1 |
On Achieving Secure Message Authentication for Vehicular CommunicationsZhang, Chenxi January 2010 (has links)
Vehicular Ad-hoc Networks (VANETs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences, optimize traffic flow control systems, etc. Addressing security and privacy issues as the prerequisite of VANETs' development must be emphasized. To avoid any possible malicious attack and resource abuse, employing a digital signature scheme is widely recognized as the most effective approach for VANETs to achieve authentication, integrity, and validity. However, when the number of signatures received by a vehicle becomes large, a scalability problem emerges immediately, where a vehicle could be difficult to sequentially verify each received signature within 100-300 ms interval in accordance with the current Dedicated Short Range Communications (DSRC) protocol. In addition, there are still some unsolved attacks in VANETs such as Denial of Service (Dos) attacks, which are not well addressed and waiting for us to solve. In this thesis, we propose the following solutions to address the above mentioned security related issues.
First of all, to address the scalability issues, we introduce a novel roadside unit (RSU) aided message authentication scheme, named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. In addition, RAISE adopts the k-anonymity property for preserving user privacy, where a message cannot be associated with a common vehicle.
Secondly, we further consider the situation that RSUs may not cover all the busy streets of a city or a highway in some situations, for example, at the beginning of a VANETs' deployment period, or due to the physical damage of some RSUs, or simply for economic considerations. Under these circumstances, we further propose an efficient identity-based batch signature verification scheme for vehicular communications. The proposed scheme can make vehicles verify a batch of signatures once instead of one after another, and thus it efficiently increases vehicles' message verification speed. In addition, our scheme achieves conditional privacy: a distinct pseudo identity is generated along with each message, and a trust authority can trace a vehicle's real identity from its pseudo identity. In order to find invalid signatures in a batch of signatures, we adopt group testing technique which can find invalid signatures efficiently.
Lastly, we identify a DoS attack, called signature jamming attack (SJA), which could easily happen and possibly cause a profound vicious impact on the normal operations of a VANET, yet has not been well addressed in the literature. The SJA can be simply launched at an attacker by flooding a significant number of messages with invalid signatures that jam the surrounding vehicles and prevent them from timely verifying regular and legitimate messages. To countermeasure the SJA, we introduces a hash-based puzzle scheme, which serves as a light-weight filter for excluding likely false signatures before they go through relatively lengthy signature verification process. To further minimize the vicious effect of SJA, we introduce a hash recommendation mechanism, which enables vehicles to share their information so as to more efficiently thwart the SJA.
For each research solution, detailed analysis in terms of computational time, and transmission overhead, privacy preservation are performed to validate the efficiency and effectiveness of the proposed schemes.
|
2 |
On Achieving Secure Message Authentication for Vehicular CommunicationsZhang, Chenxi January 2010 (has links)
Vehicular Ad-hoc Networks (VANETs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences, optimize traffic flow control systems, etc. Addressing security and privacy issues as the prerequisite of VANETs' development must be emphasized. To avoid any possible malicious attack and resource abuse, employing a digital signature scheme is widely recognized as the most effective approach for VANETs to achieve authentication, integrity, and validity. However, when the number of signatures received by a vehicle becomes large, a scalability problem emerges immediately, where a vehicle could be difficult to sequentially verify each received signature within 100-300 ms interval in accordance with the current Dedicated Short Range Communications (DSRC) protocol. In addition, there are still some unsolved attacks in VANETs such as Denial of Service (Dos) attacks, which are not well addressed and waiting for us to solve. In this thesis, we propose the following solutions to address the above mentioned security related issues.
First of all, to address the scalability issues, we introduce a novel roadside unit (RSU) aided message authentication scheme, named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. In addition, RAISE adopts the k-anonymity property for preserving user privacy, where a message cannot be associated with a common vehicle.
Secondly, we further consider the situation that RSUs may not cover all the busy streets of a city or a highway in some situations, for example, at the beginning of a VANETs' deployment period, or due to the physical damage of some RSUs, or simply for economic considerations. Under these circumstances, we further propose an efficient identity-based batch signature verification scheme for vehicular communications. The proposed scheme can make vehicles verify a batch of signatures once instead of one after another, and thus it efficiently increases vehicles' message verification speed. In addition, our scheme achieves conditional privacy: a distinct pseudo identity is generated along with each message, and a trust authority can trace a vehicle's real identity from its pseudo identity. In order to find invalid signatures in a batch of signatures, we adopt group testing technique which can find invalid signatures efficiently.
Lastly, we identify a DoS attack, called signature jamming attack (SJA), which could easily happen and possibly cause a profound vicious impact on the normal operations of a VANET, yet has not been well addressed in the literature. The SJA can be simply launched at an attacker by flooding a significant number of messages with invalid signatures that jam the surrounding vehicles and prevent them from timely verifying regular and legitimate messages. To countermeasure the SJA, we introduces a hash-based puzzle scheme, which serves as a light-weight filter for excluding likely false signatures before they go through relatively lengthy signature verification process. To further minimize the vicious effect of SJA, we introduce a hash recommendation mechanism, which enables vehicles to share their information so as to more efficiently thwart the SJA.
For each research solution, detailed analysis in terms of computational time, and transmission overhead, privacy preservation are performed to validate the efficiency and effectiveness of the proposed schemes.
|
3 |
A Design and Evaluation of a Secure Neighborhood Awareness Framework for Vehicular Ad-Hoc NetworksAbumansoor, Osama 09 June 2014 (has links)
Vehicular ad-hoc networks (VANETs) are envisioned to provide many road and safety applications that will improve drivers' awareness and enhance the driving experience. Many of proposed applications are location-based that depend on sharing the location information of vehicles and events among neighboring nodes. The location-based applications should provide vehicle operators with knowledge of the current surrounding conditions to help them make appropriate traveling decisions, such as avoiding traffic congestion. Drivers expect to receive accurate and reliable information from other vehicles. Therefore, securing localization service integrity is important to support a VANET's overall system reliability.
In this thesis, we study the exchanged location information in VANETs and designed a framework to prevent potential security threats that will violate users' privacy and overcome limitations that can impact the exchanged data integrity and reliability. The solution developed a secure neighborhood awareness service and shared localization information management protocol in a VANET. The proposed framework is constructed through several components: (i) a location verification protocol that will secure location information by providing a non-line-of-sight (NLOS) verification protocol to overcome moving obstacle effects; (ii) privacy-preserving location information management to detect data inconsistency and provide a recovery process while preventing attackers from tracking individual vehicles; (iii) a trust model evaluation mechanism based on neighborhood awareness; (iv) an adaptive beacon protocol that will reduce the number of messages and provide quality of service(QoS) control for network managers and authorities. We also propose a security evaluation model that quantifies the security attributes for the localization service in a VANET. The model will help evaluate an integrated security measures that are provided by different components of the network services.
|
4 |
A Design and Evaluation of a Secure Neighborhood Awareness Framework for Vehicular Ad-Hoc NetworksAbumansoor, Osama January 2014 (has links)
Vehicular ad-hoc networks (VANETs) are envisioned to provide many road and safety applications that will improve drivers' awareness and enhance the driving experience. Many of proposed applications are location-based that depend on sharing the location information of vehicles and events among neighboring nodes. The location-based applications should provide vehicle operators with knowledge of the current surrounding conditions to help them make appropriate traveling decisions, such as avoiding traffic congestion. Drivers expect to receive accurate and reliable information from other vehicles. Therefore, securing localization service integrity is important to support a VANET's overall system reliability.
In this thesis, we study the exchanged location information in VANETs and designed a framework to prevent potential security threats that will violate users' privacy and overcome limitations that can impact the exchanged data integrity and reliability. The solution developed a secure neighborhood awareness service and shared localization information management protocol in a VANET. The proposed framework is constructed through several components: (i) a location verification protocol that will secure location information by providing a non-line-of-sight (NLOS) verification protocol to overcome moving obstacle effects; (ii) privacy-preserving location information management to detect data inconsistency and provide a recovery process while preventing attackers from tracking individual vehicles; (iii) a trust model evaluation mechanism based on neighborhood awareness; (iv) an adaptive beacon protocol that will reduce the number of messages and provide quality of service(QoS) control for network managers and authorities. We also propose a security evaluation model that quantifies the security attributes for the localization service in a VANET. The model will help evaluate an integrated security measures that are provided by different components of the network services.
|
5 |
Test Environment Design for Wireless Vehicle CommunicationsPeter Lerchbaumer, Alejandro Ochoa January 2007 (has links)
<p>The research in wireless communications and in-vehicle computing systems has opened up new fields of applications for transportation systems. Vehicular ad hoc networks (VANETs) emerge as a contribution to the solution of providing safer and more efficient roads and to increase passenger safety. This thesis treats different issues that influence the performance of wireless vehicle communication systems and it proposes a general design procedure for the construction of a test environment for VANETs.</p><p>A comprehensive survey of the different parameters that affect the system performance in the field of wireless vehicle communications is provided. These parameters are then analysed and quantified to serve as guidelines when identifying and designing the different components of the test environment. One such component is a simulator that enables VANET performance evaluation and allows identification of bottlenecks in the network functionality. In addition, suggestions for a hardware platform and an operating system for the development of a suitable on-board test-bed for performance measurements are presented.</p><p>The design procedure of such a test environment is intended to be used by researchers and engineers working in the field of wireless communications and ad hoc networking with special regard to the automotive sector.</p>
|
6 |
Test Environment Design for Wireless Vehicle CommunicationsPeter Lerchbaumer, Alejandro Ochoa January 2007 (has links)
The research in wireless communications and in-vehicle computing systems has opened up new fields of applications for transportation systems. Vehicular ad hoc networks (VANETs) emerge as a contribution to the solution of providing safer and more efficient roads and to increase passenger safety. This thesis treats different issues that influence the performance of wireless vehicle communication systems and it proposes a general design procedure for the construction of a test environment for VANETs. A comprehensive survey of the different parameters that affect the system performance in the field of wireless vehicle communications is provided. These parameters are then analysed and quantified to serve as guidelines when identifying and designing the different components of the test environment. One such component is a simulator that enables VANET performance evaluation and allows identification of bottlenecks in the network functionality. In addition, suggestions for a hardware platform and an operating system for the development of a suitable on-board test-bed for performance measurements are presented. The design procedure of such a test environment is intended to be used by researchers and engineers working in the field of wireless communications and ad hoc networking with special regard to the automotive sector.
|
7 |
STUDY OF CONNECTIVITY PROBABILITY IN VANETS BY A TWO-DIMENSIONAL PLATOON-BASED MODELDonglin Liu (11139153) 06 August 2021 (has links)
With the fast development of 5G networks and the advancement in networking technologies, more and more new technologies such as internet of vehicles (IoV) is catching our
eyes. With technologies of artificial intelligence and automatic control, IoV is transformed
into an intelligent transportation system (ITS). The object of this thesis is to analyze the
connectivity probability issues in vehicle ad hoc networks (VANETs), which is a subset of
ITS. This will be achieved by a platoon-based two dimensional model. In order to make
the results more accurate and more close to real scenario, different situations will be analyzed separately, and different types of platoon will be included. In addition, other system
parameters are also discussed and stimulated. The results show that many parameters like
the increases of traffic density, ratio of platoon, and lane numbers will improve connectivity
probability. No-leader based platoons are easier to connect to the base stations compared
to leader based platoons.
|
8 |
Comparative Study of Connected Vehicle SimulatorsAhmed, Md Salman, Hoque, Mohammad Asadul, Pfeiffer, Phil 07 July 2016 (has links)
Contemporary studies of Intelligent Transportation Systems (ITS) use simulations of vehicular and communications traffic, due to the ethical and practical infeasibility of conducting experiments on real transportation networks. Different simulators have been developed for modeling real-time vehicular mobility and inter-vehicular communication under varying traffic and roadway conditions. While most model the effect of mobility on communications, only a few simulate the impact of inter-vehicular communication on vehicular mobility. None, moreover, are implemented as parallel or distributed frameworks: an essential requirement for the study of ITS applications in large-scale urban environments. As a starting point for developing such a framework, one contemporary simulator, VNetInetSim, was tested to determine its behavior under large loads. Testing determined that VNetInetSim's memory usage and execution time increase exponentially in the number of simulated vehicles while remaining relatively constant under increased communication traffic.
|
9 |
On the use of WiMAX and Wi-Fi in a VANET to provide in-vehicle connectivity and media distributionMojela, Lerotholi Solomon 12 1900 (has links)
Thesis (MScEng)--Stellenbosch University, 2011. / ENGLISH ABSTRACT: The recent emergence of ubiquitous wireless connectivity and the increasing
computational capacity of modern vehicles have triggered immense interest in the
possibilities of vehicular connectivity. A plethora of potential applications for vehicular
networks have been proposed in the areas of safety, traffic infrastructure management,
information, and entertainment. The broad range of applications requires creative utilisation
of the available wireless medium, using a combination of existing and novel wireless
technologies. In this research the evaluation of one such configuration is performed.
Dedicated short range communication for safety applications is assumed, and the use of Wi-
Fi and WiMAX for non-safety applications is evaluated. Little is known about the media
streaming performance of these wireless technologies in realistic vehicular ad-hoc network
(VANET) scenarios. Due to the extreme mobility and unpredictable environmental aspects in
a real road environment, an empirical evaluation is performed and presented. Evaluation of a
multi-vehicle to infrastructure (V2V2I) VANET, using Wi-Fi for the vehicle-to-vehicle
communication and WiMAX for the vehicle to infrastructure (V2I) communication is
experimented. It is observed that Wi-Fi is unaffected by the vehicle speed; whenever nodes
are within communication range, data gets transferred normally. A detailed characterisation
of the network architecture is presented and the results show that a multitude of applications
can be supported with this proposed network architecture. / AFRIKAANSE OPSOMMING: Die toenemende beskikbaarheid en digtheid van koordlose netwerke en die verhoogde
verwerkingsvermoëns van moderne voertuie het die afgelope paar jaar aansienlike
belangstelling gewek in die moontlikhede wat voertuig-kommunikasie bied. ʼn Magdom
moontlike toepassings is voorgestel in ʼn wye verskeidenheid van velde insluitende veiligheid,
verkeersinfrastruktuur, informasie en vermaak. Hierdie voorstelle vereis die kreatiewe
benutting van die beskikbare en nuwe koordlose tegnologieë. Hierdie tesis evalueer een
voorbeeld van so ‘n opstelling. ʼn Toegewyde kortafstand kommunikasie modus vir
veiligheidstoepassings word aangeneem, terwyl Wi-Fi en WiMAX vir ander toepassings
evalueer word. Daar is min navorsing oor die kapasiteit en seinsterkte van hierdie beskikbare
netwerke onder realistiese voertuig netwerk (VANET) scenario‘s. Weens die hoë mobiliteit
van voertuie en ook die onvoorspelbaarheid van hierdie omgewing word ʼn empiriese
evaluasie beskou as die mees gepaste metode. Die navorsing ondersoek ʼn multi-voertuig-totinfrastruktuur-
netwerk wat Wi-Fi gebruik vir voertuig-tot-voertuig (V2V) kommunikasie en
WiMAX vir voertuig-tot-infrastruktuur (V2I) kommunikasie. Die navorsing bevind dat Wi-Fi
nie beïnvloed word deur die spoed van die voertuig nie: wanneer die nodes binne die bereik is
van die netwerk word data normaal oorgedra. ‗n Gedetailleerde karakterisering van dié
netwerk word gedoen en die resultate dui aan dat ‗n groot hoeveelheid toepassings
ondersteun kan word deur dié opstelling.
|
10 |
Certificate revocation list distribution in vehicular ad hoc networksNowatkowski, Michael E. 05 April 2010 (has links)
The objective of this research is to investigate improved methods for distributing certificate revocation lists (CRLs) in vehicular ad hoc networks (VANETs). VANETs are a subset of mobile ad hoc networks composed of network-equipped vehicles and infrastructure points, which will allow vehicles to communicate with other vehicles and with roadside infrastructure points. While sharing some of the same limitations of mobile ad hoc networks, such as lack of infrastructure and limited communications range, VANETs have several dissimilarities that make them a much different research area. The main differences include the size of the network, the speed of the vehicles, and the network security concerns. Confidentiality, authenticity, integrity, and availability are some of the standard goals of network security. While confidentiality and authenticity at times seem in opposition to each other, VANET researchers have developed many methods for enhancing confidentiality while at the same time providing authenticity. The method agreed upon for confidentiality and authenticity by most researchers and the IEEE 1609 working group is a public key infrastructure (PKI) system. An important part of any PKI system is the revocation of certificates. The revocation process, as well as the distribution of revocation information, is an open research problem for VANETs. This research develops new methods of CRL distribution and compares them to existing methods proposed by other researchers. The new methods show improved performance in various vehicle traffic densities.
|
Page generated in 0.0483 seconds