The impact of ECDSA in a VANET routing service: Insights from real data traces

Abstract Both the WAVE IEEE 1609.2 standard in USA and the ETSI ITS security standards in Europe rely on the Elliptic Curve Digital Signature Algorithm (ECDSA) to authenticate messages exchanged among vehicles. Although being faster than other equivalent algorithms, the ECDSA computational cost nevertheless affects the message validation throughput. Even worse, the number of messages that a device has to authenticate may easily exhaust its computational limits. In this article, we evaluated the impact caused by ECDSA authentication of messages of the multi-hop routing control plane used in a real Vehicular Ad Hoc Network (VANET). Such control plane uses periodic vicinity updates to keep accurate, distributed routing paths, and ECDSA-based validation delays may force to discard many of such updates. To perform the evaluation of the impact imposed by ECDSA we considered the multiple curve parameters associated to WAVE and ETSI ITS, their implementation by different cryptographic libraries and their performance in distinct hardware. We took as reference for traffic to be authenticated with ECDSA a day-long set of messages of a VANET routing control plane. These messages were inferred from connectivity status samples from all mobile nodes of a real VANET. Emulation results with those messages show that, without high-end computing devices, ECDSA authentication would have a substantial negative impact in the routing service of the tested VANET.

[1]  Klara Nahrstedt,et al.  FADEC: Fast authentication for dynamic electric vehicle charging , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[2]  Muhammad Alam,et al.  Implementation and Analysis of IEEE and ETSI Security Standards for Vehicular Communications , 2018, Mob. Networks Appl..

[3]  Xiuqi Li,et al.  When Smart Phone Meets Vehicle: A New On-Board Unit Scheme for VANETs , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[4]  Jonathan Petit,et al.  Analysis of ECDSA Authentication Processing in VANETs , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[5]  Susana Sargento,et al.  Parked Cars are Excellent Roadside Units , 2017, IEEE Transactions on Intelligent Transportation Systems.

[6]  Miguel Sepulcre,et al.  Why 6 Mbps is Not (Always) the Optimum Data Rate for Beaconing in Vehicular Networks , 2017, IEEE Transactions on Mobile Computing.

[7]  Azzedine Boukerche,et al.  Data communication in VANETs: Protocols, applications and challenges , 2016, Ad Hoc Networks.

[8]  Craig Costello,et al.  A brief discussion on selecting new elliptic curves , 2015 .

[9]  Ke Xu,et al.  The Implementation and Performance Evaluation of WAVE Based Secured Vehicular Communication System , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[10]  Panagiotis Papadimitratos,et al.  Impact of vehicular communications security on transportation safety , 2008, IEEE INFOCOM Workshops 2008.

[11]  S. A. Kulkarni,et al.  A secure message authentication scheme for VANET using ECDSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[12]  Abdulmotaleb El-Saddik,et al.  How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey , 2015, ACM Comput. Surv..

[13]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[14]  Yih-Chun Hu,et al.  Real-World VANET Security Protocol Performance , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[15]  Asif Ali Wagan,et al.  Security framework for low latency vanet applications , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).

[16]  Indrajit Bhattacharya,et al.  An Efficient and Secured Routing Protocol for VANET , 2014, FICTA.

[17]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[18]  Elaine B. Barker Recommendation for Key Management - Part 1 General , 2014 .

[19]  Claudio Casetti,et al.  The Role of Parked Cars in Content Downloading for Vehicular Networks , 2014, IEEE Transactions on Vehicular Technology.

[20]  Susana Sargento,et al.  PortoLivingLab: An IoT-Based Sensing Platform for Smart Cities , 2018, IEEE Internet of Things Journal.

[21]  Sebastian Bittl,et al.  Security Overhead and Its Impact in VANETs , 2015, 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC).

[22]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[23]  Susana Sargento,et al.  loop - A Trace-based Emulator for Vehicular Ad Hoc Networks , 2018, SIMULTECH.

[24]  Susana Sargento,et al.  TROPHY: Trustworthy VANET routing with group authentication keys , 2018, Ad Hoc Networks.

[25]  Amina Bendouma,et al.  RSU authentication by aggregation in VANET using an interaction zone , 2017, 2017 IEEE International Conference on Communications (ICC).

[26]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[27]  Günter Schäfer,et al.  An approach for selective beacon forwarding to improve cooperative awareness , 2010, 2010 IEEE Vehicular Networking Conference.