skip to main content
10.1145/2462096.2462119acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

SeDyA: secure dynamic aggregation in VANETs

Published: 17 April 2013 Publication History

Abstract

In vehicular ad-hoc networks (VANETs), a use case for mobile ad-hoc networks (MANETs), the ultimate goal is to let vehicles communicate using wireless message exchange to provide safety, traffic efficiency, and entertainment applications. Especially traffic efficiency applications benefit from wide-area message dissemination, and aggregation of information is an important tool to reduce bandwidth requirements and enable dissemination in large areas. The core idea is to exchange high quality summaries of the current status rather than forwarding all individual messages. Securing aggregation schemes is important, because they may be used for decisions about traffic management, as well as traffic statistics used in political decisions concerning road safety and availability. The most important challenge for security is that aggregation removes redundancy and the option to directly verify signatures on atomic messages. Existing proposals are limited, because they require roads to be segmented into small fixed-size regions, beyond which aggregation cannot be performed. In this paper, we introduce SeDyA, a scheme that allows more dynamic aggregation compared to existing work, while also providing stronger security guarantees. We evaluate SeDyA against existing proposals to show the benefits in terms of information accuracy, bandwidth usage, and resilience against attacks.

References

[1]
B. Bako, F. Kargl, E. Schoch, and M. Weber. Advanced adaptive gossiping using 2-hop neighborhood information. In Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008., pages 1--6. IEEE, 2008.
[2]
S. Dashtinezhad, T. Nadeem, B. Dorohonceanu, C. Borcea, P. Kang, and L. Iftode. TrafficView: a driver assistant device for traffic monitoring based on car-to-car communication. In Vehicular Technology Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th, volume 5, pages 2946 -- 2950 Vol.5, may 2004.
[3]
S. Dietzel, B. Bako, E. Schoch, and F. Kargl. A fuzzy logic based approach for structure-free aggregation in vehicular ad-hoc networks. In Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking - VANET '09, page 79, 2009.
[4]
S. Dietzel, F. Kargl, G. Heijenk, and S. Florian. On the poptential of generic modeling for vanet data aggregation protocols. In IEEE Vehicular Networking Conference (VNC), pages 78--85, 2010.
[5]
S. Dietzel, E. Schoch, B. Konings, M. Weber, and F. Kargl. Resilient secure aggregation for vehicular networks. IEEE Network, 24(1):26, 2010.
[6]
ETSI. Intelligent Transport Systems (ITS); European profile standard for the physical and medium access control layer of Intelligent Transport Systems operating in the 5 GHz frequency band, November 2009. ETSI ES 202 663, final draft, version 1.1.0.
[7]
ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Functional Requirements, 2010.
[8]
ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service, 2010.
[9]
ETSI. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service, 2011.
[10]
Y.-C. Fan and A. L. Chen. Efficient and robust sensor data aggregation using linear counting sketches. In 2008 IEEE International Symposium on Parallel and Distributed Processing, page 1, 2008.
[11]
E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi. In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wireless Communications, 14(2):70, 2007.
[12]
P. Flajolet and G. N. Martin. Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences, 31:182--209, October 1985.
[13]
M. Garofalakis, J. M. Hellerstein, and P. Maniatis. Proof sketches: Verifiable in-network aggregation. In 2007 IEEE 23rd International Conference on Data Engineering, page 996, 2007.
[14]
C. Gentry and Z. Ramzan. Identity-based aggregate signatures. In Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, pages 257--273, 2006.
[15]
M. Gerlach. Assessing and improving privacy in VANETs. ESCAR Embedded Security in Cars, 2006.
[16]
Q. Han, S. Du, D. Ren, and H. Zhu. SAS: A secure data aggregation scheme in vehicular sensing networks. In 2010 IEEE International Conference on Communications, page 1, 2010.
[17]
H.-C. Hsiao, A. Studer, R. Dubey, E. Shi, and A. Perrig. Efficient and secure threshold-based event validation for VANETs. In WISEC'11, pages 163--174, 2011.
[18]
IEEE. IEEE trial-use standard for wireless access in vehicular environments - security services for applications and management messages, 2006. IEEE Std 1609.2--2006.
[19]
IEEE. IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11--2012 (Revision of IEEE Std 802.11-2007), March 29 2012.
[20]
IEEE. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE). IEEE Standard 1069.*, 2012.
[21]
C. Lochert, B. Scheuermann, and M. Mauve. Probabilistic aggregation for data dissemination in VANETs. In Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks - VANET '07, page 1, 2007.
[22]
T. Nadeem, S. Dashtinezhad, C. Liao, and L. Iftode. Trafficview: a scalable traffic monitoring system. In Mobile Data Management, 2004. Proceedings. 2004 IEEE International Conference on, pages 13 -- 26, 2004.
[23]
F. Picconi, N. Ravi, M. Gruteser, and L. Iftode. Probabilistic validation of aggregated data in vehicular ad-hoc networks. In Proceedings of the 3rd international workshop on Vehicular ad hoc networks - VANET '06, page 76, New York, New York, USA, 2006. ACM Press.
[24]
M. Raya, A. Aziz, and J.-P. Hubaux. Efficient secure aggregation in VANETs. In Proceedings of the 3rd international workshop on Vehicular ad hoc networks, VANET '06, pages 67--75. ACM, 2006.
[25]
Y. Sang, H. Shen, Y. Inoguchi, Y. Tan, and N. Xiong. Secure data aggregation in wireless sensor networks: A survey. In PDCAT'06, pages 315--320, 2006.
[26]
B. Scheuermann, C. Lochert, J. Rybicki, and M. Mauve. A fundamental scalability criterion for data aggregation in VANETs. In Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09, page 285, 2009.
[27]
Y.-c. Tseng, S.-Y. Ni, Y.-s. Chen, and J.-P. Sheu. The Broadcast Storm Problem in a Mobile Ad Hoc Network. Wireless Networks, 8(2-3):153--167, 2002.
[28]
University of Ulm. vanet.info simulation portal. http://www.vanet.info/?q=node/11.
[29]
L. Wischoff, A. Ebner, H. Rohling, M. Lott, and R. Halfmann. SOTIS - a self-organizing traffic information system. In Vehicular Technology Conference, 2003. VTC 2003-Spring. The 57th IEEE Semiannual, volume 4, pages 2442 -- 2446 vol.4, april 2003.

Cited By

View all
  • (2022)Data collection protocols for VANETs: a surveyComplex & Intelligent Systems10.1007/s40747-021-00629-x8:3(2593-2622)Online publication date: 10-Jan-2022
  • (2015)Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks2015 IEEE 81st Vehicular Technology Conference (VTC Spring)10.1109/VTCSpring.2015.7146074(1-5)Online publication date: May-2015
  • (2015)Context-adaptive detection of insider attacks in VANET information dissemination schemes2015 IEEE Vehicular Networking Conference (VNC)10.1109/VNC.2015.7385590(287-294)Online publication date: Dec-2015
  • Show More Cited By

Index Terms

  1. SeDyA: secure dynamic aggregation in VANETs

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
    April 2013
    230 pages
    ISBN:9781450319980
    DOI:10.1145/2462096
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 April 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. multi-hop communication
    2. secure aggregation
    3. vanets

    Qualifiers

    • Research-article

    Conference

    WISEC'13
    Sponsor:

    Acceptance Rates

    WiSec '13 Paper Acceptance Rate 26 of 70 submissions, 37%;
    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Data collection protocols for VANETs: a surveyComplex & Intelligent Systems10.1007/s40747-021-00629-x8:3(2593-2622)Online publication date: 10-Jan-2022
    • (2015)Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks2015 IEEE 81st Vehicular Technology Conference (VTC Spring)10.1109/VTCSpring.2015.7146074(1-5)Online publication date: May-2015
    • (2015)Context-adaptive detection of insider attacks in VANET information dissemination schemes2015 IEEE Vehicular Networking Conference (VNC)10.1109/VNC.2015.7385590(287-294)Online publication date: Dec-2015
    • (2014)Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes2014 IEEE Vehicular Networking Conference (VNC)10.1109/VNC.2014.7013332(135-142)Online publication date: Dec-2014
    • (2014)In-Network Aggregation for Vehicular Ad Hoc NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2014.232009116:4(1909-1932)Online publication date: Dec-2015
    • (2014)Embedded Systems Security: A Survey of EU Research EffortsSecurity and Communication Networks10.1002/sec.11518:11(2016-2036)Online publication date: 23-Dec-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media