Threats to Security in DSRC/WAVE

  • Christine Laurendeau
  • Michel Barbeau
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4104)


Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the messages exchanged between the vehicles and between the vehicles and specialized infrastructure be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats according to the European Telecommunications Standards Institute’s (ETSI) threat analysis methodology. We also discuss possible countermeasures to the most critical threats.


Black Hole Medium Access Control Replay Attack Vehicular Network Trusted Platform Module 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    IEEE Vehicular Technology Society: 5.9 GHz Dedicated Short Range Communications (DSRC) - Overview [Online], Available:
  2. 2.
    IEEE 802 Committee of the IEEE Computer Society: Draft Amendment to Standard for Information Technology - Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Wireless Access in Vehicular Environments (WAVE). Draft IEEE Standard, IEEE P802.11p/D1.1 (January 2005)Google Scholar
  3. 3.
    SCC32 Committee of the IEEE Intelligent Transportation Systems Society: Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. Draft IEEE Standard, IEEE P1609.2/D1.3 (October 2005)Google Scholar
  4. 4.
    SCC32 Committee of the IEEE Intelligent Transportation Systems Society: Wireless Access in Vehicular Environments (WAVE) Networking Services. Draft IEEE Standard, IEEE P1609.3/D14 (September 2005)Google Scholar
  5. 5.
    SCC32 Committee of the IEEE Intelligent Transportation Systems Society: Wireless Access in Vehicular Environments (WAVE) Multi-Channel Operation. Draft IEEE Standard, IEEE P1609.4/D03 (April 2005)Google Scholar
  6. 6.
    Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (2005)Google Scholar
  7. 7.
    Blum, J., Eskandarian, A.: The Threat of Intelligent Collisions. IT Professional 6(1), 24–29 (2004)CrossRefGoogle Scholar
  8. 8.
    ETSI: Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 4; Protocol Framework Definition; Methods and Protocols for Security; Part 1: Threat Analysis. Technical Specification ETSI TS 102 165-1 V4.1.1 (2003)Google Scholar
  9. 9.
    American National Standards Institute: Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI Standard, X9.62-2005 (2005)Google Scholar
  10. 10.
    Internet Engineering Task Force: IETF Request for Comments: 3565, Use of Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS). IETF RFC 3565 (2003)Google Scholar
  11. 11.
    Certicom Research: Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Version 1.0. [Online], Available:
  12. 12.
    Barbeau, M.: WiMax/802.16 Threat Analysis. In: Proceedings of the 1st ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet) (2005)Google Scholar
  13. 13.
    Warner, J.S., Johnston, R.G.: GPS Spoofing Countermeasures. The Weekly Homeland Security Newsletter [Online] (12 December 2003), Available:
  14. 14.
    Leavitt, N.: Will Proposed Standard Make Mobile Phones More Secure? Computer 38(12), 20–22 (2005)CrossRefGoogle Scholar
  15. 15.
    Trusted Computing Group: TCG TPM Specification. [Online], Available:
  16. 16.
    Jubin, J., Tornow, J.D.: The DARPA packet radio network protocols. Proceedings of the IEEE 75(1), 21–32 (1987)CrossRefGoogle Scholar
  17. 17.
    Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of Service Resilience in Ad Hoc Networks. In: MobiCom 2004: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (2004)Google Scholar
  18. 18.
    Nielson, J., Keefer, J., McCullough, B.: SAASM: Rockwell Collins’ Next Generation GPS Receiver Design. In: Position Location and Navigation Symposium, pp. 98–105. IEEE, Los Alamitos (2000)Google Scholar
  19. 19.
    Callaghan, S., Fruehauf, H.: SAASM and Direct P(Y) Signal Acquisition, GPS World (July 2002)Google Scholar
  20. 20.
    McDiarmid, A., Irvine, J.: Achieving Anonymous Location-Based Services. In: Proceedings of the 60th International Conference on Vehicular Technology (VCT2004), vol. 4 (2004)Google Scholar
  21. 21.
    Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (2005)Google Scholar
  22. 22.
    Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications and Services (2003)Google Scholar
  23. 23.
    Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: Proceedings of the 1999 Network and Distributed Systems Security Symposium (NDSS), pp. 151–165 (February 1999)Google Scholar
  24. 24.
    Aura, T.: IETF Request for Comments 3972, Cryptographically Generated Addresses (CGA), [Online] (2005), Available:
  25. 25.
    Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security (September 2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Christine Laurendeau
    • 1
  • Michel Barbeau
    • 1
  1. 1.School of Computer ScienceCarleton UniversityOttawaCanada

Personalised recommendations