Abstract
Vehicular Ad hoc Networks are the focus of increased attention by vehicle manufacturers. However, their deployment requires that security issues be resolved, particularly since they rely on wireless communication, and rogue vehicles can roam with contaminated software. This paper examines security threats to VANETs and argues that a security architecture built around TPMs can provide a satisfactory solution.
Chapter PDF
References
Lee, K.C., Lee, S.-h., Cheung, R., Lee, U., Gerla, M.: First Experience with CarTorrent in a Real Vehicular Ad Hoc Network Testbed. Mobile Networking for Vehicular Environments, 109–114 (2007)
Trusted Computing Group: TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group (February 2005)
Blum, J., Eskandarian, A.: The Threat of Intelligent Collisions. IT Professional 6(1), 24–29 (2004)
Zarki, M.E., Mehrotra, S., Tsudik, G., Venkatasubramanian, N.: Security Issues in a Future Vehicular Network. European Wireless (2002)
Hubaux, J., Čapkun, S., Luo, J.: The Security and Privacy of Smart Vehicles. IEEE Security and Privacy 2(3), 49–55 (2004)
Parno, B., Perrig, A.: Challenges in Securing Vehicular Networks. In: Fourth Workshop on Hot Topics in Networks (2005)
Aijaz, A., Bochow, B., Dötzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmüller, T.: Attacks on Inter-Vehicle Communication Systems - An Analysis. In: 3rd International Workshop on Intelligent Transportation (2006)
Raya, M., Hubaux, J.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 11–21 (2005)
Raya, M., Papadimitratos, P., Hubaux, J.: Securing Vehicular Communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications 13(5), 8–15 (2006)
Dötzer, F.: Privacy Issues in Vehicular Ad Hoc Network. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)
Gerlach, M., Festag, A., Leinmüller, T., Goldacker, G., Harsch, C.: Security Architecture for Vehicular Communication. In: Workshop on Intelligent Transportation (2007)
Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference (2007)
Schoch, E., Kargl, F., Leinmüller, T., Schlott, S., Papadimitratos, P.: Impact of pseudonym changes on geographic routing in vanets. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 43–57 (2006)
Douceur, J.: The Sybil Attack. In: First International Workshop on Peer-to-Peer Systems, March 2002, pp. 251–260 (2002)
Raya, M., Hubaux, J.: Securing Vehicular Ad Hoc Networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks 15(1), 39–68 (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Guette, G., Bryce, C. (2008). Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds) Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks. WISTP 2008. Lecture Notes in Computer Science, vol 5019. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79966-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-79966-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-79965-8
Online ISBN: 978-3-540-79966-5
eBook Packages: Computer ScienceComputer Science (R0)