Abstract
The need for safety and comfort in vehicular environments has led to a lot of research in vehicular ad-hoc networks (VANET), ranging from vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications to security. As regards the latter aspect, mostly the focus has been on resorting to public key infrastructure (PKI) and its related concepts. Moreover, methods used to detect the most feared security attacks are based almost exclusively on the use of physical characteristics as well as PKI concepts or both. However with emerging technologies that enable connecting a vehicle to external resources, VANET is evolving, thus inheriting security threats that are common place in conventional IT systems. Therefore, as it is shown in the paper, VANET security must go beyond cryptographic-centric mechanisms that are commonly used for providing data security in wireless environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Fischer, L., Aijaz, A., Eckert, C., Vogt, D.: Secure revocable anonymous authenticated inter-vehicle communication (SRAAC). In: 4th Workshop on Embedded Security in Cars (ESCAR 2006), (2006)
Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of anonymity in VANETs-putting pseudonymity into practice. In: Wireless Communications and Networking Conference, IEEE WCNC 2007, pp. 3400–3405 (2007)
Sun, X., Lin, X., Ho, P.-H.: Secure vehicular communications based on group signature and ID-based signature scheme. In: Proceedings of International Conference on Communications (ICC’07), Scotland (2007)
Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using group signature. In: Proceedings of the IEEE WCSN’09, pp. 91–96 (2008)
Wasef, A., Jiang, Y., Shen, X.: DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans. Veh. Technol. 59, 533–549 (2010)
Laberteaux, K.P., Haas, J.J., Hu, Y.C.: Security certificate revocation list distribution for VANET. In: Proceedings of the Fifth ACM Workshop on Vehicular Networks (2008)
Wen, H., Ho, P.H., Gong, G.: A novel framework for message authentication in vehicular communication network. In: Proceedings of the IEEE GLOBECOM’09, pp. 1–6 (2009)
Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of the IEEE INFOCOM ’08, pp. 89–824 (2008)
Lee, E., Lee, E.-K., Gerla, M.: Vehicular cloud networking: architecture and design principles. IEEE Commun. Mag. pp. 148–155 (2014)
Yan, G., Wen, D., Olariu, S., Weigle, M.C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 284–294 (2013)
Goudarzi, S. et al.: A systematic review of security in vehicular ad hoc network. In: Proceedings of 2nd Symposium on Wireless Sensors and Cellular Networks (WSCN’13), Jeddah, Saudi Arabia, 13–16 Dec 2013
Pitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley, Boston (2000)
Gantsou, D., Sondi, P.: Toward a honeypot solution for proactive security in vehicular ad hoc networks. In: Future Information Technology. Lecture Notes in Electrical Engineering, vol. 276, pp. 145–150 (2014)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268 (2004)
Douceur, J.R.: The Sybil attack. In: Proceedings of 1st IPTPS, Mar 2002, pp. 251–260 (2002)
Chen, Y., Yang, J., Trappe, W., Martin, R.P.: Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Trans. Veh. Technol. 59(5), 2418–2434 (2010)
Zhang, Q., Wang, P., Reeves, D., Ning, P.: Defending against Sybil attacks in sensor networks. In: Proceedings of 25th IEEE ICDCSW, June 2005, pp. 185–191 (2005)
Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of OSDI, pp. 173–186 (1999)
Banerjea, A.: A taxonomy of dispersity routing schemes for fault-tolerant real-time channels. In: Proceedings of ECMAST 1999, vol. 26, pp. 129–148 (1999)
Chen, B., Jamieson, K., Balakrishnan, H., Morris, R.: Span: an energy efficient coordination algorithm for topology maintenance in ad hoc wireless networks. ACM Wirel. Netw. J. 8(5), 481–494 (2002)
Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2004), pp. 29–37 (2004)
Yu, B., Xu, C.-Z., Xiao, B.: Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. (2013). doi:10.1016/j.jpdc.2013.02.001J
Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against Sybil attack in vehicular ad hoc network based on roadside unit support. In: Proceedings of Military Communications Conference (2009)
Wahab, O.A., Otrok, H., Mourad, A.: VANET QoS-OLSR: QoS-based clustering protocol for vehicular ad hoc networks. Comput. Commun. 36, 1422–1435 (2013)
CLausen, T., Jacquet, P. (eds.): Projet Hipercom, INRIA. Oct 2003
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Gantsou, D. (2015). Invited Paper: VANET Security: Going Beyond Cryptographic-Centric Solutions. In: Laouiti, A., Qayyum, A., Mohamad Saad, M. (eds) Vehicular Ad-hoc Networks for Smart Cities. Advances in Intelligent Systems and Computing, vol 306. Springer, Singapore. https://doi.org/10.1007/978-981-287-158-9_4
Download citation
DOI: https://doi.org/10.1007/978-981-287-158-9_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-287-157-2
Online ISBN: 978-981-287-158-9
eBook Packages: EngineeringEngineering (R0)