Secure Inter Vehicle Communications

In this paper we present a security protocol to be used in inter-vehicle communication. We propose an architecture for inter-vehicle networks along with protocols that can be used to establish security. In our architecture we use cellular networks to enhance the security of inter-vehicle networks.

[1]  P. Morsink CARTALK 2000 : Development of a cooperative ADAS based on vehicle-to-vehicle communication , 2003 .

[2]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[3]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[4]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[5]  Wu-chi Feng,et al.  GPS-based message broadcasting for inter-vehicle communication , 2000, Proceedings 2000 International Conference on Parallel Processing.

[6]  L. Fratta,et al.  Architectural and technical aspects for Ad Hoc Networks based on UTRA TDD for Inter-Vehicle Communication , 2003 .

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  A. Mehrotra,et al.  Mobility and security management in the GSM system and some proposed future improvements , 1998, Proc. IEEE.

[9]  Xuemin Shen,et al.  PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[10]  Ben Lynn,et al.  Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.

[11]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  K. Tokuda,et al.  DOLPHIN for inter-vehicle communications system , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).

[13]  Hermann Rohling,et al.  A SELF-ORGANIZED RADIO NETWORK FOR AUTOMOTIVE APPLICATIONS , 2001 .

[14]  Martin Mauve,et al.  Challenge: peers on wheels - a road to new traffic information systems , 2007, MobiCom '07.

[15]  Jin Chun IEEE802.11p:Wireless Access in Vehicular Environments , 2009 .

[16]  Arne Svensson,et al.  Towards a Wireless Network for Traffic Safety Applications , 2005 .

[17]  Chi-Chun Lo,et al.  Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..

[18]  Jaehyun Kim,et al.  Performance analysis on mobility of ad-hoc network for inter-vehicle communication , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[19]  Ranjeet Singh Tomar,et al.  Position Based Routing for Mobile Ad Hoc Networks , 2008, 2008 Second UKSIM European Symposium on Computer Modeling and Simulation.

[20]  Prashant Krishnamurthy Information Dissemination and Information Assurance in Vehicular Networks: A Survey , 2008 .

[21]  Jun Luo,et al.  A Survey of Inter-Vehicle Communication , 2004 .

[22]  Hermann Rohling,et al.  Synchronization in ad hoc networks based on UTRA TDD , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[23]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[24]  Pin-Han Ho,et al.  TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.

[25]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[26]  Leonard Barolli,et al.  Secure emergency communication of cellular phones in ad hoc mode , 2007, Ad Hoc Networks.

[27]  Michael Rohs,et al.  The smart phone: a ubiquitous input device , 2006, IEEE Pervasive Computing.

[28]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[29]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[30]  A. Taguchi,et al.  Super-resolution of digital images with data-dependent biasing , 2004, Proceedings of 2004 International Symposium on Intelligent Signal Processing and Communication Systems, 2004. ISPACS 2004..

[31]  Yu-Chee Tseng,et al.  The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.

[32]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[33]  Jing Tian,et al.  Routing approach in CarTALK 2000 project , 2003 .

[34]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..