Abstract
The implications and challenges of security in vehicular ad-hoc networks are huge for several reasons and, basically, for human safety effects and due to the complex and highly dynamic setting. Additionally security, being a cross-layer topic, can be managed at different layers of the network stack (e.g. at MAC-level - with encryption and authentication, at network-layer - as with IPsec, at transport-layer TLS, SSL). A rich scientific literature has addressed the issue of vanet security, however, all the proposed solutions (i) focus on a specific layer and (ii) offer either robust but not scalable solutions (such as the PKI infrastructure, hardly managed under mobility for all the nodes and services) or weak ones (at least weak if applied to human safety). For this reason, in the present paper, security for vanet is faced with a layered approach which lets envisage several solutions, properly and hierarchically differentiated for distinct services. Additionally, what introduces an even stronger novelty, the dissertation covers both CSMA/CA and slotted MAC protocols, having the latter recently encountered a certain scientific favour.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE 802.11p TG. IEEE 802.11p/D9.0, Draft Amendment for Wireless Access in Vehicular Environments (WAVE) (September 2009)
IEEE 1609 WAVE Standards, vii.path.berkeley.edu/1609_wave/
IEEE 1609.2 Trial Use Standard for Wireless Access in Vehicular Environments (WAVE) - Security Services for Applications and Management Messages, vii.path.berkeley.edu/1609_wave/
Shakkottai, S., Rappaport, T.S., Karlsson, P.C.: Cross-layer design for wireless networks. IEEE Commun. Mag. 41(10) (October 2003)
Scopigno, R., Cozzetti, H.A.: Mobile Slotted Aloha for Vanets. In: IEEE VTC Fall, pp. 1–5 (September 2009)
Ahmad, S.: Hole 196, Black Hat (2010), http://www.blackhat.com/html/bh-us-10/bh-us-10-home.html
Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure Vehicular Communication Systems: Design and Architecture. IEEE Communications Magazine, 100–109 (November 2008)
Aslam, B., Zou, C.: Distributed Certificate and Application Architecture for Vanets. In: MILCOM, pp. 1–7 (October 2009)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, 38–47 (February 2004)
Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. The International Journal of Computer and Telecommunications Networking, 485–500 (March 2006)
Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Hawaii International Conference on System Science, HICSS (2002)
Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 11–21 (2005)
Raya, M., Papadimitratos, P., Hubaux, J.-P.: Securing Vehicular Communications. IEEE Wireless Communications Magazine (October 2006)
Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall, Englewood Cliffs (2003)
Schaub, F., Kargl, F., Ma, Z., Weber, M.: V-tokens for Conditional Pseudonymity in VANETs. In: Scopigno, R., Cozzetti, H.A. (eds.) Proceedings of IEEE Wireless Communications and Networking Conference, WCNC 2010 (April 2010)
Nakagami, M.: The m-Distribution, a general formula of intensity of rapid fading. In: Statistical Methods in Radio Wave Propagation: Proc. Symposium at the University of California. Permagon Press, Oxford (1960)
Sklar, B.: Rayleigh Fading Channels in Mobile Digital Communication Systems Part I: Characterization. IEEE Communication Magazine, 90–100 (July 1997)
Scopigno, R., Cozzetti, H.A.: Evaluation of Time-Space Efficiency in CSMA/CA and Slotted Vanets. In: IEEE 71th Vehicular Technology Conference, VTC Fall (October 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Pilosu, L., Cozzetti, H.A., Scopigno, R. (2012). Layered and Service-Dependent Security in CSMA/CA and Slotted Vanets. In: Zhang, X., Qiao, D. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 74. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29222-4_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-29222-4_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29221-7
Online ISBN: 978-3-642-29222-4
eBook Packages: Computer ScienceComputer Science (R0)