Skip to main content

Secure and Scalable Communication in Vehicle Ad Hoc Networks

  • Conference paper
Computer Aided Systems Theory – EUROCAST 2007 (EUROCAST 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4739))

Included in the following conference series:

Abstract

In this paper the Vehicle Ad Hoc Network (VANET) is examined. As widely agreed VANETs must rely heavily on node-to-node communication while ease of access has to be assured at the same time. Beside the performance ensuring data authentication is another concern in VANETs.

In our paper we focus on security aspects for the VANETs that aim to ensure data authentication and allow to ensure data secrecy. Ensuring data secrecy is not a standard feature of the VANETs since usually it is assumed that nodes in the network has to be able to receive all information send over the channel. However we think that it is necessary to ensure security against data eavesdrop and message forgery in some applications (e.g. police pursuits or military convoys).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anton, E., Duarte, O.: Group key establishment in wireless ad hoc networks. In: Workshop on Quality of Service and Mobility (WQoSM) (2002)

    Google Scholar 

  2. Blom, R.: An Optimal Class of Symetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) Advances in Cryptology. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  3. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

  4. Buchegger, S., Le Boudec, J.-Y.: Cooperative Routing in Mobile Ad Hoc Networks: Current Efforts Against Malice and Selfishness, Mobile Internet Workshop. In: Informatik 2002. LNCS, Springer, Heidelberg (2002)

    Google Scholar 

  5. Castelluccia, C., Saxena, N., Yi, J.H.: Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. In: Boutaba, R., Almeroth, K.C., Puigjaner, R., Shen, S., Black, J.P. (eds.) NETWORKING 2005. LNCS, vol. 3462, pp. 1083–1095. Springer, Heidelberg (2005)

    Google Scholar 

  6. Dimitriou, T.D.: Securing Communication Trees in Sensor Networks. In: Nikoletseas, S.E., Rolim, J.D.P. (eds.) ALGOSENSORS 2006. LNCS, vol. 4240, pp. 47–58. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Google Scholar 

  8. Filipovic, A., Datta, A., McDonald, C.: Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. LNCS, vol. 3759, pp. 422–433. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Kim, C.H., Hwang, Y.H., Lee, P.J.: Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple Channels. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 265–279. Springer, Heidelberg (2005)

    Google Scholar 

  10. Kui, R., Gang Yao, Y.: Key Agreements in Ad Hoc Networks. In: Chinacrypt 2004. Proc. of Advance in Cryptology, Shanghai (2004)

    Google Scholar 

  11. Little, T.D.C., Agarwal, A.: An information propagation scheme for VANETs. In: Proceedings of 2005 IEEE Intelligent Transportation Systems, pp. 155–160. IEEE Computer Society Press, Los Alamitos (2005)

    Chapter  Google Scholar 

  12. Liu, D., Ning, P., Sun, K.: Efficient Self-Healing Group Key Distribution with Revocation Capability. In: CCS 2003, ACM Press, New York (2003)

    Google Scholar 

  13. Mabiala, M., Busson, A., Veque, V.: Inside VANET: Hybrid Network Dimensioning and Routing Protocol Comparison. In: VTC 2007-Spring. 65th IEEE Vehicular Technology Conference, Dublin, Ireland, pp. 227–232 (2007)

    Google Scholar 

  14. Sadi, M.G., Kim, D.S., Park, J.S.: GBR: Grid Based Random Key Predistribution for Wireless Sensor Network. In: ICPADS 2005, pp. 310–315. IEEE Computer Society, Washington, DC, USA (2005)

    Google Scholar 

  15. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: ACM Conference on Computer and Communications Security, pp. 31–37 (1996)

    Google Scholar 

  16. Watanabe, Y., Numao, M.: Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 85–99. Springer, Heidelberg (2003)

    Google Scholar 

  17. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks. In: CCS 2003, ACM Press, New York (2003)

    Google Scholar 

  18. Zhu, S., Setia, S., Xu, S., Jajodia, S.: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad Hoc Networks, Technical report ISE-TR-02-01 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Roberto Moreno Díaz Franz Pichler Alexis Quesada Arencibia

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nikodem, J., Nikodem, M. (2007). Secure and Scalable Communication in Vehicle Ad Hoc Networks. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2007. EUROCAST 2007. Lecture Notes in Computer Science, vol 4739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75867-9_146

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75867-9_146

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75866-2

  • Online ISBN: 978-3-540-75867-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics