4 research outputs found

    Secure Position-Based Routing for VANETs

    Get PDF
    Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research efforts, while comprehensive solutions to protect the network operation have not been developed. In this paper, we address this problem: we provide a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC. Moreover, we focus on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). We integrate security mechanisms to protect the position-based routing functionality and services (beaconing, multi-hop forwarding, and geo-location discovery), and enhance the network robustness. We propose defense mechanisms, relying both on cryptographic primitives, and plausibility checks mitigating false position injection. Our implementation and initial measurements show that the security overhead is low and the proposed scheme deployable

    A Framework of Secure Location Service for Position-based Ad Hoc Routing

    No full text
    In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, so far security issues in position-based routing protocols has not been widely considered. In this paper, we identify several security problems of positionbased routing protocols in mobile ad hoc networks. To avoid these problems, we propose the Secure Grid Location Service (SGLS), which enhances the original GLS protocol with secure features. Countermeasures employed by SGLS against feasible attacks use both a broadcast authentication protocol and a reputation system for monitoring. Simulation results showed that SGLS can detect and isolate message dropping attackers efficiently

    Development and evaluation of advanced traveler information system (ATIS) using vehicle-to-vehicle (V2V) communication system

    Get PDF
    This research develops and evaluates an Advanced Traveler Information System (ATIS) model using a Vehicle-to-Vehicle (V2V) communication system (referred to as the GATIS-V2V model) with the off-the-shelf microscopic simulation model, VISSIM. The GATIS-V2V model is tested on notional small traffic networks (non-signalized and signalized) and a 6X6 typical urban grid network (signalized traffic network). The GATIS-V2V model consists of three key modules: vehicle communication, on-board travel time database management, and a Dynamic Route Guidance System (DRGS). In addition, the system performance has been enhanced by applying three complementary functions: Autonomous Automatic Incident Detection (AAID), a minimum sample size algorithm, and a simple driver behavior model. To select appropriate parameter ranges for the complementary functions a sensitivity analysis has been conducted. The GATIS-V2V performance has been investigated relative to three underlying system parameters: traffic flow, communication radio range, and penetration ratio of participating vehicles. Lastly, the enhanced GATIS-V2V model is compared with the centralized traffic information system. This research found that the enhanced GATIS-V2V model outperforms the basic model in terms of travel time savings and produces more consistent and robust system output under non-recurrent traffic states (i.e., traffic incident) in the simple traffic network. This research also identified that the traffic incident detection time and driver's route choice rule are the most crucial factors influencing the system performance. As expected, as traffic flow and penetration ratio increase, the system becomes more efficient, with non-participating vehicles also benefiting from the re-routing of participating vehicles. The communication radio ranges considered were found not to significantly influence system operations in the studied traffic network. Finally, it is found that the decentralized GATIS-V2V model has similar performance to the centralized model even under low flow, short radio range, and low penetration ratio cases. This implies that a dynamic infrastructure-based traffic information system could replace a fixed infrastructure-based traffic information system, allowing for considerable savings in fixed costs and ready expansion of the system off of the main network corridors.Ph.D.Committee Chair: Hunter, Michael; Committee Member: Fujimoto, Richard; Committee Member: Guensler, Randall; Committee Member: Leonard, John; Committee Member: Meyer, Michae

    Asioiden Internetin tietoturva: ratkaisuja, standardeja ja avoimia ongelmia

    Get PDF
    Internet of Things (IoT) extends the Internet to our everyday objects, which enables new kind of applications and services. These IoT applications face demanding technical challenges: the number of ‘things’ or objects can be very large, they can be very con-strained devices, and may need to operate on challenging and dynamic environments. However, the architecture of today’s Internet is based on many legacy protocols and technology that were not originally designed to support features like mobility or the huge and growing number of objects the Internet consists of today. Similarly, many security features of today’s Internet are additional layers built to fill up flaws in the un-derlying design. Fulfilling new technical requirements set by IoT applications requires efficient solutions designed for the IoT use from the ground up. Moreover, the imple-mentation of this new IoT technology requires interoperability and integration with tra-ditional Internet. Due to considerable technical challenges, the security is an often over-looked aspect in the emerging new IoT technology. This thesis surveys general security requirements for the entire field of IoT applica-tions. Out of the large amount of potential applications, this thesis focuses on two major IoT application fields: wireless sensor networks and vehicular ad-hoc networks. The thesis introduces example scenarios and presents major security challenges related to these areas. The common standards related to the areas are examined in the security perspective. The thesis also examines research work beyond the area of standardization in an attempt to find solutions to unanswered security challenges. The thesis aims to give an introduction to the security challenges in the IoT world and review the state of the security research through these two major IoT areas
    corecore