Skip to main content

Invited Paper: VANET Security: Going Beyond Cryptographic-Centric Solutions

  • Conference paper
  • First Online:
Vehicular Ad-hoc Networks for Smart Cities

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 306))

Abstract

The need for safety and comfort in vehicular environments has led to a lot of research in vehicular ad-hoc networks (VANET), ranging from vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications to security. As regards the latter aspect, mostly the focus has been on resorting to public key infrastructure (PKI) and its related concepts. Moreover, methods used to detect the most feared security attacks are based almost exclusively on the use of physical characteristics as well as PKI concepts or both. However with emerging technologies that enable connecting a vehicle to external resources, VANET is evolving, thus inheriting security threats that are common place in conventional IT systems. Therefore, as it is shown in the paper, VANET security must go beyond cryptographic-centric mechanisms that are commonly used for providing data security in wireless environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fischer, L., Aijaz, A., Eckert, C., Vogt, D.: Secure revocable anonymous authenticated inter-vehicle communication (SRAAC). In: 4th Workshop on Embedded Security in Cars (ESCAR 2006), (2006)

    Google Scholar 

  2. Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of anonymity in VANETs-putting pseudonymity into practice. In: Wireless Communications and Networking Conference, IEEE WCNC 2007, pp. 3400–3405 (2007)

    Google Scholar 

  3. Sun, X., Lin, X., Ho, P.-H.: Secure vehicular communications based on group signature and ID-based signature scheme. In: Proceedings of International Conference on Communications (ICC’07), Scotland (2007)

    Google Scholar 

  4. Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using group signature. In: Proceedings of the IEEE WCSN’09, pp. 91–96 (2008)

    Google Scholar 

  5. Wasef, A., Jiang, Y., Shen, X.: DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans. Veh. Technol. 59, 533–549 (2010)

    Article  Google Scholar 

  6. Laberteaux, K.P., Haas, J.J., Hu, Y.C.: Security certificate revocation list distribution for VANET. In: Proceedings of the Fifth ACM Workshop on Vehicular Networks (2008)

    Google Scholar 

  7. Wen, H., Ho, P.H., Gong, G.: A novel framework for message authentication in vehicular communication network. In: Proceedings of the IEEE GLOBECOM’09, pp. 1–6 (2009)

    Google Scholar 

  8. Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of the IEEE INFOCOM ’08, pp. 89–824 (2008)

    Google Scholar 

  9. Lee, E., Lee, E.-K., Gerla, M.: Vehicular cloud networking: architecture and design principles. IEEE Commun. Mag. pp. 148–155 (2014)

    Google Scholar 

  10. Yan, G., Wen, D., Olariu, S., Weigle, M.C.: Security challenges in vehicular cloud computing. IEEE Trans. Intell. Transp. Syst. 14(1), 284–294 (2013)

    Article  Google Scholar 

  11. Goudarzi, S. et al.: A systematic review of security in vehicular ad hoc network. In: Proceedings of 2nd Symposium on Wireless Sensors and Cellular Networks (WSCN’13), Jeddah, Saudi Arabia, 13–16 Dec 2013

    Google Scholar 

  12. Pitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley, Boston (2000)

    Google Scholar 

  13. Gantsou, D., Sondi, P.: Toward a honeypot solution for proactive security in vehicular ad hoc networks. In: Future Information Technology. Lecture Notes in Electrical Engineering, vol. 276, pp. 145–150 (2014)

    Google Scholar 

  14. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268 (2004)

    Google Scholar 

  15. Douceur, J.R.: The Sybil attack. In: Proceedings of 1st IPTPS, Mar 2002, pp. 251–260 (2002)

    Google Scholar 

  16. Chen, Y., Yang, J., Trappe, W., Martin, R.P.: Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Trans. Veh. Technol. 59(5), 2418–2434 (2010)

    Article  Google Scholar 

  17. Zhang, Q., Wang, P., Reeves, D., Ning, P.: Defending against Sybil attacks in sensor networks. In: Proceedings of 25th IEEE ICDCSW, June 2005, pp. 185–191 (2005)

    Google Scholar 

  18. Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of OSDI, pp. 173–186 (1999)

    Google Scholar 

  19. Banerjea, A.: A taxonomy of dispersity routing schemes for fault-tolerant real-time channels. In: Proceedings of ECMAST 1999, vol. 26, pp. 129–148 (1999)

    Google Scholar 

  20. Chen, B., Jamieson, K., Balakrishnan, H., Morris, R.: Span: an energy efficient coordination algorithm for topology maintenance in ad hoc wireless networks. ACM Wirel. Netw. J. 8(5), 481–494 (2002)

    Article  MATH  Google Scholar 

  21. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2004), pp. 29–37 (2004)

    Google Scholar 

  22. Yu, B., Xu, C.-Z., Xiao, B.: Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. (2013). doi:10.1016/j.jpdc.2013.02.001J

    Google Scholar 

  23. Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against Sybil attack in vehicular ad hoc network based on roadside unit support. In: Proceedings of Military Communications Conference (2009)

    Google Scholar 

  24. Wahab, O.A., Otrok, H., Mourad, A.: VANET QoS-OLSR: QoS-based clustering protocol for vehicular ad hoc networks. Comput. Commun. 36, 1422–1435 (2013)

    Article  Google Scholar 

  25. CLausen, T., Jacquet, P. (eds.): Projet Hipercom, INRIA. Oct 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dhavy Gantsou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Gantsou, D. (2015). Invited Paper: VANET Security: Going Beyond Cryptographic-Centric Solutions. In: Laouiti, A., Qayyum, A., Mohamad Saad, M. (eds) Vehicular Ad-hoc Networks for Smart Cities. Advances in Intelligent Systems and Computing, vol 306. Springer, Singapore. https://doi.org/10.1007/978-981-287-158-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-158-9_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-157-2

  • Online ISBN: 978-981-287-158-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics