Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks (VANET)

Traditionally traffic safety was addressed by traffic awareness and passive safety measures like solid chassis, seat belts, air bags etc. With the recent breakthroughs in the domain of mobile ad hoc networks, the concept of vehicular ad hoc networks (VANET) was realised. Safety messaging is the most important aspect of VANETs, where the passive safety (accident readiness) in vehicles was reinforced with the idea of active safety (accident prevention). In safety messaging vehicles will message each other over wireless media, updating each other on traffic conditions and hazards. Security is an important aspect of safety messaging, that aims to prevent participants spreading wrong information in the network that are likely to cause mishaps. Equally important is the fact that secure communication protocols should satisfy the communication constraints of VANETs. VANETs are delay intolerant. Features like high speeds, large network size, constant mobility etc. induce certain limitations in the way messaging can be carried out in VANETs. This thesis studies the impact of total message size on VANET messaging system performance, and conducts an analysis of secure communication protocols to measure how they perform in a VANET messaging system.

[1]  Elmar Schoch,et al.  Security Engineering for VANETs , 2006 .

[2]  Adrian Perrig,et al.  TESLA Broadcast Authentication , 2003 .

[3]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[4]  FederrathHannes,et al.  A privacy aware and efficient security infrastructure for vehicular ad hoc networks , 2008 .

[5]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[6]  Yu-Chee Tseng,et al.  The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.

[7]  Panagiotis Papadimitratos,et al.  Impact of vehicular communications security on transportation safety , 2008, IEEE INFOCOM Workshops 2008.

[8]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[9]  Maxim Raya,et al.  Certificate Revocation in Vehicular Networks , 2006 .

[10]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[11]  Panagiotis Papadimitratos,et al.  VANET Connectivity Analysis , 2009, ArXiv.

[12]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[13]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[14]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[15]  Hannes Hartenstein,et al.  Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks , 2004, VANET '04.

[16]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[17]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[18]  Mihir Bellare,et al.  Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.

[19]  Wenhui Zhang,et al.  Car-2-Car Communication Consortium - Manifesto , 2007 .

[20]  Huirong Fu,et al.  Privacy Issues of Vehicular Ad-Hoc Networks , 2010 .

[21]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[22]  Raja Sengupta,et al.  Vehicle-to-vehicle safety messaging in DSRC , 2004, VANET '04.

[23]  S. Eichler,et al.  Secure routing in a vehicular ad hoc network , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[24]  Kenneth P. Laberteaux,et al.  STRONG VANET SECURITY ON A BUDGET , 2006 .

[25]  Elmar Schoch,et al.  Communication patterns in VANETs , 2008, IEEE Communications Magazine.

[26]  E. Schoch,et al.  Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[27]  Maxim Raya,et al.  Revocation games in ephemeral networks , 2008, CCS.

[28]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[29]  Bernd Bochow,et al.  "NoW - Network on Wheels" : Project Objectives, Technology and Achievements , 2008 .

[30]  James A. Freebersyser,et al.  A DoD perspective on mobile Ad hoc networks , 2001 .

[31]  Hovav Shacham,et al.  Group signatures with verifier-local revocation , 2004, CCS '04.

[32]  Tansu Alpcan,et al.  Centrality Analysis in Vehicular Networks , 2008 .

[34]  Panagiotis Papadimitratos,et al.  Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems , 2020, IEEE Transactions on Mobile Computing.

[35]  Panagiotis Papadimitratos,et al.  SEVECOM - Secure Vehicle Communication , 2006 .

[36]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[37]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[38]  Chris C. Kellum Six Application Mechanisms Required for Wireless Access in Vehicular Environments (WAVE) , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[39]  Michel Dubois,et al.  Performance Evaluation of the , 1995 .

[40]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[41]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[42]  A. Festag,et al.  Security Architecture for Vehicular Communication , 2007 .

[43]  Hariharan Krishnan,et al.  Performance evaluation of safety applications over DSRC vehicular ad hoc networks , 2004, VANET '04.

[44]  Levente Buttyán,et al.  On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.

[45]  Felix Schmidt-Eisenlohr,et al.  IEEE 802.11-based one-hop broadcast communications: understanding transmission success and failure under different radio propagation environments , 2006, MSWiM '06.

[46]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[47]  Katrin Bilstrup A survey regarding wireless communication standards intended for a high-speed vehicle environment , 2007 .

[48]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[49]  Elmar Schoch,et al.  On the security of context-adaptive information dissemination , 2008, Secur. Commun. Networks.

[50]  Nitin H. Vaidya,et al.  A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[51]  Maxim Raya,et al.  Securing Vehicular Networks , 2006, INFOCOM 2006.

[52]  Panagiotis Papadimitratos,et al.  Report on the "secure vehicular communications: results and challenges ahead" workshop , 2008, MOCO.

[53]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[54]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[55]  Joseph Y. Halpern,et al.  Gossip-based ad hoc routing , 2002, IEEE/ACM Transactions on Networking.

[56]  Tim Leinmüller,et al.  A GLOBAL TREND FOR CAR 2 X COMMUNICATION , 2008 .

[57]  Florian Dötzer,et al.  Privacy Issues in Vehicular Ad Hoc Networks , 2005, Privacy Enhancing Technologies.

[58]  Sidi-Mohammed Senouci,et al.  An Improved Vehicular Ad Hoc Routing Protocol for City Environments , 2007, 2007 IEEE International Conference on Communications.

[59]  Hazem H. Refai,et al.  Performance and Reliability of DSRC Vehicular Safety Communication: A Formal Analysis , 2009, EURASIP J. Wirel. Commun. Netw..

[60]  Markus Jakobsson,et al.  Stealth attacks in vehicular technologies , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[61]  Michel Barbeau,et al.  Threats to Security in DSRC/WAVE , 2006, ADHOC-NOW.

[62]  Michael A. Shulman,et al.  Vehicle safety communications in the United States , 2007 .

[63]  Jun Luo,et al.  A Survey of Inter-Vehicle Communication , 2004 .

[64]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[65]  Kartik Gopalan,et al.  Urban Mobility Models for VANETs , 2006 .

[66]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[67]  Panagiotis Papadimitratos,et al.  Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[68]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[69]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[70]  Ingrid Moerman,et al.  An overview of mobile ad hoc networks: applications and challenges , 2004 .

[71]  Stephan Eichler,et al.  Performance Evaluation of the IEEE 802.11p WAVE Communication Standard , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[72]  Thomas Nowey,et al.  Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[73]  H. Rohling,et al.  Congestion control in vehicular ad hoc networks , 2005, IEEE International Conference on Vehicular Electronics and Safety, 2005..

[74]  Jean-Pierre Hubaux,et al.  Towards Self-Organized Location Privacy in Mobile Networks , 2008 .

[75]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[76]  Victor C. M. Leung,et al.  Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[77]  Panagiotis Papadimitratos,et al.  Secure Position-Based Routing for VANETs , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[78]  Hannes Federrath,et al.  A privacy aware and efficient security infrastructure for vehicular ad hoc networks , 2008, Comput. Stand. Interfaces.

[79]  S. Eichler Security Challenges in MANET-based Telematics Environments , 2004 .

[80]  Hannes Hartenstein,et al.  FleetNet: Bringing Car-to-Car Communication into the Real World , 2004 .

[81]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).