ABSTRACT
In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. But VANETs cannot get started without either of them. In this paper, we propose a set of mechanisms that can actually reconcile these two contradictory requirements. The main idea is to use message aggregation and group communication. The first class of solutions is based on asymmetric cryptographic primitives, the second class uses symmetric ones, and the third one mixes the two. We have also evaluated the performance potential of one technique and arrived at the conclusion that aggregation in VANETs increases not only efficiency but also security.
- 5.9 GHz DSRC. http: //grouper.ieee.org/groups/scc32/dsrc/.Google Scholar
- IEEE P1609. 2 Version 1 -Standard for Wireless Access in Vehicular Environments -Security Services for Applications and Management Messages.Google Scholar
- T. Aura. Cryptographically Generated Addresses (CGA). In Proceedings of ISC '03 , 2003.Google ScholarCross Ref
- D. Goldschlag, M. Reed, and P. Syverson. Onion routing. Communications of the ACM , 42(2): 39--41, 1999. Google ScholarDigital Library
- P. Golle, D. Greene, and J. Staddon. Detecting and correcting malicious data in VANETs. In Proceedings of VANET '04 , 2004. Google ScholarDigital Library
- H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP)architecture. RFC 2094, 1997. Google ScholarDigital Library
- L. Hu and D. Evans. Secure aggregation for wireless networks. In Proceedings of SAINT'03 , 2003. Google ScholarDigital Library
- J.-P. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security and Privacy Magazine , 2(3): 49--55, May-June 2004. Google ScholarDigital Library
- B. Parno and A. Perrig. Challenges in securing vehicular networks. In Proceedings of HotNets-IV, 2005.Google Scholar
- B. Przydatek, D. Song, and A. Perrig. SIA: secure information aggregation in sensor networks. In Proceedings of SenSys'03 , 2003. Google ScholarDigital Library
- M. Raya and J.-P. Hubaux. The security of vehicular ad hoc networks. In Proceedings of SASN'05 , 2005. Google ScholarDigital Library
- H.-J. Reumerman, M. Roggero, and M. Ruffini. The application-based clustering concept and requirements for intervehicle networks. IEEE Communications Magazine, 43(4): 108--113, April 2005. Google ScholarDigital Library
- A. K. Saha and D. B. Johnson. Modeling mobility for vehicular ad-hoc networks. In Proceedings of VANET'04 , 2004. Google ScholarDigital Library
- K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. CARAVAN: providing location privacy for VANET. In Proceedings of escar '05 , 2005.Google Scholar
- D. Wagner. Resilient aggregation in sensor networks. In Proceedings of SASN'04 , 2004. Google ScholarDigital Library
- Y. Yang, X. Wang, S. Zhu, and G. Cao. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of Mobihoc'06 , 2006. Google ScholarDigital Library
- M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian. Security issues in a future vehicular network. In Proceedings of European Wireless, 2002.Google Scholar
Index Terms
- Efficient secure aggregation in VANETs
Recommendations
An identity-based security framework For VANETs
VANET '06: Proceedings of the 3rd international workshop on Vehicular ad hoc networksWe present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message integrity. Additionally it provides scalable security and privacy using ...
Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE)
The data aggregation is used generally in VANETs to preserve the user information and reduces the traffic due to packets of high frequency data. The data aggregation schemes performing multiple operations, usually undergoes problem related to message ...
Towards secure and communication-efficient broadcast encryption systems
Many emerging network applications are based upon a group communication model where security is a critical design issue. We address the broadcast encryption problem of distributing to a group of network entities a confidential cryptographic key, which ...
Comments