Adaptive security provisioning for vehicular safety applications

Vehicular ad hoc network provides safety applications for next generation intelligent transport systems. By periodically transmitting mobility information in basic safety messages (BSMs), vehicles get an overview of the neighbourhood. As applications involving vehicular networks impact human safety, reliability of BSMs is a key requirement, which however is a challenging task in heavy traffic scenarios where many BSMs are queued up simultaneously for signature verification. This results in long verification delays for many critical BSMs from nearby vehicles. To overcome this challenge, we propose two adaptive security mechanisms in this paper that can be used by the ITS applications to enhance their QoS and maintain good level of security. The first technique is a receiver-oriented technique that uses channel aware mechanism to prioritise the signature verification of BSMs from closer neighbours. The second technique is transmitter based that can adaptively select the best security level for BSMs according to cryptographic loss rate. Simulation results verify the performance enhancement achieved by the proposed framework in terms of several safety awareness metrics as compared with the existing schemes.

[1]  Waqas Aman,et al.  Managing security trade-offs in the Internet of Things using adaptive security , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[2]  Fredrik Tufvesson,et al.  Path Loss Modeling for Vehicle-to-Vehicle Communications , 2011, IEEE Transactions on Vehicular Technology.

[3]  Frank Kargl,et al.  The impact of security on cooperative awareness in VANET , 2013, 2013 IEEE Vehicular Networking Conference.

[4]  Jamil Y. Khan,et al.  Distributed spatial reuse distance control for basic safety messages in SDMA-based VANETs , 2015, Veh. Commun..

[5]  Elyes Ben Hamida,et al.  On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.

[6]  Elyes Ben Hamida,et al.  Measuring safety awareness in cooperative ITS applications , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[7]  Jelena V. Misic,et al.  Relevance-based verification of VANET safety messages , 2012, 2012 IEEE International Conference on Communications (ICC).

[8]  Elyes Ben Hamida,et al.  Towards extended safety in connected vehicles , 2013, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013).

[9]  Jelena V. Misic,et al.  Location-based anonymous authentication for vehicular communications , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[10]  Naixue Xiong,et al.  Scheduling security-critical multimedia applications in heterogeneous networks , 2011, Comput. Commun..

[11]  Jamil Y. Khan,et al.  Joint space-division multiple access and adaptive rate control for basic safety messages in VANETs , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[12]  Xuemin Shen,et al.  BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.

[13]  Mohammad S. Obaidat,et al.  Vehicular Security Through Reputation and Plausibility Checks , 2014, IEEE Systems Journal.

[14]  Elyes Ben Hamida,et al.  Investigating the impact of human activity on the performance of wireless networks — An experimental approach , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[15]  Mario Gerla,et al.  Vehicular cloud networking: architecture and design principles , 2014, IEEE Communications Magazine.

[16]  Chunxiao Chigan,et al.  On Resource-Aware Message Verification in VANETs , 2010, 2010 IEEE International Conference on Communications.

[17]  Antonio Cicchetti,et al.  Design of Adaptive Security Mechanisms for Real-Time Embedded Systems , 2012, ESSoS.

[18]  Jamil Y. Khan,et al.  A geocasting technique in an IEEE802.11p based vehicular ad hoc network for road traffic management , 2011, 2011 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[19]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[20]  Elyes Ben Hamida,et al.  Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice , 2016, Sensors.

[21]  Yue Zhao,et al.  Yinyang K-Means: A Drop-In Replacement of the Classic K-Means with Consistent Speedup , 2015, ICML.

[22]  Mary Inaba,et al.  Applications of weighted Voronoi diagrams and randomization to variance-based k-clustering: (extended abstract) , 1994, SCG '94.

[23]  Elyes Ben Hamida,et al.  Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .

[24]  Steven Gordon,et al.  Selecting basic safety messages to verify in VANETs using zone priority , 2014, The 20th Asia-Pacific Conference on Communication (APCC2014).

[25]  Elyes Ben Hamida,et al.  Performance impact of security on cooperative awareness in dense urban vehicular networks , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[26]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[27]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[28]  Elyes Ben Hamida,et al.  Adaptive security mechanisms for safety applications in Internet of Vehicles , 2016, 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[29]  Mate Boban,et al.  Experimental study on the impact of vehicular obstructions in VANETs , 2010, 2010 IEEE Vehicular Networking Conference.