Advertisement

Abstract

The implications and challenges of security in vehicular ad-hoc networks are huge for several reasons and, basically, for human safety effects and due to the complex and highly dynamic setting. Additionally security, being a cross-layer topic, can be managed at different layers of the network stack (e.g. at MAC-level - with encryption and authentication, at network-layer - as with IPsec, at transport-layer TLS, SSL). A rich scientific literature has addressed the issue of vanet security, however, all the proposed solutions (i) focus on a specific layer and (ii) offer either robust but not scalable solutions (such as the PKI infrastructure, hardly managed under mobility for all the nodes and services) or weak ones (at least weak if applied to human safety). For this reason, in the present paper, security for vanet is faced with a layered approach which lets envisage several solutions, properly and hierarchically differentiated for distinct services. Additionally, what introduces an even stronger novelty, the dissertation covers both CSMA/CA and slotted MAC protocols, having the latter recently encountered a certain scientific favour.

Keywords

Advance Encryption Standard Slot Allocation IEEE Wireless Communication Misbehave Node Authorized Client 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    IEEE 802.11p TG. IEEE 802.11p/D9.0, Draft Amendment for Wireless Access in Vehicular Environments (WAVE) (September 2009)Google Scholar
  2. 2.
    IEEE 1609 WAVE Standards, vii.path.berkeley.edu/1609_wave/
  3. 3.
    IEEE 1609.2 Trial Use Standard for Wireless Access in Vehicular Environments (WAVE) - Security Services for Applications and Management Messages, vii.path.berkeley.edu/1609_wave/
  4. 4.
    Shakkottai, S., Rappaport, T.S., Karlsson, P.C.: Cross-layer design for wireless networks. IEEE Commun. Mag. 41(10) (October 2003)Google Scholar
  5. 5.
    Scopigno, R., Cozzetti, H.A.: Mobile Slotted Aloha for Vanets. In: IEEE VTC Fall, pp. 1–5 (September 2009)Google Scholar
  6. 6.
    Ahmad, S.: Hole 196, Black Hat (2010), http://www.blackhat.com/html/bh-us-10/bh-us-10-home.html
  7. 7.
    Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Communications Magazine, 100–109 (November 2008)Google Scholar
  8. 8.
    Aslam, B., Zou, C.: Distributed Certificate and Application Architecture for Vanets. In: MILCOM, pp. 1–7 (October 2009)Google Scholar
  9. 9.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, 38–47 (February 2004)Google Scholar
  10. 10.
    Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. The International Journal of Computer and Telecommunications Networking, 485–500 (March 2006)Google Scholar
  11. 11.
    Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Hawaii International Conference on System Science, HICSS (2002)Google Scholar
  12. 12.
    Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11–21 (2005)Google Scholar
  13. 13.
    Raya, M., Papadimitratos, P., Hubaux, J.-P.: Securing Vehicular Communications. IEEE Wireless Communications Magazine (October 2006)Google Scholar
  14. 14.
    Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall, Englewood Cliffs (2003)Google Scholar
  15. 15.
    Schaub, F., Kargl, F., Ma, Z., Weber, M.: V-tokens for Conditional Pseudonymity in VANETs. In: Scopigno, R., Cozzetti, H.A. (eds.) Proceedings of IEEE Wireless Communications and Networking Conference, WCNC 2010 (April 2010)Google Scholar
  16. 16.
    Nakagami, M.: The m-Distribution, a general formula of intensity of rapid fading. In: Statistical Methods in Radio Wave Propagation: Proc. Symposium at the University of California. Permagon Press, Oxford (1960)Google Scholar
  17. 17.
    Sklar, B.: Rayleigh Fading Channels in Mobile Digital Communication Systems Part I: Characterization. IEEE Communication Magazine, 90–100 (July 1997)Google Scholar
  18. 18.
    Scopigno, R., Cozzetti, H.A.: Evaluation of Time-Space Efficiency in CSMA/CA and Slotted Vanets. In: IEEE 71th Vehicular Technology Conference, VTC Fall (October 2010)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Luca Pilosu
    • 1
  • Hector Agustin Cozzetti
    • 1
  • Riccardo Scopigno
    • 1
  1. 1.Istituto Superiore Mario BoellaTorinoItaly

Personalised recommendations