Skip to main content

Layered and Service-Dependent Security in CSMA/CA and Slotted Vanets

  • Conference paper
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2010)

Abstract

The implications and challenges of security in vehicular ad-hoc networks are huge for several reasons and, basically, for human safety effects and due to the complex and highly dynamic setting. Additionally security, being a cross-layer topic, can be managed at different layers of the network stack (e.g. at MAC-level - with encryption and authentication, at network-layer - as with IPsec, at transport-layer TLS, SSL). A rich scientific literature has addressed the issue of vanet security, however, all the proposed solutions (i) focus on a specific layer and (ii) offer either robust but not scalable solutions (such as the PKI infrastructure, hardly managed under mobility for all the nodes and services) or weak ones (at least weak if applied to human safety). For this reason, in the present paper, security for vanet is faced with a layered approach which lets envisage several solutions, properly and hierarchically differentiated for distinct services. Additionally, what introduces an even stronger novelty, the dissertation covers both CSMA/CA and slotted MAC protocols, having the latter recently encountered a certain scientific favour.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE 802.11p TG. IEEE 802.11p/D9.0, Draft Amendment for Wireless Access in Vehicular Environments (WAVE) (September 2009)

    Google Scholar 

  2. IEEE 1609 WAVE Standards, vii.path.berkeley.edu/1609_wave/

  3. IEEE 1609.2 Trial Use Standard for Wireless Access in Vehicular Environments (WAVE) - Security Services for Applications and Management Messages, vii.path.berkeley.edu/1609_wave/

  4. Shakkottai, S., Rappaport, T.S., Karlsson, P.C.: Cross-layer design for wireless networks. IEEE Commun. Mag. 41(10) (October 2003)

    Google Scholar 

  5. Scopigno, R., Cozzetti, H.A.: Mobile Slotted Aloha for Vanets. In: IEEE VTC Fall, pp. 1–5 (September 2009)

    Google Scholar 

  6. Ahmad, S.: Hole 196, Black Hat (2010), http://www.blackhat.com/html/bh-us-10/bh-us-10-home.html

  7. Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Communications Magazine, 100–109 (November 2008)

    Google Scholar 

  8. Aslam, B., Zou, C.: Distributed Certificate and Application Architecture for Vanets. In: MILCOM, pp. 1–7 (October 2009)

    Google Scholar 

  9. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, 38–47 (February 2004)

    Google Scholar 

  10. Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. The International Journal of Computer and Telecommunications Networking, 485–500 (March 2006)

    Google Scholar 

  11. Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Hawaii International Conference on System Science, HICSS (2002)

    Google Scholar 

  12. Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11–21 (2005)

    Google Scholar 

  13. Raya, M., Papadimitratos, P., Hubaux, J.-P.: Securing Vehicular Communications. IEEE Wireless Communications Magazine (October 2006)

    Google Scholar 

  14. Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  15. Schaub, F., Kargl, F., Ma, Z., Weber, M.: V-tokens for Conditional Pseudonymity in VANETs. In: Scopigno, R., Cozzetti, H.A. (eds.) Proceedings of IEEE Wireless Communications and Networking Conference, WCNC 2010 (April 2010)

    Google Scholar 

  16. Nakagami, M.: The m-Distribution, a general formula of intensity of rapid fading. In: Statistical Methods in Radio Wave Propagation: Proc. Symposium at the University of California. Permagon Press, Oxford (1960)

    Google Scholar 

  17. Sklar, B.: Rayleigh Fading Channels in Mobile Digital Communication Systems Part I: Characterization. IEEE Communication Magazine, 90–100 (July 1997)

    Google Scholar 

  18. Scopigno, R., Cozzetti, H.A.: Evaluation of Time-Space Efficiency in CSMA/CA and Slotted Vanets. In: IEEE 71th Vehicular Technology Conference, VTC Fall (October 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Pilosu, L., Cozzetti, H.A., Scopigno, R. (2012). Layered and Service-Dependent Security in CSMA/CA and Slotted Vanets. In: Zhang, X., Qiao, D. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 74. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29222-4_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29222-4_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29221-7

  • Online ISBN: 978-3-642-29222-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics