Abstract
In this paper the Vehicle Ad Hoc Network (VANET) is examined. As widely agreed VANETs must rely heavily on node-to-node communication while ease of access has to be assured at the same time. Beside the performance ensuring data authentication is another concern in VANETs.
In our paper we focus on security aspects for the VANETs that aim to ensure data authentication and allow to ensure data secrecy. Ensuring data secrecy is not a standard feature of the VANETs since usually it is assumed that nodes in the network has to be able to receive all information send over the channel. However we think that it is necessary to ensure security against data eavesdrop and message forgery in some applications (e.g. police pursuits or military convoys).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anton, E., Duarte, O.: Group key establishment in wireless ad hoc networks. In: Workshop on Quality of Service and Mobility (WQoSM) (2002)
Blom, R.: An Optimal Class of Symetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) Advances in Cryptology. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Buchegger, S., Le Boudec, J.-Y.: Cooperative Routing in Mobile Ad Hoc Networks: Current Efforts Against Malice and Selfishness, Mobile Internet Workshop. In: Informatik 2002. LNCS, Springer, Heidelberg (2002)
Castelluccia, C., Saxena, N., Yi, J.H.: Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. In: Boutaba, R., Almeroth, K.C., Puigjaner, R., Shen, S., Black, J.P. (eds.) NETWORKING 2005. LNCS, vol. 3462, pp. 1083–1095. Springer, Heidelberg (2005)
Dimitriou, T.D.: Securing Communication Trees in Sensor Networks. In: Nikoletseas, S.E., Rolim, J.D.P. (eds.) ALGOSENSORS 2006. LNCS, vol. 4240, pp. 47–58. Springer, Heidelberg (2006)
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Filipovic, A., Datta, A., McDonald, C.: Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. LNCS, vol. 3759, pp. 422–433. Springer, Heidelberg (2005)
Kim, C.H., Hwang, Y.H., Lee, P.J.: Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple Channels. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 265–279. Springer, Heidelberg (2005)
Kui, R., Gang Yao, Y.: Key Agreements in Ad Hoc Networks. In: Chinacrypt 2004. Proc. of Advance in Cryptology, Shanghai (2004)
Little, T.D.C., Agarwal, A.: An information propagation scheme for VANETs. In: Proceedings of 2005 IEEE Intelligent Transportation Systems, pp. 155–160. IEEE Computer Society Press, Los Alamitos (2005)
Liu, D., Ning, P., Sun, K.: Efficient Self-Healing Group Key Distribution with Revocation Capability. In: CCS 2003, ACM Press, New York (2003)
Mabiala, M., Busson, A., Veque, V.: Inside VANET: Hybrid Network Dimensioning and Routing Protocol Comparison. In: VTC 2007-Spring. 65th IEEE Vehicular Technology Conference, Dublin, Ireland, pp. 227–232 (2007)
Sadi, M.G., Kim, D.S., Park, J.S.: GBR: Grid Based Random Key Predistribution for Wireless Sensor Network. In: ICPADS 2005, pp. 310–315. IEEE Computer Society, Washington, DC, USA (2005)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: ACM Conference on Computer and Communications Security, pp. 31–37 (1996)
Watanabe, Y., Numao, M.: Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 85–99. Springer, Heidelberg (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks. In: CCS 2003, ACM Press, New York (2003)
Zhu, S., Setia, S., Xu, S., Jajodia, S.: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad Hoc Networks, Technical report ISE-TR-02-01 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nikodem, J., Nikodem, M. (2007). Secure and Scalable Communication in Vehicle Ad Hoc Networks. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2007. EUROCAST 2007. Lecture Notes in Computer Science, vol 4739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75867-9_146
Download citation
DOI: https://doi.org/10.1007/978-3-540-75867-9_146
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75866-2
Online ISBN: 978-3-540-75867-9
eBook Packages: Computer ScienceComputer Science (R0)