Abstract
Vehicular ad hoc networks are a promising approach for increased safety of driving. Hence, there is a high interest to enable their mass roll out in upcoming years. Thereby, intended safety critical use cases require a rigid security system. The provided analysis of standardized security mechanisms identifies three main weaknesses. Firstly, end-to-end encrypted multi-hop communication is not supported. This affects the whole communication system, as it limits the capability for required distribution of pseudonym certificates indirectly hindering single-hop communication, too. Secondly, pseudonym certificate management requires a dedicated start up strategy after node start up. Thirdly, basic data sets of time and position are acquired from sources lacking security mechanisms and are used in a partly inconsistent way. Enhancements to overcome the identified issues are proposed and discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 6: Wireless Access in Vehicular Environments, July 2010. Rev. 802.11p-2010
IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Networking Services, December 2010. Rev. P1609.3-2010
Memorandum of Understanding for OEMs within the CAR 2 CAR Communication Consortium on Deployment Strategy for cooperative ITS in Europe, June 2011. V 4.0102
Intelligent transport systems (its); security; trust and privacy management, June 2012. Rev. 1.1.1
IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, April 2013. Rev. P1609.2-2013
Intelligent Transport Systems (ITS); Facilities layer function; Facility Position and time management (2013). Rev. 0.0.2
Intelligent Transport Systems (ITS); Security; Security header and certificate formats, April 2013. Rev. 1.1.1
Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Network Identity and TimeZone (NITZ); Service description; Stage 1 (3GPP TS 22.042 version 12.0.0 Release 12), October 2014
Intelligent Transport Systems (ITS); Users and applications requirements; Part2: Applications and facilities layer common data dictionary, September 2014. Rev. 1.2.1
Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, November 2014. Rev. 1.3.2
Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 4: Geographical Addressing and Forwarding for Point-to-Point and Point-to-Multipoint Communications; Sub-part 1: Media-Independent Functionality, July 2014. Rev. 1.2.1
Intelligent Transport Systems (ITS); Security; Security header and certificate formats, June 2015. Rev. 1.2.1
Bittl, S., Gonzalez, A.A., Myrtus, M., Beckmann, H., Sailer, S., Eissfeller, B.: Emerging Attacks on VANET Security based on GPS Time Spoofing. In: IEEE Ciber and Network Security Conference, September 2015
Born, S.: How to manipulate a radio controlled clock via speaker, May 2014. http://bastianborn.de/radio-clock-hack. Accessed March 2016
Buburuzan, T., et al.: Draft C2C-CC Standards System Profile. Technical report, CAR 2 CAR Communication Consortium, January 2014. Rev. 1.0.4
Campolo, C., Molinaro, A., Scopigno, R. (eds.): Vehicular Ad Hoc Networks - Standards, Solutions, and Research. Springer, Heidelberg (2015)
Dardari, D., Falletti, E., Luise, M.: Satellite and Terrestrial Radio Positioning Techniques. Academic Press, Boston (2011)
Harding, J., Powell, G.R., Yoon, R., et al.: Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application. Technical report DOTHS 812 014, Washington, DC: National Highway Traffic Safety Administration, August 2014
Khan, S., Mauri, J.L. (eds.): Security for Multihop Wireless Networks, 1st edn. CRC Press, New York (2014)
Lombardi, M.A.: NIST Time and Frequency Service, vol. 432. NIST Special Publication, New York (2002)
Malhotra, A., Cohen, I., Brakke, E., Goldberg, S.: Attacking the Network TimeProtocol. Technical report, Bosten University (2015)
Mao, G., Fidan, B., Anderson, B.D.O.: Wireless sensor network localization techniques. Comput. Netw. 51(10), 2529–2553 (2007)
NIST: WWVB Coverage Area, December 2015. http://www.nist.gov/pml/div688/grp40/vb-coverage.cfm. Accessed March 2016
Nowdehi, N., Olovsson, T.: Experiences from implementing the ETSI ITS secured message service. In: IEEE Intelligent Vehicles Symposium, pp. 1055–1060 (2014)
Patwari, N., Hero, A.O., Perkins, M., Correal, N.S., O’Dea, R.J.: Relative location estimation in wireless sensor networks. IEEE Trans. Sig. Process. 51(8), 2137–2148 (2003)
Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutorials 17(1), 228–255 (2015)
Physikalisch-Technische Bundesanstalt (PTB): Dissemination of legal time, August 2011. http://www.ptb.de/cms/en/fachabteilungen/abt4/fb-44/ag-442/dissemination-of-legal-time.html. Accessed March 2016
Rasmussen, K.B., Capkun, S., Cagalj, M.: SecNav: secure broadcast localizlocal and time synchronization in wireless networks. In: Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, pp. 310–313, September 2007
Röttger, S.: Analysis of the NTP autokey Procedures. Master thesis, Technical University Braunschweig (2012)
Schmidt, J., Eckert, K., Schaaf, G., et. al.: Nutzerakzeptanz, IT-Sicherheit, Datenschutz und Schutz der Privatsphäre. Technical report, Sichere Intelligente Mobilität Testfeld Deutschland simTD, June 2013
Schütze, T.: Automotive security: cryptography for Car2X communication. In: Embedded World Conference, pp. 1–16, March 2011
Scopigno, R., Cozzetti, H.A.: GNSS synchronization in vanets. In: 3rd International Conference on New Technologies, Mobility and Security, pp. 1–5, December 2009
Wang, K., Chen, S., Pan, A.: Time and position spoofing with open source projects. In: Black Hat Europe, November 2015
Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Comput. Commun. Mobil. Protoc. ITS/VANET 31(12), 2883–2897 (2008)
Zhang, Z., Trinkle, M., Li, H., Dimitrovski, A.D.: Combating time synchronization attack: a cross layer defense mechanism. In: Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems, pp. 141–149 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Bittl, S. (2016). Towards Solutions for Current Security Related Issues in ETSI ITS. In: Mendizabal, J., et al. Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2016. Lecture Notes in Computer Science(), vol 9669. Springer, Cham. https://doi.org/10.1007/978-3-319-38921-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-38921-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38920-2
Online ISBN: 978-3-319-38921-9
eBook Packages: Computer ScienceComputer Science (R0)