Authentication vs. Privacy within Vehicular Ad Hoc Networks

Security and protection of private user information are a prerequisite for the deployment of the vehicular network technologies. Nevertheless, the establishment of a secure communication architecture within vehicular ad hoc networks address special challenges, due to the characteristic and speciflcities of such environment (high dynamic and mobility of nodes, high rate of topology changes, high variability in nodes density and neighborhood, broadcast/geocast communication nature ...). Vehicular ad hoc networks (VANETs) are therefore target of several malicious attacks (internal or external), in addition to unintentional faults and errors. In this context, I present in this paper a novel security communication architecture dedicated to operate within VANETs, ensuring authentication of vehicles and revocation of intrusted ones while guarantying privacy of drivers identities. The safety and e‐ciency of my security architecture is validated through its formal veriflcation using the security protocols verifler tool AVISPA (Automated Validation of Internet Security Protocols and Applications).

[1]  Fan Bai,et al.  Towards Characterising and Classifying Communication–based Automotive Applications from a Wireless Networking Perspective , 2012 .

[2]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[3]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[4]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[5]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[6]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[7]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[8]  Nai-Wei Lo,et al.  A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[9]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[10]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[11]  Yacine Challal,et al.  Hi-KD : Hash-based hierarchical Key Distribution for Group Communication , 2005 .

[12]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[13]  Haiyun Luo,et al.  Ad Hoc Network Security , 2004, Mobile Computing Handbook.

[14]  S. Eichler,et al.  Secure routing in a vehicular ad hoc network , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[15]  Bertrand Ducourthial,et al.  Sybil Nodes Detection Based on Received Signal Strength Variations within VANET , 2009, Int. J. Netw. Secur..

[16]  Olivier Festor,et al.  Group Key Management in MANETs , 2008, Int. J. Netw. Secur..

[17]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[18]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[19]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[20]  M. Shawky,et al.  Localization verification and distinguishability degree in wireless networks using received signal strength variations , 2007, 2007 International Symposium on Communications and Information Technologies.

[21]  Yueh-Min Huang,et al.  A novel secure communication scheme in vehicular ad hoc networks , 2008, Comput. Commun..

[22]  Victor C. M. Leung,et al.  Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[23]  Adrian Perrig,et al.  Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[24]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  Enrico Minack Evaluation of the influence of channel conditions on Car2X Communication , 2005 .

[27]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[28]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[29]  Lothar Stibor,et al.  Neighborhood evaluation of vehicular ad-hoc network using IEEE 802.11p , 2007 .