Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks

Abdul Kalam Kunnel Aboobaker

(2009)

Abdul Kalam Kunnel Aboobaker (2009) Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks.

Our Full Text Deposits

Full text access: Open

Full Text - 1.55 MB

Links to Copies of this Item Held Elsewhere


Abstract

Traditionally traffic safety was addressed by traffic awareness and passive safety measures like solid chassis, seat belts, air bags etc. With the recent breakthroughs in the domain of mobile ad hoc networks, the concept of vehicular ad hoc networks (VANET) was realised. Safety messaging is the most important aspect of VANETs, where the passive safety (accident readiness) in vehicles was reinforced with the idea of active safety (accident prevention). In safety messaging vehicles will message each other over wireless media, updating each other on traffic conditions and hazards. Security is an important aspect of safety messaging, that aims to prevent participants spreading wrong information in the network that are likely to cause mishaps. Equally important is the fact that secure communication protocols should satisfy the communication constraints of VANETs. VANETs are delay intolerant. Features like high speeds, large network size, constant mobility etc. induce certain limitations in the way messaging can be carried out in VANETs. This thesis studies the impact of total message size on VANET messaging system performance, and conducts an analysis of secure communication protocols to measure how they perform in a VANET messaging system.

Information about this Version

This is a Published version
This version's date is: 02/09/2009
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/1d3db9ab-ec1e-83ad-390a-8ed0b8e6cad0/1/

Item TypeMonograph (Technical Report)
TitlePerformance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks
AuthorsAboobaker, Abdul Kalam Kunnel
DepartmentsFaculty of Science\Mathematics

Deposited by () on 23-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010

Notes

References

[1] The network simulator - ns-2. http://www.isi.edu/nsnam/ns/.

[2] IEEE 1363a 2004. IEEE Standard Specifications for Public-Key Cryptography -
Amendment 1: Additional Techniques, 2004.

[3] Vehicle Safety Communications Project Task 3 Final Report. Technical report, The
CAMP Vehicle Safety Communications Consortium, Mar 2005. Sponsored by U.
S. Department of Transportation (USDOT). Available through National Technical
Information Service, Springfield, Virginia 22161.

[4] IEEE Draft P802.11p/D2.0, November 2006. Wireless Access in Vehicular Environments
(WAVE).

[5] CAR 2 CAR Communication Consortium Manifesto version 1.1. Technical report,
CAR 2 CAR Communication Consortium (C2C-CC), Aug 2007. Available through
http://www.car-to-car.org/. Last accessed: Aug 2009.

[6] IEEE Draft P1609.0/D01, February 2007. IEEE Trial-Use Standards for Wireless
Access in Vehicular Environments (WAVE).

[7] 5.9 GHz Noth American DSRC, Last accessed: Aug 2009.
http://grouper.ieee.org/groups/scc32/dsrc.

[8] Crash Avoidance Metric Partnership. Vehicle Safety Communication Project Final
Report, Aug 2009. Available through U.S. Department of Transportation.

[9] Dedicated Short Range Communications (DSRC), Last accessed: Aug 2009.
http://www.leearmstrong.com/DSRC/DSRCHomeset.htm.

[10] Mihir Bellare, Haixia Shi, and Chong Zhang. Foundations of group signatures: The
case of dynamic groups. pages 136–153. Springer-Verlag, 2004.

[11] Edoardo S. Biagioni. CollisionFree Broadcasting in Wireless AdHoc Networks using
Cooperative Diversity. Information and Computer Sciences, University of Hawai,
April 2007.

[12] Kathrin Bilstrup. A Survey Regarding Wireless Communication Standards Intended
for a High-Speed Vehicle Environment. Technical report, School of Information
Science, Computer and Electrical Engineering, Halmstad University, Sweden, Feb
2007.

[13] J. J. Blum, A. Eskandarian, and L. J. Hoffman. Challenges of Intervehicle Ad Hoc
Networks. Intelligent Transportation Systems, IEEE Transactions on, 5(4):347–351,
2004.

[14] Dan Boneh and Hovav Shacham. Group Signatures with Verifier-Local Revocation.
In Proceedings of CCS 2004, pages 168–177. ACM Press, 2004.

[15] Josh Broch, David A. Maltz, David B. Johnson, Yih chun Hu, and Jorjeta Jetcheva.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing
Protocols. pages 85–97, 1998.

[16] L. Buttyan, T. Holczer, and I. Vajda. On the Effectiveness of Changing Pseudonyms
to Provide Location Privacy in VANETs. In European Workshop on Security and
Privacy in Ad Hoc and Sensor Networks (ESAS 2007), July 2007.

[17] G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy. Efficient and Robust
Pseudonymous Authentication in VANET. In Proceedings of the ACM International
Workshop on Vehicular Ad hoc Networks (VANET), pages 19–28, September 2007.

[18] Srdjan Capkun, Levente Buttyán, and Jean-Pierre Hubaux. Self-Organized Public-
Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing,
2:52–64, 2003.

[19] David Chaum. Security without identification: transaction systems to make big
brother obsolete. Communications of the ACM, 28(10):1030–1044, 1985.

[20] David Chaum and E van Heyst. Group Signatures. EUROCRYPT, pages 257–265,
1991.

[21] Imrich Chlamtac, Marco Conti, and Jennifer J Liu. Mobile Ad Hoc Networking:
Imperatives and Challenges. Ad Hoc Networks, 1(1):13–64, Jul 2003.

[22] Y Do, S Buchegger, T Alpcan, and J P Hubaux. Centrality Analysis in Vehicular
Networks. Technical report, 2008.

[23] John R. Douceur. The Sybil Attack. In IPTPS ’01: Revised Papers from the First
International Workshop on Peer-to-Peer Systems, pages 251–260, London, UK, 2002.
Springer-Verlag.

[24] Florian Dötzer. Privacy Issues in Vehicular Ad Hoc Networks , volume 3856/2006
of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, Jun 2006.

[25] Florian Dötzer, Markus Straßberger, and Timo Kosch. Classification for traffic
related inter-vehicle messaging. In 5th International Conference on IST Telecommunication.
BMW Group Research and Technology, Germany, Jun 2005.

[26] S. Eichler. Performance Evaluation of the IEEE 802.11p WAVE Communication
Standard. Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th,
pages 2199–2203, Oct 2007.


[27] Stephan Eichler. Security Challanges in MANET-based Telematics Environments. In
Proceedings of the 10th Open European Summer School and IFIP WG 6.3 Workshop,
Jun 2004.

[28] Stephan Eichler, Florian Dötzer, Christian Schwingenschlögl, Jörg Eberspächer, and
Francisco Javier Fabra Caro. Secure Routing in a Vehicular Ad Hoc Network. In
Proceedings of the 2004 IEEE 60th Vehicular Technology Conference, Sep 2004.

[29] Knut Evensen. Global Co-operation. In ETSI TC ITS WORKSHOP, Sophia, Antipolis,
Feb 2009.

[30] A. Festag, G. Noecker, M. Strassberger, A. Lübke, B. Bochow, M. Torrent-Moreno,
S. Schnaufer, R. Eigner, C. Catrinescu, and J. Kunisch. NoW - Network on Wheels:
Project Objectives, Technology and Achievements. In Proceedings of 6th International
Workshop on Intelligent Transportation (WIT 2008), Hamburg, Germany, Mar
2008.

[31] Andreas Festag, Holger Füßler, Hannes Hartenstein, Amardeo Sarma, and Ralf
Schmitz. FleetNet: Bringing Car-to-Car Communication into the Real World. In
Proceedings of 11th World Congress on ITS, Nagoya, Japan, Oct 2004.

[32] James A. Freebersyser and Barry Leiner. A DoD perspective on Mobile Ad Hoc
Networks. Ad Hoc Networking, pages 29–51, 2001.

[33] Julien Freudiger, Maxim Raya, and Jean-Pierre Hubaux. Towards Self-Organized
Location Privacy in Mobile Networks. Technical report, 2008.

[34] Matthias Gerlach, Andreas Festag, Tim Leinmuller, Gabriele Goldacker, and Charles
Harsch. Security Architecture for Vehicular Communication. 2008.

[35] Philippe Golle, Dan Greene, and Jessica Staddon. Detecting and correcting malicious
data in vanets. In VANET ’04: Proceedings of the 1st ACM international
workshop on Vehicular ad hoc networks, pages 29–37, New York, NY, USA, 2004.
ACM.

[36] Zygmunt J. Haas, Joseph Y. Halpern, and Li Li. Gossip-Based Ad Hoc Routing.
IEEE/ACM Trans. Netw., 14(3):479–491, 2006.

[37] Charles Harsch, Andreas Festag, and Panagiotis Papadimitratos. Secure Position-
Based Routing for VANETs. In 2007 IEEE 66th Vehicular Technology Conference
(VTC 2007).

[38] Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt, and Piet Demeester. An Overview
of Mobile Ad Hoc Networks: Applications and Challenges. The Communications
Network, 3(3), 2004.

[39] Y. C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole
Attacks in Wireless Networks. volume 3, pages 1976–1986 vol.3, 2003.


[40] Yih-Chun Hu and Kenneth P. Laberteaux. Strong VANET Security on a Budget.
In In Proceedings of Workshop on Embedded Security in Cars (ESCAR), 2006.

[41] Jean-Pierre Hubaux, S. Capkun, and Jun Luo. The Security and Privacy of Smart
Vehicles. IEEE Security & Privacy Magazine, 2(3):49–55, 2004.

[42] M Jakobsson, XiaoFeng Wang, and S. Wetzel. Stealth Attacks in Vehicular Technologies.
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th,
2:1218–1222, Sep 2004.

[43] Moez Jerbi, Rabah Meraihi, Sidi-Mohammed Senouci, and Yacine Ghamri-Doudane.
An Improved Vehicular Ad Hoc Routing Protocol for City Environments. IEEE
International Conference on Communications (ICC ’07), pages 3972–3979, 2007.

[44] Daniel Jungels, Imad Aad, Maxim Raya, and Jean-Piere Hubaux. Certificate Revocation
in Vehicular Ad Hoc Networks. Technical report, EPFL, 2006.

[45] Mohamed Kafsi, Panos Papadimitratos, Olivier Dousse, Tansu Alpcan, and Jean-
Pierre Hubaux. VANET Connectivity Analysis. In IEEE Workshop on Automotive
Networking and Applications (Autonet).

[46] F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, Ta-
Vinh Thong, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux. Secure Vehicular
Communication Systems: Implementation, Performance, and Research Challenges.
IEEE Communications Magazine, 46(11):110–118, 2008.

[47] Frank Kargl, Zhendong Ma, and Elmar Schoch. Security Engineering for VANETs.
In 4th Workshop on Embedded Security in Cars (escar 2006), Berlin, Germany,
11/2006 2006.

[48] Rainer Kroh, Antonio Kung, and Frank Kargl. VANETS Security Requirements
Final Version. Technical report, Secure Vehicle Communication (Sevecom), Sep
2006. Available at http://www.sevecom.org/Pages/ProjectDocuments.html. Last
accessed Aug 2009.

[49] Christine Laurendeau and Michel Barbeau. Threats to Security in DSRC/WAVE,
volume 4104 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg,
Jul 2006.

[50] Tim Leinmüller, Robert K. Schmidt, Bert Böddeker, Roger W. Berg, and Tadao
Suzuki. A Global Trend for Car 2 X Communication, 2007.

[51] Tim Leinmueller, Levente Buttyan, Jean-Pierre Hubaux, Frank Kargl, Rainer Kroh,
Panagiotis Papadimitratos, Maxim Raya, and Elmar Schoch. SEVECOM - Secure
Vehicle Communication. 2006.

[52] Tim. Leinmuller, Elmar. Schoch, and Christian. Maihofer. Security Requirements
and Solution Concepts in Vehicular Ad Hoc Networks. Fourth Annual Conference on Wireless on Demand Network Systems and Services (WONS ’07)., pages 84–91,
Jan 2007.

[53] X. Lin, X. Sun, P.-H. Ho, and X. Shen. GSIS: A Secure and Privacy Preserving Protocol
for Vehicular Communications. Towards a Security Architecture for Vehicular
Ad Hoc Networks.

[54] Jun Luo and Jean-Pierre Hubaux. A Survey of Inter-Vehicle Communication. Technical
report, 2004.

[55] Xiaomin Ma, Xianbo Chen, and Hazem H. Refai. Performance and Reliability of
DSRC Vehicular Safety Communication: A Formal Analysis. EURASIP J. Wirel.
Commun. Netw., 2009:1–13, 2009.

[56] A. Mahajan, N. Potnis, K. Gopalan, and A. Wang. Urban Mobility Models for
VANETs. In Proc. of 2nd Workshop on Next Generation Wireless Networks, 2006.

[57] K. Matheus, R. Morich, I. Paulus, C. Menig, A. Lübke, B. Rech, and W. Specks.
Car-to-Car Communication-Market Introduction and Success Factors. In ITS 2005:
5th European Congress and Exhibition on Intelligent Transport Systems and Services,
Jun 2005.

[58] Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis (Panos) Papadimitratos, Ross
Anderson, and Jean-Pierre Hubaux. Fast Exclusion of Errant Devices from Vehicular
Networks. In IEEE SECON 2008, 2008.

[59] Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, and Jang-Ping Sheu. The broadcast
storm problem in a mobile ad hoc network. In MobiCom ’99: Proceedings of the 5th
annual ACM/IEEE international conference on Mobile computing and networking,
pages 151–162, New York, NY, USA, 1999. ACM.

[60] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma,
F. Kargl, A. Kung, and J.-P. Hubaux. Secure Vehicular Communication Systems:
Design and Architecture. IEEE Communications Magazine, 46(11):100–109, 2008.

[61] Panagiotis Papadimitratos, Levente Buttyan, Jean-Pierre Hubaux, Frank Kargl,
Antonio Kung, and Maxim Raya. Architecture for Secure and Private Vehicular
Communications. In The 7th International Conference on ITS Telecommunications
(ITST), 2007.

[62] Panagiotis Papadimitratos, Virgil Gligor, and Jean-Pierre Hubaux. Securing Vehicular
Communications - Assumptions, Requirements, and Principles. In Workshop
on Embedded Security in Cars (ESCAR) 2006, pages 5–14, 2006.

[63] Panagiotis (Panos) Papadimitratos, Giorgio Calandriello, Jean-Pierre Hubaux, and
Antonio Lioy. Impact of Vehicular Communications Security on Transportation
Safety. In IEEE INFOCOM MOVE 2008.

[64] Panagiotis (Panos) Papadimitratos, Ghita Mezzour, and Jean-Pierre Hubaux. Certificate
Revocation List Distribution in Vehicular Communication Systems. In
The Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET
2008).

[65] Panos Papadimitratos and Jean-Pierre Hubaux. Report on the "Secure Vehicular
Communications: Results and Challenges Ahead" Workshop. ACM SIGMOBILE
Mobile Computing and Communications Review (MC2R), 12(2):53–64, 2008.

[66] Bryan Parno and Adrian Perrig. Challenges in Securing Vehicular Networks. In
Proceedings of Workshop on Hot Topics in Networks (HotNets-IV), November 2005.

[67] A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA broadcast authentication
protocol. Cryptobytes, 5(2), 2002.

[68] Klaus Plößl and Hannes Federrath. A Privacy Aware and Efficient Security Infrastructure
for Vehicular Ad Hoc Networks. Computer Standards & Interfaces,
30(6):390 – 397, 2008. Special Issue: State of standards in the information systems
security area.

[69] Y. Qian and N. Moayeri. Design of Secure and Application-Oriented VANETs. In
Vehicular Technology Conference, pages 2794–2799. VTC Spring 2008, IEEE, 2008.

[70] Sandro Rafaeli and David Hutchison. A Survey of Key Management for Secure
Group Communication. ACM Comput. Surv., 35(3):309–329, September 2003.

[71] Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux. Efficient secure aggregation in
VANETs. In VANET 2006, 2006.

[72] Maxim Raya and Jean-Pierre Hubaux. The Security of Vehicular Ad Hoc Networks.
In SASN ’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor
networks, pages 11–21, New York, NY, USA, 2005. ACM.

[73] Maxim Raya and Jean-Pierre Hubaux. Securing Vehicular Ad Hoc Networks. Journal
of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks,
15(1):39 – 68, 2007.

[74] Maxim Raya, Mohammad Hossein Manshaei, Mark Felegyhazi, and Jean-Pierre Hubaux.
Revocation Games in Ephemeral Networks. In ACM CCS 2008, 2008.

[75] Maxim Raya, Panagiotis Papadimitratos, Imad Aad, Daniel Jungels, and Jean-
Pierre Hubaux. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks.
IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular
Networks, 25(8):1557–1568, 2007.

[76] Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux. Securing Vehicular
Communications. IEEE Wireless Communications Magazine, Special Issue on Inter-
Vehicular Communications, 13(5):8–15, 2006.

[77] Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux. Securing Vehicular
Networks. 2006.

[78] Maxime Raya, Panagiotis (Panos) Papadimitratos, Virgil Gligor, and Jean-Pierre
Hubaux. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In
IEEE Infocom 2008, 2008.

[79] P. Samuel. Of Sticker Tags and 5.9 GHz. In ITS International, 2004.

[80] Elmar Schoch, Frank Kargl, Michael Weber, and Tim Leinmuller. Communication
Patterns in VANETs. IEEE Communications Magazine, 46:119–125, Nov 2008.

[81] Elmar Schoch, Moritz Keppler, Frank Kargl, and Michael Weber. On the Security
of Context-Adaptive Information Dissemination. Security and Communication
Networks, 1(3):205–218, 2008.

[82] Michael Shulman and Richard Deering. Vehicle Safety Communications in the United
States. Technical report, Ford Motor Company, General Motors Corporation,
2006.

[83] Joo-Han Song, Vincent W.S. Wong, and Victor C.M. Leung. Secure Location Verification
for Vehicular Ad-Hoc Networks. IEEE Global Telecommunications Conference
(IEEE GLOBECOM 2008), pages 1–5, 2008.

[84] A. Stampoulis and Z. Chai. Survey of Security in Vehicular Networks. Technical
report, 2007. Project CPSC 534.

[85] Marc Torrent-Moreno, Steven Corroy, Felix Schmidt-Eisenlohr, and Hannes Hartenstein.
Ieee 802.11-based one-hop broadcast communications: understanding transmission
success and failure under different radio propagation environments. In
MSWiM ’06: Proceedings of the 9th ACM international symposium on Modeling
analysis and simulation of wireless and mobile systems, pages 68–77, New York,
NY, USA, 2006. ACM.

[86] Marc Torrent-Moreno, Daniel Jiang, and Hannes Hartenstein. Broadcast Reception
Rates and Eeffects of Priority Access in 802.11-based VehicularAad-Hoc Networks.
In VANET ’04: Proceedings of the 1st ACM international workshop on Vehicular
ad hoc networks, pages 10–18, New York, NY, USA, 2004. ACM.

[87] Lars Wischhof and Hermann Rohling. Congestion Control in Vehicular Ad Hoc
Networks, 2005.

[88] Qing Xu, Tony Mak, Jeff Ko, and Raja Sengupta. Vehicle-to-Vehicle Safety Messaging
in DSRC. In VANET ’04: Proceedings of the 1st ACM international workshop
on Vehicular ad hoc networks, pages 19–28, New York, NY, USA, 2004. ACM Press.

[89] Xue Yang, Jie Liu, Feng Zhao, and Nitin H. Vaidya. A Vehicle-to-Vehicle Communication
Protocol for Cooperative Collision Warning. Mobile and Ubiquitous Systems,
Annual International Conference on, 0:114–123, 2004.

[90] Jijun Yin, Tamer ElBatt, Gavin Yeung, Bo Ryu, Stephen Habermas, Hariharan
Krishnan, and Timothy Talty. Performance Evaluation of Safety Applications over
DSRC Vehicular Ad Hoc Networks. In VANET ’04: Proceedings of the 1st ACM
international workshop on Vehicular ad hoc networks, pages 1–9, New York, NY,
USA, 2004. ACM.

[91] Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network
Magazine, 13:24–30, 1999.


Details