation, the EDR protocol is demonstrated to be reliable, efficient, and scalable. Index Terms—Ad hoc, decentralized, revocation protocol, vehicular networks. I.