Design and Performance of Secure Geocast for Vehicular Communication
- 15 March 2010
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Vehicular Technology
- Vol. 59 (5), 2456-2471
- https://doi.org/10.1109/tvt.2010.2045014
Abstract
The characteristics of vehicular communication environments and their networking and application requirements have led to the development of unique networking protocols. They enable vehicle-to-vehicle and vehicle-to-infrastructure communication based on the IEEE 802.11 technology, ad hoc principles, and wireless multihop techniques using geographical positions. These protocols, which are commonly referred to as Geocast, greatly support the vehicular communication and applications but necessitate a tailored security solution that provides the required security level with reasonable processing and protocol overhead, as well as reasonably priced onboard and road-side unit equipment. In this paper, we present the design of a security solution for Geocast, which is based on cryptographic protection, plausibility checks using secure neighbor discovery and mobility-related checks, trustworthy neighborhood assessment, and rate limitation. We analyze the achieved security level of the proposed scheme and assess its overhead and performance. Furthermore, we develop a software-based prototype implementation of a secure vehicular communication system. We find that the proposed security measures could result in a network performance bottleneck in realistic vehicular scenarios. Finally, we analyze the tradeoff between security overhead and protocol performance and determine the minimal processing overhead needed for acceptable performance.Keywords
This publication has 19 references indexed in Scilit:
- Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety-Critical InformationIEEE Transactions on Vehicular Technology, 2009
- Secure vehicular communication systems: design and architectureIEEE Communications Magazine, 2008
- GNSS-based Positioning: Attacks and countermeasuresPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Towards provable secure neighbor discovery in wireless networksPublished by Association for Computing Machinery (ACM) ,2008
- Secure neighborhood discovery: a fundamental element for mobile ad hoc networkingIEEE Communications Magazine, 2008
- Overhaul of ieee 802.11 modeling and simulation in ns-2Published by Association for Computing Machinery (ACM) ,2007
- High-speed hardware implementations of Elliptic Curve Cryptography: A surveyJournal of Systems Architecture, 2007
- POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKSIEEE Wireless Communications, 2006
- GPSRPublished by Association for Computing Machinery (ACM) ,2000
- Routing with guaranteed delivery in ad hoc wireless networksPublished by Association for Computing Machinery (ACM) ,1999