Abstract
In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor networks. We demonstrate that the protocol works in a realistic setting by collecting the real trace data through real implementation. Some of the key considerations are efficiency, deployability and security. The protocol does not safeguard against some of the techniques an adversary could deploy, such as jamming and deliberate battery-draining.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddonand, J., Wong, H.C.: Secret handshakes from pairing-based key agreements. In: IEEE Symposium on Security and Privacy, pp. 180–196 (2003)
Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM, pp. 524–535 (2005)
Du, W., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, pp. 586–597 (2004)
Eriksson, J., Balakrishnan, H., Madden, S.: Cabernet: vehicular content delivery using Wi-Fi. In: MOBICOM (2008)
David, H., Srinivasan, K., Tim, B., Shubham, A.: Vehicular opportunistic communication under the microscope. In: MobiSys 2007: Proceedings of the 5th international conference on Mobile systems, applications and services, New York, NY, USA, pp. 206–219 (2007)
Luo, J., Hubaux, J.-P.: A survey of inter-vehicle communication, epfl. Technical report (2004)
Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. In: IEEE Wireless Comm. (2006)
Vogt, H.: Exploring message authentication in sensor networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 19–30. Springer, Heidelberg (2005)
Wang, H., Li, Q.: Distributed user access control in sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, pp. 305–320. Springer, Heidelberg (2006)
Zhu, S., Setia, S., Jajodia, S.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 259–271 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gao, H., Utecht, S., Xu, F., Wang, H., Li, Q. (2009). Experimental Study on Secure Data Collection in Vehicular Sensor Networks. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-03417-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03416-9
Online ISBN: 978-3-642-03417-6
eBook Packages: Computer ScienceComputer Science (R0)