A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu
|
|
- Evan Heath
- 5 years ago
- Views:
Transcription
1 A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu
2 Outline Introduction to Vehicular Networks Motivation System Model Secure Key Distribution Scheme Evaluation & Analysis Conclusion
3 Introduction to Vehicular Networks Vehicular Ad hoc Networks (VANET) are a special type of Mobile Ad hoc Networks (MANETs) with fast-moving vehicular nodes, dynamically changing topology. VANETs allow vehicles to share safety and traffic information such as weather information, broadcasting emergency condition, navigations etc.
4 Vehicular Networking Source: Vehicular Networking: Standards, Protocols, Applications, and Deployment Plans, Tutorials, 2015 IEEE CCNC
5 Electronics in the vehicle Individual functions (like detecting seat occupancy) are performed by individual embedded systems, called Electronic Control Units (ECUs) essentially a ruggedized miniature computer, typically based on a microcontroller, that can gather data from attached sensors or trigger attached actuators
6 Extension to Vehicle-to-Vehicle Communications The next stage is to connect the in-vehicle network of a car with other cars, as well as with its environment, to open a whole set of new possibilities
7 Typical Connections Specifically designed protocols between Roadside Units (RSU) and vehicles; and vehicles to vehicles: IEEE WAVE, IEEE p, ITS-G5, ARIB T109
8 Vehicular Networking Objectives Safety-relevant information can be exchanged that can not be obtained using local sensors Enables the driver to see through and ahead other vehicles, buildings and environment Potential to improve driving comfort Potential to reduce congestion and thus environmental impact And, sometime in the future, enable fully automated rides
9 Cooperative Safety Systems Some Examples
10 Security Issues Propagation of falsified warning messages can mislead towards an accident and damage the life/property. Various Attacks in VANETs: bogus information attacks spoofing attacks (Identity, speed, position) privacy attacks
11 Real World Attack #1: RollJam Rolling Code for Keyless Entry unlock #n unlock #n+1 unlock #n+2 /17
12 Real World Attack #1: RollJam jam and capture #nnot opened! unlock #n jam and capture #n+1 unlock #n+1 replay #n opened! replay #n+1 opened! /17
13 Real World Attack #2: VW RKE Hack In USENIX Security 2016, Garcia et al. present that only 4 encryption keys are universally used over 100M vehicles produced by VW group over the 20 years. 1 /17
14 Real World Attack #3: FCA Jeep Hack After the first release in 7/21/2015, it drew significant media attention. FCA Jeep Cherokee remotely controlled by Charlie Miller and Chris Valasek. On 7/24/2015, FCA issued a recall to 1.4M vehicles. FCA SDN TCU Hackers IVI CAN bus PCM BCM FCA Jeep Cherokee /17
15 Real World Attack #4: Remote Tesla Model S Hack /17
16 Motivation It is difficult to store/manage all keys in a vehicle. Centralized trusted authority has high burden of generating and managing the group public/private keys. Another challenge in VANETs is delivering group private keys securely from the key generator to vehicular nodes. A group is confined to the coverage of a road side unit (RSU). Thus, our goal is to mitigate frequent key updates requirement and to make the key management process more efficient and scalable.
17 Related Works Chaum et al. [4] introduced group signatures for anonymous authentication, which employs several group keys corresponding to one group public key. Sun et al. [14] proposed a pseudonymous authentication for vehicular communication to provide anonymity and traceability. A distributed key management framework [5] distributes the group key with the help of RSUs. However, frequent key establishment has not been addressed. Also, delivering the group keys in a secure manner is crucial.
18 System Model Overview of the System Model
19 System Model Trusted Authority (TA): Vehicles are registered by the trusted authority and provided the certificates. TA and RSUs are securely connected by the stable backbone network. TA can help RSUs to identify the real identity of vehicles on request. Vehicular Nodes: Vehicular nodes are vehicles on the road which are equipped with an on-board unit (OBU) for computation and communication, a global positioning system (GPS) for location service, and an interface for interacting with drivers.
20 System Model Road Side Units (RSU) and Domain: RSUs are the infrastructure deployed along the road side which play an important role in key management, message authentication/verification, and message dissemination. A group of RSUs forms a domain. The number of RSUs within a domain can be determined based on the geographical status, infrastructure capacity, deployment plan and vehicle demography. RSUs are further classified into member RSUs (M-RSU) and leader RSUs (L-RSU).
21 System Model Leader Road Side Units (L-RSU): The L-RSUs coordinate with the trusted authority and generates the group private keys and group public keys for the vehicles. The L-RSUs also manage and maintain the database of the group keys. Upon detecting suspicious behavior, the L-RSUs communicate with the TA to reveal the identity of the malicious vehicle. Member Road Side Units (M-RSU): Unlike LRSUs, M-RSUs do not perform the key generation and management process, but instead M-RSUs can help vehicles to obtain the group keys from a leader RSU. Thereby, M-RSUs are semi-trust with the medium security level. Once the vehicle gets the group key, it can communicate with any M-RSU inside a domain with the same key.
22 Proposed Scheme The proposed protocol utilizes short group signature protocol[14] to generate a group private key. The leader RSU as a key generator issues group private keys within a domain. In a domain which consists of multiple RSUs, there are one group public key and many corresponding group private keys so any member of a domain can sign messages. A vehicle can use the same group key with multiple RSUs within a domain without having to initiate a key establishment process.
23 Proposed Scheme Figure illustrates how vehicles can request a group private key to the leader RSU within a domain.
24 Secure Key Distribution Scheme As a vehicle enters an area of a domain, it can communicate with any RSU to securely obtain group public/private key pair. The secure key distribution scheme is based on the Diffie- Hellman key agreement protocol for mutual authentication and sharing a symmetric key. Vehicles and M-RSU shares the related parameters to get the symmetric key. g ab serves as the secret key K Vi_MR between Vi and M-RSU
25 Secure Key Distribution Scheme After establishing a symmetric key, vehicle requests for the group keys to M-RSU. M-RSU forwards the request to the L-RSU. L-RSU replies to M-RSU with the group keys for the vehicle. Finally, M-RSU transmits the group keys to vehicle using the shared symmetric keys.
26 Secure Key Distribution Scheme Domain M-RSU m4 m5 L-RSU m1 m3 m6 m2 Our Protocol Flow M-RSU Regular Communication
27 Secure Key Distribution Scheme
28 Evaluation & Analysis Simulation Setup Manhattan Grid environment simulated in the Network Simulator NS-2 and the mobility simulator SUMO. Map of 3600*3600 square meters.
29 Key Establishment
30 Key Establishment When the domain of multiple RSUs is not considered, vehicles have to perform the key exchange procedure with each and every RSUs separately. The figure shows how the average number of key establishment changes as the vehicles are moving with/without using domains. Here, domain has the area covered by four RSUs with the vehicles moving randomly.
31 Key Establishment Delay Comparison [14]
32 Key Establishment Comparison The computation time of the group signature [14] measured that the signing and the verification delays are 3.6 ms and 7.2 ms for key transaction. The signing and verification process of the 16 key establishments without using domain takes 16*( ) ms (172.8 ms). On the other hand, while using the domain size of four RSUs, the time taken for signing and verification of four key establishments is 4*( ) ms (43.2 ms).
33 Key Establishment Comparison Thus, with the domain size of only four RSUs, the timetaken for key establishment of the randomly moving vehicles is 43.2 ms which is 400% more efficient compared to the ms (time taken for key establishment without domain). In practice, the domain size is likely to be higher, so it can be expected that our scheme will achieve more efficiency.
34 Group Key Utilization Group key utilization time is the time that the vehicle travels inside the domain after establishing the key. Group key utilization time can be used to consider the frequency of the group key usage in domains and get idea about average travel time of the vehicles in various. The Figure shows the group key utilization time for different size of vehicles after receiving the group keys under the different size of domain.
35 Group Key Utilization
36 Group Key Utilization It is observed that the vehicles spends around seconds in one RSU on average. And the average travel time is continuously increasing as the size of the domain increases. When there are four RSUs within a domain, it is observed that the moving vehicles utilize the group key about 200% more than the moving vehicles without having a group key for the domain.
37 Conclusion Our scheme provides the scalable solution for the security of the vehicular networking by using the concept of domain with multiple RSUs so that a group key can be utilized for a longer period of time. In addition, by splitting the role of the RSU to member RSU and leader RSU, our approach provides the distributed key management mechanism. Furthermore, our scheme offers the secure key exchange protocol which allows that group keys can be securely delivered to vehicular nodes.
38 References [1] H. Hartenstein and K. Laberteaux, VANET vehicular applications and inter-networking technologies. John Wiley & Sons, 2009, vol. 1. [2] P. Papadimitratos, A. De La Fortelle, K. Evenssen, R. Brignolo, and S. Cosenza, Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation, IEEE Communications Magazine, vol. 47, no. 11, [3] M. Raya and J.-P. Hubaux, Securing vehicular ad hoc networks, Journal of computer security, vol. 15, no. 1, pp , [4] D. Chaum and E. Van Heyst, Group signatures, in Advances in CryptologyEUROCRYPT91. Springer, 1991, pp [5] Y. Hao, Y. Cheng, C. Zhou, and W. Song, A distributed key manage- ment framework with cooperative message authentication in vanets, IEEE Journal on selected areas in communications, vol. 29, no. 3, pp , [6] P. Vijayakumar, M. Azees, A. Kannan, and L. J. Deborah, Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp , [7] T. W. Chim, S.-M. Yiu, L. C. Hui, and V. O. Li, VSPN: VANET- based secure and privacy-preserving navigation, IEEE Transactions on Computers, vol. 63, no. 2, pp , [8] R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, ECPP: efficient conditional privacy preservation protocol for secure vehicular communications, in Proceeding of IEEE INFOCOM 27th Conference on Computer Communications, IEEE, 2008, pp [9] W. Diffie and M. Hellman, New directions in cryptography, IEEE transactions on Information Theory, vol. 22, no. 6, pp , [10] M. Gerlach, Assessing and improving privacy in VANETs, ESCAR, Embedded Security in Cars, [11] J. Freudiger, M. Raya, M. Fe ĺegyha źi, P. Papadimitratos, and J.-P. Hubaux, Mix-zones for location privacy in vehicular networks, in Proceedings of ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), no. LCA-CONF , [12] L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, Enhancing wireless location privacy using silent period, in Proceedings of Wireless Com- munications and Networking Conference, 2005 IEEE, vol. 2. IEEE, 2005, pp [13] K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, AMOEBA: robust location privacy scheme for VANET, IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, [14] X. Sun, X. Lin, and P.-H. Ho, Secure vehicular communications based on group signature and id-based signature scheme, in Proceedings of IEEE ICC International Conference, IEEE, 2007, pp [15] IEEE Standard , IEEE standard for wireless access in vehicular environments security services for applications and management messages, IEEE Xplore, pp , [16] S. S. Rosen, Tamper-proof electronic processing device, Jul , us Patent 6,088,797. [17] K. Lim and D. Manivannan, An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks, Vehicular Communications, vol. 4, pp , [18] M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in Proceedings of IEEE INFOCOM 27th Conference on Computer Com- munications, IEEE, 2008, pp [19] NS-2, [20] simulation of urban mobility, [21] I. I. of highway safety, Jan [22] R. L. Rivest and A. Shamir, How to expose an eavesdropper, Com- munications of the ACM, vol. 27, no. 4, pp , 1984.
39
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com
More informationEXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION
EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.
More informationPrivacy in VANET using Shared Key Management
Privacy in VANET using Shared Key Management Jessy Paul 1, Elizabeth Saju 2, Mercy Joseph Poweth 3 Professor, Dept. of Civil Engineering, MACE, Kothamangalam, Kerala, India P.G Student, Dept. of Computer
More informationLocation Privacy Protection in Contention Based Forwarding for VANETs
Location Privacy Protection in Contention Based Forwarding for VANETs Qing Yang Alvin Lim Xiaojun Ruan and Xiao Qin Computer Science and Software Engineering Auburn University, Auburn, AL, USA 36849 Email:
More informationEfficient Authentication and Congestion Control for Vehicular Ad Hoc Network
Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,
More informationPrivacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH
Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks
More informationShort-term Linkable Group Signatures with Categorized Batch Verification
Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical
More informationMessage Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 1, January 2015 Message Authentication Scheme for Vehicular Ad-Hoc Wireless
More informationImproving Energy Efficiency of VANET based Secure and Privacy Preserving Navigation Scheme using LTE
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): 2349-6010 Improving Energy Efficiency of VANET based Secure and Privacy Preserving
More informationAn Efficient Data Transmission in VANET Using Clustering Method
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission
More informationPMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks
PMAP: Precipitate Message Authentication Protocol for Vehicular Ad Hoc Networks J.Sahana, PG Scholar Department of Computer Science and Engineering Sree Sowdambika College of Engineering Aruppukottai,
More informationEnhancing Security on Vehicular Adhoc Networks using EMAP-HMAC
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Page No.: 704-711 Volume-5, Issue-2, April-2015 International Journal of Engineering and Management Research Enhancing Security on Vehicular
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationMitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks
Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks Nizar Alsharif, Albert Wasef, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University
More informationAd-hoc Trusted Information Exchange Scheme for Location Privacy in VANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationISSN Vol.03,Issue.36 November-2014, Pages:
ISSN 2319-8885 Vol.03,Issue.36 November-2014, Pages:7151-7157 www.ijsetr.com Implementation of Expedite Message Authentication Protocol for Vehicular Ad-Hoc Networks SHAIK PATTA ABDUL KHAYUM 1, C. MD GULZAR
More informationA Study of Message Authentication Protocol with Reduced Computation in Vehicular Ad-hoc Network
A Study of Message Authentication Protocol with Reduced Computation in Vehicular Ad-hoc Network Jaishma Kumari B Assistant Professor, Department of Computer Science and Engineering, Srinivas Institute
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationAn Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs
An Effective Strategy for Trusted Information Scheme for Location Privacy in VANETs Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology, Chennai rakeshkumarer@gmail.com,
More informationA Surveying on Road Safety Using Vehicular Communication Networks
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 A Surveying on Road Safety Using Vehicular Communication Networks Padmavathi K Asst. Professor, Department
More informationAccepted Manuscript. An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Kiho Lim, D.
Accepted Manuscript An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks Kiho Lim, D. Manivannan PII: S2214-2096(16)00011-5 DOI: http://dx.doi.org/10.1016/j.vehcom.2016.03.001
More informationPenang, Malaysia 1 3 * School of Computer Science, Universiti Sains Malaysia. Penang, Malaysia 2
Security Issues and Challenges of Vehicular Ad Hoc Networks (VANET) Ghassan Samara #1, Wafaa A.H. Al-Salihy *2, R. Sures #3 # National Advanced IPv6 Center, Universiti Sains Malaysia Penang, Malaysia 1
More informationSybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks
Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1
More informationSecurity of vehicular communications. Vehicular communication (VC) systems
Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:
More informationEnhanced Management of Certificate Caching and Revocation Lists in VANET
Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security
More informationIntroduction to Vehicular Networks
CS 795/895 Vehicular Networks Introduction to Vehicular Networks Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/courses/cs795-s07/
More informationAUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES
AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES ISSN:1991-8178 EISSN: 2309-8414 Journal home page: www.ajbasweb.com Certificate Revocation List Distribution using Minimum Spanning Tree 1 Anitha G. and
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationSecurable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority
Securable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority Ranjitha. P Final Year M.Tech CSE, Vedavyasa Institute of Technology,Calicut Abstract The number of automobiles
More informationPseudonym Based Security Architecture for Wireless Mesh Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network
More informationScalable privacy-enhanced traffic monitoring in vehicular ad hoc networks
Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks Yi Liu1,2,3 Jie Ling 1 Qianhong Wu4,6 Bo Qin5 Presented By Khaled Rabieh Introduction & Problem Statement In traffic monitoring
More informationInternational Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016
RESEARCH ARTICLE OPEN ACCESS Proxy Based Batch Authentication Scheme for Vehicular Ad Hoc Network Godavari H. Kudlikar [1], Sunita S. Barve [2] Department of Computer Science and Engineering Savitribai
More informationA Study of Privacy Preserving Authentication for Safety Message Communication in VANET
International Conference on Mathematical Computer Engineering - ICMCE - 2013 239 A Study of Privacy Preserving Authentication for Safety Message Communication in VANET Y. Bevish Jinila 1, K. Komathy 2
More informationEnhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization
Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationDedicated Short Range Communication: What, Why and How?
Dedicated Short Range Communication: What, Why and How? Imran Hayee EE Department, University of Minnesota Duluth Connected Vehicles Research Lab (http://www.d.umn.edu/ee/cvrl/index.html) Outline Background
More informationPrivacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach
Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach Jianbing Ni, Xiaodong Lin, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University
More informationMLAS: Multiple level authentication scheme for VANETs
Title MLAS: Multiple level authentication scheme for VANETs Author(s) Chim, TW; Yiu, SM; Hui, LCK; Li, VOK Citation The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011),
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,
More informationLTE and IEEE802.p for vehicular networking: a performance evaluation
LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction
More informationOn Reputation and Data-centric Misbehavior Detection Mechanisms for VANET
On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET by Zhen Huang Thesis submitted to the Faculty of Graduate and Postgraduate Studies In partial fulfillment of the requirements For
More informationSURVEY: Reputation and Trust Management in VANETs
, pp. 301-306 http://dx.doi.org/10.14257/ijgdc.2015.8.4.29 SURVEY: Reputation and Trust Management in VANETs Jitendra Singh Sengar BVM College of Technology & Management, Gwalior, MP, India jitendrasinghsengar@gmail.com
More informationAnalyzing Routing Protocols Performance in VANET Using p and g
Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University
More informationInternational Journal of Information Movement. Website: ISSN: (online) Pages
REVIEW: VANET ARCHITECTURES AND DESIGN Chetna Research Scholar Department Of Electronic & Communication Engg. Galaxy Global Group of Institutions, Dinarpur Saranjeet Singh Faculty Department of Electronic
More informationSecure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure
KTH ROYAL INSTITUTE OF TECHNOLOGY Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure Mohammad Khodaei and Panos Papadimitratos Networked Systems
More informationEvaluation of Information Dissemination Characteristics in a PTS VANET
Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de
More informationPrivacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature
International Journal of Network Security, Vol.17, No.2, PP.135-141, Mar. 2015 135 Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature Shengke Zeng, Yuan Huang, and
More informationHMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks
HMEP: Hasten Message Endorsement Protocol for Vehicular Ad hoc Networks D.Thriveni 1, G.T.Prasanna Kumari 2 1 M.Tech Student, S.V.Engineering College for Women, Tirupati, India 2 Associate Professor, Dept.
More informationVarious Issues in Vehicular Ad hoc Networks : A Survey
International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 399-403 Various Issues in Vehicular Ad hoc Networks : A Survey Shinde S. S. 1 & Patil S. P 2 1,2 Annasaheb
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationA Review on Security in Vehicular Ad-hoc Networks
A Review on Security in Vehicular Ad-hoc Networks Ramandeep Kaur 1, Er. Rupinderpal Singh 2 1M.Tech Scholar Computer Science & Engineering Department 2Asst. Prof. in Computer Science & Engineering Department
More informationAdaptive Privacy-Preserving Authentication in Vehicular Networks (Invited Paper)
Adaptive Privacy-Preserving Authentication in Vehicular Networks (Invited Paper) Kewei Sha 1, Yong Xi 1, Weisong Shi 1, Loren Schwiebert 1, and Tao Zhang 2 1 Department of Computer Science, Wayne State
More informationSOCIAL-BASED TRUSTWORTHY DATA FORWARDING IN VEHICULAR DELAY TOLERANT NETWORKS
SOCIAL-BASED TRUSTWORTHY DATA FORWARDING IN VEHICULAR DELAY TOLERANT NETWORKS by Abdulelah Alganas A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationConditional privacy-preserving authentication using registration list in vehicular ad hoc networks.
Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. Item type Authors Citation DOI Publisher Journal Rights Article Zhong, Hong; Huang, Bo; Cui, Jie; Xu,
More informationVANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe
VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation
More informationMobile-Gateway Routing for Vehicular Networks 1
Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,
More informationAN EFFICIENT AUTHENTICATION SCHEME WITH PRIVACY PRESERVING FOR VEHICULAR AD-HOC NETWORKS
0 0 0 AN EFFICIENT AUTHENTICATION SCHEME WITH PRIVACY PRESERVING FOR VEHICULAR AD-HOC NETWORKS Ye Li Tongji University The Key Laboratory of Road and Traffic Engineering, Ministry of Education 00 Cao an
More informationENSC 427, Spring 2012
ENSC 427, Spring 2012 Outline A Study of VANET Networks Introduction DSRC channel allocation Standards : IEEE 802.11p + IEEE 1604 PHY LAYER MAC LAYER Communication Walkthrough Ns-3, Node Mobility, SUMO
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More informationD.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3
Fast and Secure Countermand Verification Process Using MAP in VANET D.David Neels Ponkumar 1, Janeshwari.S 2, Gomathi Sankari.A 3 1 Profeesor, Einstein College of Engineering, david26571@gmail.com 2 PG
More informationAMOEBA: Robust Location Privacy Scheme for VANET
AMOEBA: Robust Location Privacy Scheme for VANET Krishna Sampigethaya, Mingyan Li, Leping Huang, and Radha Poovendran Abstract Communication messages in vehicular ad hoc networks (VANET) can be used to
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More informationAn RSU Aided Distributed Certificate Update Scheme In Vehicular Networking Environment. Sunil Solanki * *
An RSU Aided Distributed Certificate Update Scheme In Vehicular Networking Environment. Sunil Solanki * * PG Scholar, Department of Computer Engineering, L D College of Engg., (Gujarat Technological University),
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationGRAS: A Group Reliant Authentication Scheme for V2V communication in VANET
GRAS: A Group Reliant Authentication Scheme for V2V communication in VANET Auxeeliya Jesudoss jauxeeliya@nur.ac.rw National University of Rwanda Butare, Rwanda Sulaiman Ashraph asulaiman@nur.ac.rw National
More informationVehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan
Vehicular Cloud Computing: A Survey Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan OUTLINE OF TOPICS INTRODUCETION AND MOTIVATION TWO-TIER VEHICULAR
More informationDr. Panos Papadimitratos
Dr. Panos Papadimitratos Ecole Polytechnique Fédéral de Lausanne (EPFL) 2 Security in Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) Communications Security and Privacy Why? 3 o Safety (?)
More informationITS (Intelligent Transportation Systems) Solutions
Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society ITS (Intelligent Transportation Systems) Solutions By Makoto MAEKAWA* Worldwide ITS goals for safety and environment
More informationMAC Protocols for VANETs
MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM
More informationTowards Secure Virtual Machine Migration in Vehicular Cloud Environment
, pp.85-89 http://dx.doi.org/10.14257/astl.2014.66.21 Towards Secure Virtual Machine Migration in Vehicular Cloud Environment Nkenyereye Lewis and Kyung Hyune Rhee 1 1 Department of IT Convergence and
More informationEFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS
EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of
More informationAn Experimental Analysis of the SAE J1939 Standard
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard 10th USENIX Workshop On Offensive Technologies (WOOT 16) Liza Burakova, Bill Hass, Leif Millar & Andre Weimerskirch Are trucks more secure
More informationTOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks
2017 31st International Conference on Advanced Information Networking and Applications Workshops TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks JunSik Jeong, Yiwen
More informationMultiprotocol Label Switching in Vehicular Ad hoc Network for QoS
Information Management and Business Review Vol. 6, No. 3, pp. 115-120, Jun 2014 (ISSN 2220-3796) Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS * Kashif Naseer Qureshi, Abdul Hanan Abdullah
More informationPrivacy Preserving Authentication Approaches in VANET: Existing Challenges and Future Directions
IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.4, April 2018 47 Privacy Preserving Authentication Approaches in VANET: Existing Challenges and Future Directions Ubaidullah
More informationCOOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY
COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.
More informationContext-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions
Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National
More informationBUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications
BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer
More informationResearch Issues on Vehicular Ad hoc Network
Research Issues on Vehicular Ad hoc Network Md. Humayun Kabir Department of Computer Science & Engineering University of Rajshahi, Rajshahi, Bangladesh. Abstract Vehicular Ad Hoc Network (VANET) is a kind
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More informationRouting Protocol with Quality Optimization for Vehicular Ad Hoc Networks
Routing Protocol with Quality Optimization for Vehicular Ad Hoc Networks E. Priyanka 1, M.Vijaya Kanth 2 M.Tech, Department of CSE, JNTUACE, Ananthapuramu, Andhra Pradesh, India 1 Lecturer, Department
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationLESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT
LESSONS LEARNED: SECURITY AND PRIVACY IN SAFETY PILOT MODEL DEPLOYMENT André Weimerskirch, Scott Bogard, Debby Bezzina University of Michigan Transportation Research Institute 2901 Baxter Road Ann Arbor,
More informationGLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS A.Robertsingh 1, Suganya A 2 1 Asst.Prof, CSE, Kalasalingam University, Krishnankoil, India 2 Asst.Prof, CSE, Kalasalingam University,
More informationICMP and Monitoring to Detect and Isolate Sybil Attack in VANET
ICMP and Monitoring to Detect and Isolate Sybil Attack in VANET Jaydeep P. Kateshiya 1, Anup Parkash Singh 2 P.G. Student, Department of Computer Engineering, Lovely Professional University, Punjab, India
More informationCollaborative Security Attack Detection in Software-Defined Vehicular Networks
Collaborative Security Attack Detection in Software-Defined Vehicular Networks APNOMS 2017 Myeongsu Kim, Insun Jang, Sukjin Choo, Jungwoo Koo, and Sangheon Pack Korea University 2017. 9. 27. Contents Introduction
More informationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 6, NOVEMBER /$ IEEE
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 6, NOVEMBER 2008 3357 An Efficient Message Authentication Scheme for Vehicular Communications Chenxi Zhang, Student Member, IEEE, Xiaodong Lin, Rongxing
More informationCooperative Message Authentication in Vehicular Cyber-Physical Systems
IEEE TRANSACTIONS ON Received 2 April 213; revised 3 May 213; accepted 29 June 213. Date of publication 12 July 213; date of current version 2 September 213. Digital Object Identifier 1.119/TETC.213.2273221
More informationEmergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo
Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)
More informationIntelligent Transportation System For Vehicular Ad-Hoc Networks
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 6 69 Intelligent Transportation System For Vehicular Ad-Hoc Networks T. Sujitha, S. Punitha Devi Department
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationTACKing Together Efficient Authentication, Revocation, and Privacy in VANETs
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs Ahren Studer, Elaine Shi, Fan Bai, & Adrian Perrig Carnegie Mellon University General Motors {astuder, rshi, perrig}@cmu.edu
More informationA Review on Vehicular Ad-Hoc Network
A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,
More informationATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks
International Journal of Network Security, Vol.13, No.2, PP.71 78, Sept. 2011 71 ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks Wei Hu, Kaiping Xue, Peilin Hong,
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationWireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios
Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios Jatinder Pal Singh, Nicholas Bambos Department of Electrical Engineering Stanford University, CA 943 {jatinder, bambos}@stanford.edu
More information