Professional Documents
Culture Documents
ABSTRACT
Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile
ad hoc networks which provides a distinguish approach for
intelligent transport system (ITS).An effective and robust
operations as well as security and privacy are critical for
deployment of Vehicular ad hoc Networks (VANET). Efficient
and easy to manage security and privacy enhancing
mechanisms are essential for the wide spread adoption of the
VANET technology. In this paper we have compared the
various security methods and draw a conclusion that Digital
signature scheme is an efficient method for message
authentication.
KEYWORDS: Vehicular Networks, Digital Signatures, Pair
wise Keys, Group Keys.
1. INTRODUCTION
Vehicular communication plays a central role to create safer
and more efficient driving conditions. IVC provides variety of
applications for safety, improving traffic efficiency, driver
assistance & infotainment. To enhance the safety & efficiency
of transportation system vehicles and roadside infrastructure
units (RSUs) i.e. network nodes will be equipped with
onboard processing & wireless communication modules.
Various safety related applications supported by Vehicular
networks are: - 1. Safety related applications e.g early warning
messages, 2.Best effort applications e.g. Infotainment, traffic
optimization, 3. Secure transactions e.g. toll collection. Mostly
the critical messages in VANET are broadcast oriented and
should be delivered in short time. These messages must be
secure and should not leak personnel, identifying or linkable
information to unauthorized parties.
The inherent characteristics of VANET like relatively
uncontrolled operational environment ([1], [2]) the high
mobility of the nodes and the wireless medium make them a
suitable target for abuse and introduce a number of security
challenges to the research community. A number of passive
and active attacks against the vehicular nodes and the
infrastructure has been pointed out .The self organizing
operation and unique features of Vehicular communication [3]
are a double edge sword: a rich set of tools are offered to
drivers and authorities but a formidable set of abuses and
attacks becomes possible. Hence the security of vehicular
Digital
Signature
Low
Saved
Group Keys
High
Wasted
High
Wasted
More
Less
Less
Table A
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
REFRENCES
[1]
[2]
[3]
Maxim
Raya,Panos
Papadimitratos,
and
jean-pierre
Habaux,EPFL ,Securing Vehicular Communications, 1536-1284/06,
IEEE wireless Communication , October 2006.
Maxim Raya , EPFL Jean-pierre Hubaux, EPFL , Security Aspects Of
Inter Vehicle Communications, Conference paper STRC 2005 , 5 th
Swiss transport Research Conference , Monte Veritia/Ascona , March 911 2005.
Maxim Raya and Jean-Pierre Hubaux Securing vehicular ad hoc
networks, Journal of Computer security, IOS Press Amsterdam, The
Netherlands, Volume 15, Issue 1(January 2007), pages 39-68
[24]
[25]
Maxim Raya and Jean Pierre Hubaux, The Security of Vehicular AdHoc Networks , Laboratory of Computer Communication and
applications (LCA) School of computer communication sciences ,
SASN05 , November 7,2005
Kargal, F. Papadimitratos, P. Buttyan, L. Muter, M. Schoch, E.
Wiedersheim, B. Ta-Vinh Thong Calandriello, G. Held, A. Kung, A.
Hubaux, J. -P. Ulm Univ., Ulm Secure Vehicular Communication
Systems: Implementation, Performance and Research Challenges,
IEEE Communication Magazine, Vol. 46 issue: 11, November 2008
P.papadimitratos et al, Secure Vehicular Communications: Design
Architecture IEEE Communication Magazine Nov 2008.
SeVeCom, Secure Vehicular Communications: Security Architecture
and Mechanisms for V2V/V2I, Deliverable 2.1, 2007-2008;
http://www.sevecom.org
T. Leinmuller, Car2X Communication-Challenges, standardization and
Implementation in Europe and in the Us,2007
S.Batkir et al, A state of the Art Elliptic Curve Cryptographic Processor
Operating in the Frequency Domain, Mobile Networks and Apps. J. Vol
12 no 4,2007, pp 259-70
Nasser Mozayani,Maryam Barzegar,Hoda Madani, Strategies for
Securing Safety Messages with Fixed Key Infrastructure in Vehicular
Network, World Academy of Science, Engineering & Technology, 48
2008.
P. Ning, A. Liu, and W. Du. Mitigating DoS attacks against broadcast
authentication in wireless sensor networks. ACM Transactions on
Sensor Networks (TOSN), 2007.
I. Doh, K. Chae, H. Kim, and K. Chung,\Security Enhancement
Mechanism for Ad-Hoc OLSR Protocol," in ICOIN, 2006, pp. 317{326.
S. Sivagurunathan, P. Subathra , V. Mohan, N. Ramaraj , Authentic
Vehicular Environment Using a Cluster Based Key Management,
European Journal of Scientific Research ISSN 1450-216X Vol.36 No.2
(2009), pp.299-307
Emanuel Fonseca, Andreas Festag, 2006, A Survey of Existing
Approaches for Secure Ad Hoc Routing and Their Applicability to
VANETS, NEC Technical Report NLE-PR-2006-19,NEC Network
Laboratories.
Charalampos Konstantopoulos, Damianos Gavalas,Grammati Pantziou,
2008, Clustering in mobile ad hoc networks through neighborhood
stability-based mobility prediction, Elsevier
Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux,
Antonio Lioy, Efficient and Robust Pseudonymous Authentication in
VANET, VANET07, September 10, 2007, Montral, Qubec, Canada.
Copyright 2007 ACM 978-1-59593-739-1/07/0009
F. Armknecht, A. Festag, D. Westho., and K. Zeng. Cross-layer privacy
enhancement and non-repudiation in vehicular communication. In
WMAN 2007, Bern, March 2007.
IEEE1609.2. IEEE trial-use standard for wireless access in vehicular
environments - security services for applications and management
messages, July 2006.
J. Guo, J.P. Baugh, and S. Wang, A Group Signature Based Secure and
Privacy-Preserving Vehicular Communication Framework, Proceedings
of the Mobile Networking for Vehicular Environments (MOVE)
workshop in conjunction with IEEE INFOCOM, May 2007.
Christine Laurendeau and Michel Barbeau, Secure Anonymous
Broadcasting in Vehicular Networks, Proceedings of the 32nd IEEE
Conference on Local Computer Networks (LCN), October 2007
Anjum F, Mouchtaris P, Security For Wireless Ad Hoc Networks,
Wiley-Interscience Publishing, chapter 8, IEEE 2007.
S. Rahman and U. Hengartner, Secure crash reporting in vehicular ad
hoc networks in Third International Conference on Security and
Privacy in Communication Networks (SecureComm 2007). New York,
NY, USA: To appear, 2007.
P. Cencioni and R. Di Pietro, Vipe: A vehicle-to-infrastructure
communication privacy enforcement protocol, IEEE Internatonal
Conference on Mobile Adhoc and Sensor Systems, 2007. MASS 2007,
pp. 1-6, 8-11 Oct. 2007.
M. Raya, A. Aziz, and J.P. Hubaux, Efficient secure aggregation in
vanets in VANET '06: Proceedings of the 3rd international workshop
on Vehicular ad hoc networks. New York, NY, USA: ACM, 2006, pp.
67-75.