Abdul Kalam Kunnel Aboobaker (2009) Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks.
Full text access: Open
Traditionally traffic safety was addressed by traffic awareness and passive safety measures like solid chassis, seat belts, air bags etc. With the recent breakthroughs in the domain of mobile ad hoc networks, the concept of vehicular ad hoc networks (VANET) was realised. Safety messaging is the most important aspect of VANETs, where the passive safety (accident readiness) in vehicles was reinforced with the idea of active safety (accident prevention). In safety messaging vehicles will message each other over wireless media, updating each other on traffic conditions and hazards. Security is an important aspect of safety messaging, that aims to prevent participants spreading wrong information in the network that are likely to cause mishaps. Equally important is the fact that secure communication protocols should satisfy the communication constraints of VANETs. VANETs are delay intolerant. Features like high speeds, large network size, constant mobility etc. induce certain limitations in the way messaging can be carried out in VANETs. This thesis studies the impact of total message size on VANET messaging system performance, and conducts an analysis of secure communication protocols to measure how they perform in a VANET messaging system.
This is a Published version This version's date is: 02/09/2009 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/1d3db9ab-ec1e-83ad-390a-8ed0b8e6cad0/1/
Deposited by () on 23-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010
[1] The network simulator - ns-2. http://www.isi.edu/nsnam/ns/.
[2] IEEE 1363a 2004. IEEE Standard Specifications for Public-Key Cryptography -Amendment 1: Additional Techniques, 2004.
[3] Vehicle Safety Communications Project Task 3 Final Report. Technical report, TheCAMP Vehicle Safety Communications Consortium, Mar 2005. Sponsored by U.S. Department of Transportation (USDOT). Available through National TechnicalInformation Service, Springfield, Virginia 22161.
[4] IEEE Draft P802.11p/D2.0, November 2006. Wireless Access in Vehicular Environments(WAVE).
[5] CAR 2 CAR Communication Consortium Manifesto version 1.1. Technical report,CAR 2 CAR Communication Consortium (C2C-CC), Aug 2007. Available throughhttp://www.car-to-car.org/. Last accessed: Aug 2009.
[6] IEEE Draft P1609.0/D01, February 2007. IEEE Trial-Use Standards for WirelessAccess in Vehicular Environments (WAVE).
[7] 5.9 GHz Noth American DSRC, Last accessed: Aug 2009.http://grouper.ieee.org/groups/scc32/dsrc.
[8] Crash Avoidance Metric Partnership. Vehicle Safety Communication Project FinalReport, Aug 2009. Available through U.S. Department of Transportation.
[9] Dedicated Short Range Communications (DSRC), Last accessed: Aug 2009.http://www.leearmstrong.com/DSRC/DSRCHomeset.htm.
[10] Mihir Bellare, Haixia Shi, and Chong Zhang. Foundations of group signatures: Thecase of dynamic groups. pages 136–153. Springer-Verlag, 2004.
[11] Edoardo S. Biagioni. CollisionFree Broadcasting in Wireless AdHoc Networks usingCooperative Diversity. Information and Computer Sciences, University of Hawai,April 2007.
[12] Kathrin Bilstrup. A Survey Regarding Wireless Communication Standards Intendedfor a High-Speed Vehicle Environment. Technical report, School of InformationScience, Computer and Electrical Engineering, Halmstad University, Sweden, Feb2007.
[13] J. J. Blum, A. Eskandarian, and L. J. Hoffman. Challenges of Intervehicle Ad HocNetworks. Intelligent Transportation Systems, IEEE Transactions on, 5(4):347–351,2004.
[14] Dan Boneh and Hovav Shacham. Group Signatures with Verifier-Local Revocation.In Proceedings of CCS 2004, pages 168–177. ACM Press, 2004.
[15] Josh Broch, David A. Maltz, David B. Johnson, Yih chun Hu, and Jorjeta Jetcheva.A Performance Comparison of Multi-Hop Wireless Ad Hoc Network RoutingProtocols. pages 85–97, 1998.
[16] L. Buttyan, T. Holczer, and I. Vajda. On the Effectiveness of Changing Pseudonymsto Provide Location Privacy in VANETs. In European Workshop on Security andPrivacy in Ad Hoc and Sensor Networks (ESAS 2007), July 2007.
[17] G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy. Efficient and RobustPseudonymous Authentication in VANET. In Proceedings of the ACM InternationalWorkshop on Vehicular Ad hoc Networks (VANET), pages 19–28, September 2007.
[18] Srdjan Capkun, Levente Buttyán, and Jean-Pierre Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing,2:52–64, 2003.
[19] David Chaum. Security without identification: transaction systems to make bigbrother obsolete. Communications of the ACM, 28(10):1030–1044, 1985.
[20] David Chaum and E van Heyst. Group Signatures. EUROCRYPT, pages 257–265,1991.
[21] Imrich Chlamtac, Marco Conti, and Jennifer J Liu. Mobile Ad Hoc Networking:Imperatives and Challenges. Ad Hoc Networks, 1(1):13–64, Jul 2003.
[22] Y Do, S Buchegger, T Alpcan, and J P Hubaux. Centrality Analysis in VehicularNetworks. Technical report, 2008.
[23] John R. Douceur. The Sybil Attack. In IPTPS ’01: Revised Papers from the FirstInternational Workshop on Peer-to-Peer Systems, pages 251–260, London, UK, 2002.Springer-Verlag.
[24] Florian Dötzer. Privacy Issues in Vehicular Ad Hoc Networks , volume 3856/2006of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, Jun 2006.
[25] Florian Dötzer, Markus Straßberger, and Timo Kosch. Classification for trafficrelated inter-vehicle messaging. In 5th International Conference on IST Telecommunication.BMW Group Research and Technology, Germany, Jun 2005.
[26] S. Eichler. Performance Evaluation of the IEEE 802.11p WAVE CommunicationStandard. Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th,pages 2199–2203, Oct 2007.
[27] Stephan Eichler. Security Challanges in MANET-based Telematics Environments. InProceedings of the 10th Open European Summer School and IFIP WG 6.3 Workshop,Jun 2004.
[28] Stephan Eichler, Florian Dötzer, Christian Schwingenschlögl, Jörg Eberspächer, andFrancisco Javier Fabra Caro. Secure Routing in a Vehicular Ad Hoc Network. InProceedings of the 2004 IEEE 60th Vehicular Technology Conference, Sep 2004.
[29] Knut Evensen. Global Co-operation. In ETSI TC ITS WORKSHOP, Sophia, Antipolis,Feb 2009.
[30] A. Festag, G. Noecker, M. Strassberger, A. Lübke, B. Bochow, M. Torrent-Moreno,S. Schnaufer, R. Eigner, C. Catrinescu, and J. Kunisch. NoW - Network on Wheels:Project Objectives, Technology and Achievements. In Proceedings of 6th InternationalWorkshop on Intelligent Transportation (WIT 2008), Hamburg, Germany, Mar2008.
[31] Andreas Festag, Holger Füßler, Hannes Hartenstein, Amardeo Sarma, and RalfSchmitz. FleetNet: Bringing Car-to-Car Communication into the Real World. InProceedings of 11th World Congress on ITS, Nagoya, Japan, Oct 2004.
[32] James A. Freebersyser and Barry Leiner. A DoD perspective on Mobile Ad HocNetworks. Ad Hoc Networking, pages 29–51, 2001.
[33] Julien Freudiger, Maxim Raya, and Jean-Pierre Hubaux. Towards Self-OrganizedLocation Privacy in Mobile Networks. Technical report, 2008.
[34] Matthias Gerlach, Andreas Festag, Tim Leinmuller, Gabriele Goldacker, and CharlesHarsch. Security Architecture for Vehicular Communication. 2008.
[35] Philippe Golle, Dan Greene, and Jessica Staddon. Detecting and correcting maliciousdata in vanets. In VANET ’04: Proceedings of the 1st ACM internationalworkshop on Vehicular ad hoc networks, pages 29–37, New York, NY, USA, 2004.ACM.
[36] Zygmunt J. Haas, Joseph Y. Halpern, and Li Li. Gossip-Based Ad Hoc Routing.IEEE/ACM Trans. Netw., 14(3):479–491, 2006.
[37] Charles Harsch, Andreas Festag, and Panagiotis Papadimitratos. Secure Position-Based Routing for VANETs. In 2007 IEEE 66th Vehicular Technology Conference(VTC 2007).
[38] Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt, and Piet Demeester. An Overviewof Mobile Ad Hoc Networks: Applications and Challenges. The CommunicationsNetwork, 3(3), 2004.
[39] Y. C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against WormholeAttacks in Wireless Networks. volume 3, pages 1976–1986 vol.3, 2003.
[40] Yih-Chun Hu and Kenneth P. Laberteaux. Strong VANET Security on a Budget.In In Proceedings of Workshop on Embedded Security in Cars (ESCAR), 2006.
[41] Jean-Pierre Hubaux, S. Capkun, and Jun Luo. The Security and Privacy of SmartVehicles. IEEE Security & Privacy Magazine, 2(3):49–55, 2004.
[42] M Jakobsson, XiaoFeng Wang, and S. Wetzel. Stealth Attacks in Vehicular Technologies.Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th,2:1218–1222, Sep 2004.
[43] Moez Jerbi, Rabah Meraihi, Sidi-Mohammed Senouci, and Yacine Ghamri-Doudane.An Improved Vehicular Ad Hoc Routing Protocol for City Environments. IEEEInternational Conference on Communications (ICC ’07), pages 3972–3979, 2007.
[44] Daniel Jungels, Imad Aad, Maxim Raya, and Jean-Piere Hubaux. Certificate Revocationin Vehicular Ad Hoc Networks. Technical report, EPFL, 2006.
[45] Mohamed Kafsi, Panos Papadimitratos, Olivier Dousse, Tansu Alpcan, and Jean-Pierre Hubaux. VANET Connectivity Analysis. In IEEE Workshop on AutomotiveNetworking and Applications (Autonet).
[46] F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, Ta-Vinh Thong, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux. Secure VehicularCommunication Systems: Implementation, Performance, and Research Challenges.IEEE Communications Magazine, 46(11):110–118, 2008.
[47] Frank Kargl, Zhendong Ma, and Elmar Schoch. Security Engineering for VANETs.In 4th Workshop on Embedded Security in Cars (escar 2006), Berlin, Germany,11/2006 2006.
[48] Rainer Kroh, Antonio Kung, and Frank Kargl. VANETS Security RequirementsFinal Version. Technical report, Secure Vehicle Communication (Sevecom), Sep2006. Available at http://www.sevecom.org/Pages/ProjectDocuments.html. Lastaccessed Aug 2009.
[49] Christine Laurendeau and Michel Barbeau. Threats to Security in DSRC/WAVE,volume 4104 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg,Jul 2006.
[50] Tim Leinmüller, Robert K. Schmidt, Bert Böddeker, Roger W. Berg, and TadaoSuzuki. A Global Trend for Car 2 X Communication, 2007.
[51] Tim Leinmueller, Levente Buttyan, Jean-Pierre Hubaux, Frank Kargl, Rainer Kroh,Panagiotis Papadimitratos, Maxim Raya, and Elmar Schoch. SEVECOM - SecureVehicle Communication. 2006.
[52] Tim. Leinmuller, Elmar. Schoch, and Christian. Maihofer. Security Requirementsand Solution Concepts in Vehicular Ad Hoc Networks. Fourth Annual Conference on Wireless on Demand Network Systems and Services (WONS ’07)., pages 84–91,Jan 2007.
[53] X. Lin, X. Sun, P.-H. Ho, and X. Shen. GSIS: A Secure and Privacy Preserving Protocolfor Vehicular Communications. Towards a Security Architecture for VehicularAd Hoc Networks.
[54] Jun Luo and Jean-Pierre Hubaux. A Survey of Inter-Vehicle Communication. Technicalreport, 2004.
[55] Xiaomin Ma, Xianbo Chen, and Hazem H. Refai. Performance and Reliability ofDSRC Vehicular Safety Communication: A Formal Analysis. EURASIP J. Wirel.Commun. Netw., 2009:1–13, 2009.
[56] A. Mahajan, N. Potnis, K. Gopalan, and A. Wang. Urban Mobility Models forVANETs. In Proc. of 2nd Workshop on Next Generation Wireless Networks, 2006.
[57] K. Matheus, R. Morich, I. Paulus, C. Menig, A. Lübke, B. Rech, and W. Specks.Car-to-Car Communication-Market Introduction and Success Factors. In ITS 2005:5th European Congress and Exhibition on Intelligent Transport Systems and Services,Jun 2005.
[58] Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis (Panos) Papadimitratos, RossAnderson, and Jean-Pierre Hubaux. Fast Exclusion of Errant Devices from VehicularNetworks. In IEEE SECON 2008, 2008.
[59] Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, and Jang-Ping Sheu. The broadcaststorm problem in a mobile ad hoc network. In MobiCom ’99: Proceedings of the 5thannual ACM/IEEE international conference on Mobile computing and networking,pages 151–162, New York, NY, USA, 1999. ACM.
[60] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma,F. Kargl, A. Kung, and J.-P. Hubaux. Secure Vehicular Communication Systems:Design and Architecture. IEEE Communications Magazine, 46(11):100–109, 2008.
[61] Panagiotis Papadimitratos, Levente Buttyan, Jean-Pierre Hubaux, Frank Kargl,Antonio Kung, and Maxim Raya. Architecture for Secure and Private VehicularCommunications. In The 7th International Conference on ITS Telecommunications(ITST), 2007.
[62] Panagiotis Papadimitratos, Virgil Gligor, and Jean-Pierre Hubaux. Securing VehicularCommunications - Assumptions, Requirements, and Principles. In Workshopon Embedded Security in Cars (ESCAR) 2006, pages 5–14, 2006.
[63] Panagiotis (Panos) Papadimitratos, Giorgio Calandriello, Jean-Pierre Hubaux, andAntonio Lioy. Impact of Vehicular Communications Security on TransportationSafety. In IEEE INFOCOM MOVE 2008.
[64] Panagiotis (Panos) Papadimitratos, Ghita Mezzour, and Jean-Pierre Hubaux. CertificateRevocation List Distribution in Vehicular Communication Systems. InThe Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET2008).
[65] Panos Papadimitratos and Jean-Pierre Hubaux. Report on the "Secure VehicularCommunications: Results and Challenges Ahead" Workshop. ACM SIGMOBILEMobile Computing and Communications Review (MC2R), 12(2):53–64, 2008.
[66] Bryan Parno and Adrian Perrig. Challenges in Securing Vehicular Networks. InProceedings of Workshop on Hot Topics in Networks (HotNets-IV), November 2005.
[67] A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA broadcast authenticationprotocol. Cryptobytes, 5(2), 2002.
[68] Klaus Plößl and Hannes Federrath. A Privacy Aware and Efficient Security Infrastructurefor Vehicular Ad Hoc Networks. Computer Standards & Interfaces,30(6):390 – 397, 2008. Special Issue: State of standards in the information systemssecurity area.
[69] Y. Qian and N. Moayeri. Design of Secure and Application-Oriented VANETs. InVehicular Technology Conference, pages 2794–2799. VTC Spring 2008, IEEE, 2008.
[70] Sandro Rafaeli and David Hutchison. A Survey of Key Management for SecureGroup Communication. ACM Comput. Surv., 35(3):309–329, September 2003.
[71] Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux. Efficient secure aggregation inVANETs. In VANET 2006, 2006.
[72] Maxim Raya and Jean-Pierre Hubaux. The Security of Vehicular Ad Hoc Networks.In SASN ’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensornetworks, pages 11–21, New York, NY, USA, 2005. ACM.
[73] Maxim Raya and Jean-Pierre Hubaux. Securing Vehicular Ad Hoc Networks. Journalof Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks,15(1):39 – 68, 2007.
[74] Maxim Raya, Mohammad Hossein Manshaei, Mark Felegyhazi, and Jean-Pierre Hubaux.Revocation Games in Ephemeral Networks. In ACM CCS 2008, 2008.
[75] Maxim Raya, Panagiotis Papadimitratos, Imad Aad, Daniel Jungels, and Jean-Pierre Hubaux. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks.IEEE Journal on Selected Areas in Communications, Special Issue on VehicularNetworks, 25(8):1557–1568, 2007.
[76] Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux. Securing VehicularCommunications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, 13(5):8–15, 2006.
[77] Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux. Securing VehicularNetworks. 2006.
[78] Maxime Raya, Panagiotis (Panos) Papadimitratos, Virgil Gligor, and Jean-PierreHubaux. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. InIEEE Infocom 2008, 2008.
[79] P. Samuel. Of Sticker Tags and 5.9 GHz. In ITS International, 2004.
[80] Elmar Schoch, Frank Kargl, Michael Weber, and Tim Leinmuller. CommunicationPatterns in VANETs. IEEE Communications Magazine, 46:119–125, Nov 2008.
[81] Elmar Schoch, Moritz Keppler, Frank Kargl, and Michael Weber. On the Securityof Context-Adaptive Information Dissemination. Security and CommunicationNetworks, 1(3):205–218, 2008.
[82] Michael Shulman and Richard Deering. Vehicle Safety Communications in the UnitedStates. Technical report, Ford Motor Company, General Motors Corporation,2006.
[83] Joo-Han Song, Vincent W.S. Wong, and Victor C.M. Leung. Secure Location Verificationfor Vehicular Ad-Hoc Networks. IEEE Global Telecommunications Conference(IEEE GLOBECOM 2008), pages 1–5, 2008.
[84] A. Stampoulis and Z. Chai. Survey of Security in Vehicular Networks. Technicalreport, 2007. Project CPSC 534.
[85] Marc Torrent-Moreno, Steven Corroy, Felix Schmidt-Eisenlohr, and Hannes Hartenstein.Ieee 802.11-based one-hop broadcast communications: understanding transmissionsuccess and failure under different radio propagation environments. InMSWiM ’06: Proceedings of the 9th ACM international symposium on Modelinganalysis and simulation of wireless and mobile systems, pages 68–77, New York,NY, USA, 2006. ACM.
[86] Marc Torrent-Moreno, Daniel Jiang, and Hannes Hartenstein. Broadcast ReceptionRates and Eeffects of Priority Access in 802.11-based VehicularAad-Hoc Networks.In VANET ’04: Proceedings of the 1st ACM international workshop on Vehicularad hoc networks, pages 10–18, New York, NY, USA, 2004. ACM.
[87] Lars Wischhof and Hermann Rohling. Congestion Control in Vehicular Ad HocNetworks, 2005.
[88] Qing Xu, Tony Mak, Jeff Ko, and Raja Sengupta. Vehicle-to-Vehicle Safety Messagingin DSRC. In VANET ’04: Proceedings of the 1st ACM international workshopon Vehicular ad hoc networks, pages 19–28, New York, NY, USA, 2004. ACM Press.
[89] Xue Yang, Jie Liu, Feng Zhao, and Nitin H. Vaidya. A Vehicle-to-Vehicle CommunicationProtocol for Cooperative Collision Warning. Mobile and Ubiquitous Systems,Annual International Conference on, 0:114–123, 2004.
[90] Jijun Yin, Tamer ElBatt, Gavin Yeung, Bo Ryu, Stephen Habermas, HariharanKrishnan, and Timothy Talty. Performance Evaluation of Safety Applications overDSRC Vehicular Ad Hoc Networks. In VANET ’04: Proceedings of the 1st ACMinternational workshop on Vehicular ad hoc networks, pages 1–9, New York, NY,USA, 2004. ACM.
[91] Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE NetworkMagazine, 13:24–30, 1999.