Survey on Security Challenges in Warning Message Dissemination and Possible Solutions

Authors

  • Salini Balakrishnan Department of Computer Science, Rajagiri School of Engineering and Technology, Cochin, Kerala - 682039, India
  • C. Tripti and Robin Cyriac Department of Computer Science, Rajagiri School of Engineering and Technology, Cochin, Kerala - 682039, India

DOI:

https://doi.org/10.51983/ajcst-2014.3.1.1731

Keywords:

Security, Vulnerabilities, Solutions

Abstract

The recent advances in the area of Wireless Communications in Vehicular Ad-hoc Networks (VANET) have brought an emerging platform for both industrialists and for researchers. VANET possess a dynamic topology with multi-hop networks leading to an infrastructure less nature. Communication happens in two ways, one between the moving vehicles and with the Road Side Units (RSU). The usage of wireless medium would surely make it vulnerable to different attacks. By enabling prompt and correct warning messages on road conditions, accident cases etc. VANET can be used to save lives of people, which is the most important application of VANET. Distributing warning messages over a long range is however a very challenging task since message integrity has to be ensured. Also for making the system more reliable nonrepudiation should also be included in the security module. A survey of security issues in notification and warning message dissemination is done in this paper.

References

A. Shamir., “Identity-based cryptosystems and signature schemes,” Proceedings of Advances in Cryptography-Crypto 84, LNCS, Vol. 196, Springer-Verlag, pp. 47-53, 1984.

H. Kawashima, “Japanese perspective of driver information systems.” Transportation 17, pp. 263-284., 1990.

D. Boneh, M. Franklin, “Identity-based encryption from the Weil pairing,” Proceedings of Crypto 2001, LNCS, Vol. 2139, pp. 213- 229, Springer-Verlag, 2001.

L. Gollan, C. Meinel, “Digital signatures for automobiles, in:Proceedings of Systemics,” Cybernetics and Informatics (SCI)02, 2002.

M. Zarki, S.Mehrotra, G. Tsudik, N. Venkatasubramanianm, “Security issues in a future vehicular network,” in: Proceedings of European Wireless02, 2002.

R. John,R. Douceur, “The Sybil attack,” In First International Workshop on Peer-to-Peer Systems (IPTPS), March 2002.

M.Raya, P. Papadimitratos, J. Pierre Hubaux, “Securing Vehicular Communications,” Laboratory for computer Communications and Applications (LCA), Switzerland, 2004

J. Blum,A. Eskandarian, “The threat of intelligent collisions,” IT Professionals (1), 2429,2004.

J. Baek, J. Newmarch, R. Safavi-Naini, W. Susilo, “A survey of identity-based Cryptography,” Proceedings of Australian Unix Users Group Annual Conference, 2004

J. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehicles,” IEEE security and Privacy, Vol. 2, No. 3, pp. 49-55, 2004.

M. Raya, J.P. Hubaux, “The security of vehicular ad hoc networks”, in:Proceedings of SASN05, pp. 1121, 2005.

D. R. Stinson, “Cryptography Theory and Practice,” 3rd ed., Chapman and Hall/CRC, USA., 2005.

P. Kamat, A. Baliga, W. Trappe, “An Identity-Based security framework for VANTEs,” Proceedings of 3rd Int. Workshop on Vehicular Ad-Hoc Networks, pp. 94-95, 2006.

J. Sun, C. Zhang, Y. Fang, “An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks,” Proceedings of the IEEE Military Communication Conference- MILCOM2007, pp.1-7, 2007.

X. Lin, R. Lu, C. Zhang, H. Zhu, P. Ho, X. Shen, “Security in vehicular ad hoc networks,” IEEE Communications Magazine, Vol. 46, No. 4, pp. 88-95, 2008.

F. Dressler, F. Kargly, J. Ottz, O. K. Tonguzx, L. Wischh, “Research Challenges in Inter-Vehicular Communication,” Lessons of the 2010 Dagstuhl Seminar, Institute of Computer Science, University of Innsbruck, Austria, 2010.

C. Y. Yeun, M. Al-Qutayri, F. Al-Hawi, “Efficient Security Implementation for Emerging VANETs”, Khalifa University of Science Technology and Research, UAE.

G. Ferrari, S. Busanelli, N. Lotti, Y. Kaplan, “Cross-Network Information Dissemination in VANETs,”11th International Conference on ITS Telecommunications, pp. 351-356, 2011.

X.509: Information technology Open Systems Interconnection, “The Directory: Public-key and attribute certification frameworks”, ITU-T, August 2005.

E. Magkos, V. Chrissikopoulos, M. Burmester, “Secure and Privacy-Preserving, Timed Vehicular Communications,” Department of Computer Science, Florida State University, Tallahassee, FL 32306-4530, U.S.A.

C.F. Chiasseriniy, E. Fasoloz, R. Furiatoz, R. Gaetax,M. Garettoy, M. Gribaudox, M. Serenox, A. Zanellaz,”Smart Broadcast of Warning Messages in Vehicular Ad Hoc Networks”.

B. Parno, A. Perrig, “Challenges in Securing Vehicular Networks”, Carnegie Mellon University.

R. Lu, “Security and Privacy Preservation in Vehicular Social Networks”, A thesis presented to the University of Waterloo, Ontario, Canada, 2012.

M. Al-Qutayri, C. Yeun, F. F. Al-Hawi, “Security and Privacy of Intelligent VANETs”, Khalifa University of Science and Technology, UAE.

P. Sasikumar, C. Vivek, P. Jayakrishnan, “Key-Management Systems in VANETs”, International Journal of Computer Applications (975-8887), November 2010.

J. Haas, Y.C. Hul, P. K. Laberteaux, “The impact of key assigent on VANET privacy”, Security Comm. Networks. 2009.

R.L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Communication of the ACM, Vol. 21, pp. 120-126, 1978.

Downloads

Published

05-05-2014

How to Cite

Balakrishnan, S., & Tripti and Robin Cyriac, C. (2014). Survey on Security Challenges in Warning Message Dissemination and Possible Solutions. Asian Journal of Computer Science and Technology, 3(1), 12–19. https://doi.org/10.51983/ajcst-2014.3.1.1731