The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2011 vol.8)
pp: 898-912
Giorgio Calandriello , Politecnico di Torino, Torino
Panos Papadimitratos , LCA, IC, EPFL, Lausanne
Jean-Pierre Hubaux , LCA, IC, EPFL, Lausanne
Antonio Lioy , Politecnico di Torino, Torino
Vehicular communication (VC) systems are being developed primarily to enhance transportation safety and efficiency. Vehicle-to-vehicle communication, in particular, frequent cooperative awareness messages or safety beacons, has been considered over the past years as a main approach. Meanwhile, the need to provide security and to safeguard users' privacy is well understood, and security architectures for VC systems have been proposed. Although technical approaches to secure VC have several commonalities and a consensus has formed, there are critical questions that have remained largely unanswered: Are the proposed security and privacy schemes practical? Can the secured VC systems support the VC-enabled applications as effectively as unsecured VC would? How should security be designed so that its integration into a VC system has a limited effect on the system's performance? In this paper, we provide answers to these questions, investigating the joint effect of a set of system parameters and components. We consider the state-of-the-art approach in secure VC, and we evaluate analytically and through simulations the interdependencies among components and system characteristics. Overall, we identify key design choices for the deployment of efficient, effective, and secure VC systems.
Security and protection, wireless communication, reliability, availability, and serviceability.
Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, Antonio Lioy, "On the Performance of Secure Vehicular Communication Systems", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 6, pp. 898-912, November/December 2011, doi:10.1109/TDSC.2010.58
[1] IEEE1609.2, “IEEE Trial-Use Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management Messages,” July 2006.
[2] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, “Secure Vehicular Communication Systems: Design and Architecture,” IEEE Comm. Magazine, vol. 46, no. 11, pp. 100-109, Nov. 2008.
[3] F. Kargl, P. Papadimitratos, L. Buttyan, M. Müter, B. Wiedersheim, E. Schoch, T.-V. Thong, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux, “Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges,” IEEE Comm. Magazine, vol. 46, no. 11, pp. 110-118, Nov. 2008.
[4] “NoW: Network on Wheels,” http:/ de/, 2010.
[5] “The Car-to-Car Communication Consortium,” http:/www., 2010.
[6] “The eSafety eSecurity Working Group,” http://www. esafety_activities/esafetyworking_ groups esecurity.htm, 2009.
[7] “DSRC: Dedicated Short Range Communications,” http:// dsrcindex.html, 2009.
[8] G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, “Efficient and Robust Pseudonymous Authentication in VANET,” Proc. Fourth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '07), Sept. 2007.
[9] P. Papadimitratos, G. Calandriello, A. Lioy, and J.-P. Hubaux, “Impact of Vehicular Communication Security on Transportation Safety,” Proc. IEEE INFOCOM, Apr. 2008.
[10] “IEEE P802.11p/D3.0, Draft Amendment for Wireless Access in Vehicular Environments (WAVE),” July 2007.
[11] “Dedicated Short Range Communication at 5.9 GHz Standards Group,” dsrc5ghz-b.htm, 2009.
[12] “ISO TC204 Working Group 16,” http:/, 2010.
[13] P. Papadimitratos, G. Mezzour, and J.-P. Hubaux, “Certificate Revocation List Distribution in Vehicular Communication Systems,” Proc. Fifth ACM Int'l Conf. Vehicular Ad Hoc Networks (VANET '08), Sept. 2008.
[14] P. Papadimitratos, L. Buttyan, J.-P. Hubaux, F. Kargl, A. Kung, and M. Raya, “Architecture for Secure and Private Vehicular Communications,” Proc. Seventh Int'l Conf. ITS Telecomm. (ITST '07), June 2007.
[15] D. Chaum and E. van Heyst, “Group Signatures,” Proc. 10th Ann. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '91), Apr. 1991.
[16] G. Ateniese and G. Tsudik, “Group Signatures à la carte,” Proc. 10th Ann. ACM-SIAM Symp. Discrete Algorithms (SODA '99), Jan. 1999.
[17] P. Syverson and S. Stubblebine, “Group Principals and the Formalization of Anonymity,” Proc. Symp. First World Congress on Formal Methods (FM '99), Sept. 1999.
[18] E. Brickell, J. Camenisch, and L. Chen, “Direct Anonymous Attestation,” Proc. 11th ACM Conf. Computer and Comm. Security (CCS '04), Oct. 2004.
[19] D. Boneh, X. Boyen, and H. Shacham, “Short Group Signatures,” Proc. Advances in Cryptology (Crypto '04), Aug. 2004.
[20] M. Bellare, D. Micciancio, and B. Warinschi, “Foundations of Group Signatures: Formal Definition, Simplified Requirements and a Construction Based on Trapdoor Permutations,” Proc. Advances in Cryptology, May 2003.
[21] M. Bellare, H. Shi, and C. Zhang, “Foundations of Group Signatures: The Case of Dynamic Groups,” Proc. Conf. Topics in Cryptology: The Cryptographer's Track at RSA (CT-RSA '05), Feb. 2005.
[22] D. Boneh and H. Shacham, “Group Signatures with Verifier-Local Revocation,” Proc. 11th ACM Conf. Computer and Comm. Security (CCS '04), Oct. 2004.
[23] IEEE 1363a-2004, “IEEE Standard Specifications for Public-Key Cryptography—Amendment 1: Additional Techniques,” 2004.
[24] “The CVIS Project,” http:/, 2010.
[25] “OpenSSL,” http:/, 2010.
[26] M. Brown, D. Hankerson, J. Lopez, and A. Menezes, “Software Implementation of the NIST Elliptic Curves over Prime Fields,” Proc. Conf. Topics in Cryptology: The Cryptographer's Track at RSA (CT-RSA '01), Apr. 2001.
[27] N. Koblitz and A. Menezes, “Pairing-Based Cryptography at High Security Levels,” Cryptology ePrint Archive, Report 2005/076, 2005.
[28] M. Nakagami, “The m-Distribution and a General Formula of Intensity Distribution of the Rapid Fading,” Statistical Methods in Radio Wave Propagation, W.G. Hoffman, ed., Pergamon Press, 1960.
[29] Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M.-T. Moreno, L. Delgrossi, and H. Hartenstein, “Overhaul of IEEE 802.11 Modeling and Simulation in NS-2,” Proc. 10th ACM Symp. Modeling, Analysis, and Simulation of Wirless and Mobile Systems (MSWiM '07), Oct. 2007.
[30] Q. Xu, T. Mak, J. Ko, and R. Sengupta, “Vehicle-to-Vehicle Safety Messaging in DSRC,” Proc. First ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '04), Oct. 2004.
[31] M. Torrent-Moreno, D. Jiang, and H. Hartenstein, “Broadcast Reception Rates and Effects of Priority Access in 802.11-Based VANETs,” Proc. First ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '04), Oct. 2004.
[32] Encyclopaedia of Mathematics, M. Hazewinkel, ed., Springer-Verlag, 2002.
[33] W. Feller, An Introduction to Probability Theory and Its Applications, vol. 1, Wiley, 1968.
[34] S. Diwan, B. Dalla Chiara, and F. Deflorio, “Effect of Vehicle to Vehicle and Vehicle to Infrastructure Communication Systems on Transportation Safety,” Proc. Conf. Applications of Advanced Technology in Transportation (AATT '06), Aug. 2006.
[35] B. Dalla Chiara, F. Deflorio, and S. Diwan, “Communication among Vehicles and Infrastructures: Evaluation of Outcomes on Road Safety,” Proc. Int'l Conf. Intelligent Tutoring Systems (ITS '08), June 2008.
[36] “Intelligent Transport Systems (ITS), Vehicular Communications (VC), Basic Set of Applications, Definitions,” Technical Report ETSI TR 102 638 V1.1, June 2009.
[37] S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety,” IEEE Comm. Magazine, vol. 44, no. 1, pp. 74-82, Jan. 2006.
[38] T. ElBatt, S.K. Goel, G. Holland, H. Krishnan, and J. Parikh, “Cooperative Collision Warning Using Dedicated Short Range Wireless Communications,” Proc. Third Int'l Workshop Vehicular Ad Hoc Networks (VANET '06), Sept. 2006.
[39] X. Yang, J. Liu, F. Zhao, and N. Vaidya, “A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning,” Proc. First Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous '04), Aug. 2004.
[40] P. Golle, D. Greene, and J. Staddon, “Detecting and Correcting Malicious Data in VANETs,” Proc. ACM Workshop Vehicular Ad Hoc Networks (VANET '04), Oct. 2004.
[41] J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, “How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS), Oct. 2006.
[42] D. Chaum, “Security without Identification: Transaction Systems to Make Big Brother Obsolete,” Comm. ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
[43] M. Gerlach, A. Festag, T. Leinmuller, G. Goldacker, and C. Harsch, “Security Architecture for Vehicular Communication,” Proc. Second Int'l Workshop Intelligent Transportation (WIT '07), Mar. 2007.
[44] M. Raya and J. Hubaux, “Securing Vehicular Ad Hoc Networks,” J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
[45] M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, “Security Issues in a Future Vehicular Network,” Proc. European Wireless Conf. (EW '02), Feb. 2002.
[46] B. Parno and A. Perrig, “Challenges in Securing Vehicular Networks,” Proc. Fourth Workshop Hot Topics in Networks (HotNets-IV), Nov. 2005.
[47] M. Jakobsson, X. Wang, and S. Wetzel, “Stealth Attacks in Vehicular Technologies,” Proc. IEEE Vehicular Technology Conf. (VTC)-Fall '04, Sept. 2004.
[48] J. Blum and A. Eskandarian, “The Threat of Intelligent Collisions,” IT Professional, vol. 6, pp. 24-29, 2004.
[49] A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller, “Attacks on Intervehicle Communication Systems—An Analysis,” Proc. Third Int'l Workshop Intelligent Transportation (WIT '06), Mar. 2006.
[50] P. Papadimitratos, V. Gligor, and J.-P. Hubaux, “Securing Vehicular Communications—Assumptions, Requirements, and Principles,” Proc. Ann. Conf. Embedded Security in Cars (ESCAR '06), Nov. 2006.
[51] M. Li, R. Poovendran, K. Sampigethaya, and L. Huang, “CARAVAN: Providing Location Privacy for VANET,” Proc. Ann. Conf. Embedded Security in Cars (ESCAR '05), Nov. 2005.
[52] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
[53] K. Laberteaux and Y.-C. Hu, “Strong VANET Security on a Budget,” Proc. Ann. Conf. Embedded Security in Cars (ESCAR '06), Nov. 2006.
[54] J. Haas, Y.-C. Hu, and K. Laberteaux, “Real-World VANET Security Protocol Performance,” Proc. IEEE Conf. Global Telecomm. (GLOBECOM), Nov. 2009.
[55] K. Zeng, “Pseudonymous PKI for Ubiquitous Computing,” Proc. European Public Key Infrastructure Workshop (EuroPKI), June 2006.
[56] F. Armknecht, A. Festag, D. Westhoff, and K. Zeng, “Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication,” Proc. Fourth Workshop Mobile Ad-Hoc Networks (WMAN '07), Mar. 2007.
[57] F. Kargl, E. Schoch, B. Wiedersheim, and T. Leinmüller, “Secure and Efficient Beaconing for Vehicular Networks,” Proc. Fifth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '08), 2008.
[58] X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications,” IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
[59] R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, “ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications,” Proc. IEEE INFOCOM, Apr. 2008.
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool