Wireless channel-based message authentication

Inter-vehicle communication has attracted a lot of attention in the past. A major concern is the security and especially the integrity and authenticity of messages. Current standards and proposals in literature leverage asymmetric cryptographic mechanisms to achieve this, which is costly both in terms of consumed computational power, bandwidth, and introduced delay. We present a novel idea to use physical characteristics of the wireless channel to verify subsequent messages after initial trust in a first message has been established cryptographically. In this paper, we sketch the concept and provide a first evaluation on its potential for saving named resources.

[1]  Frank Kargl,et al.  Misbehavior detection in vehicular ad-hoc networks , 2013 .

[2]  Ashish Vulimiri Misbehavior Detection in Vehicular Ad Hoc Networks , 2009 .

[3]  Daniel Maier,et al.  Deterministic models of the physical layer through signal simulation , 2015, SimuTools.

[4]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[5]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[6]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[7]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[8]  Sorin A. Huss,et al.  Integrating Secure Beamforming into Car-to-X Architectures , 2011 .

[9]  Tamer A. ElBatt,et al.  MIMO VANETs: Research challenges and opportunities , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[10]  Robert J. Piechocki,et al.  Spatial Diversity for IEEE 802.11p Post-Crash Message Dissemination in a Highway Environment , 2010, 2010 IEEE 71st Vehicular Technology Conference.

[11]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[12]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[13]  Frank Slomka,et al.  MIMO-enabling PHY layer enhancement for vehicular ad-hoc networks , 2015, 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[14]  Matthias Hollick,et al.  How did you get here? PHY-layer path signatures , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[15]  Sorin A. Huss,et al.  Verifying Mobility Data under Privacy Considerations in Car-to-X Communication , 2010 .

[16]  Elmar Schoch,et al.  On the efficiency of secure beaconing in VANETs , 2010, WiSec '10.

[17]  Panagiotis Papadimitratos,et al.  SEVECOM - Secure Vehicle Communication , 2006 .

[18]  Frank Slomka,et al.  An approach for the integration of smart antennas in the design and simulation of vehicular ad-hoc networks , 2012, The First International Conference on Future Generation Communication Technologies.

[19]  Mary Ann Ingram,et al.  Medium access control in ad hoc networks with MIMO links: optimization considerations and algorithms , 2004, IEEE Transactions on Mobile Computing.