Proactive Certificate Distribution for PKI in VANET

Vehicular Ad-Hoc Networks (VANET) are the creation of several vehicles communicating with each other in order to create a network capable of communication and data exchange. One of the most promising methods for security and trust amongst vehicular networks is the usage of Public Key Infrastructure (PKI). However, current implementations of PKI as a security solution for determining the validity and authenticity of vehicles in a VANET is not efficient due to the usage of large amounts of delay and computational overhead. In this paper, we investigate the potential of PKI when predictively and preemptively passing along certificates to roadside units (RSU) in an effort to lower delay and computational overhead in a dynamic environment. We look to accomplish this through utilizing fog computing and propose a new protocol to pass certificates along the projected path.

[1]  H. T. Mouftah,et al.  Effective public key infrastructure for vehicle-to-grid network , 2014, DIVANet '14.

[2]  Sudip Misra,et al.  Guide to Wireless Ad Hoc Networks , 2009, Computer Communications and Networks.

[3]  Khalil El-Khatib,et al.  Privacy representation in VANET , 2013, DIVANet '13.

[4]  Jie Wu,et al.  Mobility Management in MANETs: Exploit the Positive Impacts of Mobility , 2009, Guide to Wireless Ad Hoc Networks.

[5]  Hyun-Chul Kim,et al.  A Design of One-Time Password Mechanism Using Public Key Infrastructure , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[6]  E. Munivel,et al.  Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).

[7]  Sherali Zeadally,et al.  A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks , 2008, Comput. Commun..

[8]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[9]  Ali Aydın Selçuk,et al.  Public Key Infrastructure , 2011, Encyclopedia of Cryptography and Security.

[10]  LuRongxing,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks , 2010 .

[11]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[12]  Robert Charette Every move you make , 2009, IEEE Spectrum.

[13]  Depeng Jin,et al.  Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.

[14]  Maged Hamada Ibrahim,et al.  Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..

[15]  Karim Emara,et al.  Vehicle tracking using vehicular network beacons , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[16]  Jitendra Bhatia,et al.  REVIEW ON VARIOUS SECURITY THREATS & SOLUTIONS AND NETWORK CODING BASED SECURITY APPROACH FOR VANET , 2013 .

[17]  Azzedine Boukerche,et al.  A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.

[18]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[19]  Rajkumar Buyya,et al.  Feasibility of Fog Computing , 2017, Scalable Computing and Communications.

[20]  K. V. Prema,et al.  Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies , 2012, ArXiv.

[21]  Paolo Bellavista,et al.  Dissemination and Harvesting of Urban Data Using Vehicular Sensing Platforms , 2009, IEEE Transactions on Vehicular Technology.

[22]  Injoo Kim,et al.  Security issues in vehicular networks , 2013, The International Conference on Information Networking 2013 (ICOIN).

[23]  Jalel Ben-Othman,et al.  Solution of detecting jamming attacks in vehicle ad hoc networks , 2013, MSWiM.

[24]  Azzedine Boukerche,et al.  Securing vehicular ad hoc networks with mean field game theory , 2013, DIVANet '13.

[25]  Azzedine Boukerche,et al.  A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.

[26]  Hyoung-Kee Choi,et al.  A practical security framework for a VANET-based entertainment service , 2009, PM2HW2N '09.

[27]  Khalil El-Khatib,et al.  Paving the way for Intelligent Transport Systems (ITS): Privacy Implications of Vehicle Infotainment and Telematics Systems , 2016, DIVANet@MSWiM.

[28]  Azzedine Boukerche,et al.  Trust based security enhancements for vehicular ad hocnetworks , 2014, DIVANet '14.

[29]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[30]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[31]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[32]  Andreas Pitsillides,et al.  Security evaluation methodology for intrusion recovery protocols in wireless sensor networks , 2012, MSWiM '12.