A Survey on Secure Safety Applications in VANET

Providing an efficient secure authentication scheme in safety applications in Vehicular Ad-hoc Networks (VANETs) is a challenging issue. This is because these applications need to react to their messages, in a timely manner, before their respective deadlines. Preserving the privacy of the exchanged messages is also important since these messages include sensitive information, such as geographical locations. In this paper, we review the existing schemes that aim to meet the requirements of security and privacy. Then, we specify these requirements with a view to design an efficient scheme for secure real-time applications in VANET environments.

[1]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[2]  S. Supriya,et al.  EFFICIENT PRIVACY PRESERVING AUTHENTICATION FOR VEHICULAR AD-HOC NETWORKS , 2015 .

[3]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[4]  Jun Pang,et al.  A Group Signature Based Electronic Toll Pricing System , 2011, 2012 Seventh International Conference on Availability, Reliability and Security.

[5]  Zhendong Ma,et al.  Privacy Requirements in Vehicular Communication Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[6]  Michael Maile,et al.  Vehicle Safety Communications – Applications (VSC-A) Final Report: Appendix Volume 3 Security , 2011 .

[7]  Sudip Misra,et al.  Security in Vehicular Ad Hoc Networks , 2016 .

[8]  Ai-Chun Pang,et al.  Efficient pseudonym changing schemes for location privacy protection in VANETs , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[9]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[10]  Jian Shen,et al.  EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs , 2016, Telecommunication Systems.

[11]  F. Kargl,et al.  Security and privacy in vehicular networks , 2015 .

[12]  Tao Zhang,et al.  Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[13]  Li Feng,et al.  An Analytical Model for Random Changing Pseudonyms Scheme in VANETs , 2011, 2011 International Conference on Network Computing and Information Security.

[14]  Fan Bai,et al.  Towards Characterising and Classifying Communication–based Automotive Applications from a Wireless Networking Perspective , 2012 .

[15]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[16]  Hong Liu,et al.  Message authentication in driverless cars , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).

[17]  Xiaodong Lin,et al.  Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[18]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[19]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[20]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[21]  Karim Emara,et al.  Safety-aware Location Privacy in Vehicular Ad-hoc Networks , 2016 .

[22]  Xuemin Shen,et al.  ASIC: Aggregate Signatures and Certificates Verification Scheme for Vehicular Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[23]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[24]  Xiwei Wang,et al.  A scalable and secure key distribution scheme for group signature based authentication in VANET , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).

[25]  Xuemin Shen,et al.  BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.

[26]  W. D. Jones,et al.  Keeping cars from crashing , 2001 .

[27]  Hung-Yu Chien,et al.  ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.

[28]  Raja Sengupta,et al.  Cooperative Collision Warning Systems: Concept Definition and Experimental Implementation , 2006, J. Intell. Transp. Syst..

[29]  Reinhard German,et al.  Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping , 2010, 2010 IEEE Vehicular Networking Conference.

[30]  Xiaodong Lin,et al.  A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.

[31]  Yu Cheng,et al.  A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[32]  Elmar Schoch,et al.  On the efficiency of secure beaconing in VANETs , 2010, WiSec '10.

[33]  Levente Buttyán,et al.  On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.

[34]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[35]  Reinhard German,et al.  A performance study of cooperative awareness in ETSI ITS G5 and IEEE WAVE , 2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[36]  Dawu Gu,et al.  PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications , 2016, IEEE Transactions on Dependable and Secure Computing.

[37]  Raja Sengupta,et al.  Cooperative Collision Warning: Enabling Crash Avoidance with Wireless Technology , 2005 .

[38]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[39]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[40]  Emmanouil Magkos,et al.  Strengthening Privacy Protection in VANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[41]  Siu-Ming Yiu,et al.  SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.

[42]  Levente Buttyán,et al.  SLOW: A Practical pseudonym changing scheme for location privacy in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).

[43]  Adrian Perrig,et al.  Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.

[44]  Kenneth P. Laberteaux,et al.  STRONG VANET SECURITY ON A BUDGET , 2006 .

[45]  Weidong Yang Security in Vehicular Ad Hoc Networks (VANETs) , 2013 .

[46]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[47]  Kanika Grover,et al.  Performance Comparison between Broadcast Authentication Methods for Vehicular Networks , 2016, ICINS '16.

[48]  Radha Poovendran,et al.  Swing & swap: user-centric approaches towards maximizing location privacy , 2006, WPES '06.

[49]  M. Gerlach Full Paper : Assessing and Improving Privacy in VANETs , 2006 .

[50]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[51]  Brijesh Kumar Chaurasia,et al.  Pseudonym Based Mechanism for Sustaining Privacy in VANETs , 2009, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks.

[52]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[53]  Mohammad Reza Aref,et al.  A secure authentication scheme for VANETs with batch verification , 2015, Wirel. Networks.