983 research outputs found
"On the Road" - Reflections on the Security of Vehicular Communication Systems
Vehicular communication (VC) systems have recently drawn the attention of
industry, authorities, and academia. A consensus on the need to secure VC
systems and protect the privacy of their users led to concerted efforts to
design security architectures. Interestingly, the results different project
contributed thus far bear extensive similarities in terms of objectives and
mechanisms. As a result, this appears to be an auspicious time for setting the
corner-stone of trustworthy VC systems. Nonetheless, there is a considerable
distance to cover till their deployment. This paper ponders on the road ahead.
First, it presents a distillation of the state of the art, covering the
perceived threat model, security requirements, and basic secure VC system
components. Then, it dissects predominant assumptions and design choices and
considers alternatives. Under the prism of what is necessary to render secure
VC systems practical, and given possible non-technical influences, the paper
attempts to chart the landscape towards the deployment of secure VC systems
Vehicle Authentication in Vehicular Ad-hoc Network using RSU Based Approach
Vehicular Ad Hoc Network (VANET) is a pervasive network where vehicles communicate with nearby vehicles and infrastructure nodes, such as Road-side unit (RSU). VANET is the subclass of Mobile Ad Hoc Network (MANET) in which nodes move randomly and are connected wirelessly. Information sharing among vehicles is an essential component of an intelligent traffic system (ITS), but security and privacy concerns must be taken into consideration. Security of the network can be improved by granting access only to authenticated vehicles. This research proposes an RSU based approach to authenticate vehicles and notify vehicles about unauthorized messages/vehicles. It helps in preventing other vehicles in the network from being influenced by the malicious vehicle. In this approach, Blockchain has been used to securely maintain the identity of all vehicles in the network. The use of this RSU based approach helps to reduce the computational overhead on the On-board unit (OBU) of individual vehicles and reduces the processing delay
Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain
Vehicular Ad Hoc Network (VANET) is a mobile network formed by vehicles, roadside units, and other infrastructures that enable communication between the nodes to improve road safety and traffic control. While this technology promises great benefits to drivers, it has many security concerns that are critical to road safety. It is essential to ensure that only authenticated vehicles transmit data and revoked vehicles do not interfere in this communication. Many current VANET technologies also depend on a central trusted authority that can cost computation and communication overhead and be a single point of failure for the network. By using blockchain technology in VANET, we can take advantage of the decentralized and distributed framework and thereby avoid a single point of trust. Moreover, blockchain technology ensures the immutability of the data strengthening the integrity of the system. In the proposed framework, Hyperledger Fabric, a permissioned blockchain technology, is used for identity management in VANET. All the vehicles with their pseudo IDs are registered, validated, and revoked using the blockchain technology. The vehicles in the network check the validity of the safety messages received from the neighboring nodes, using the services provided by the road side units that have access to the blockchain. This framework works on looking-up the pseudo IDs and public keys on the blockchain for their validity, thus promising a light-weight authentication and reduced computation and communication overhead for vehicles to access the safety messages in the network
Blockchain Application on the Internet of Vehicles (IoV)
With the rapid development of the Internet of Things (IoT) and its potential
integration with the traditional Vehicular Ad-Hoc Networks (VANETs), we have
witnessed the emergence of the Internet of Vehicles (IoV), which promises to
seamlessly integrate into smart transportation systems. However, the key
characteristics of IoV, such as high-speed mobility and frequent disconnections
make it difficult to manage its security and privacy. The Blockchain, as a
distributed tamper-resistant ledge, has been proposed as an innovative solution
that guarantees privacy-preserving yet secure schemes. In this paper, we review
recent literature on the application of blockchain to IoV, in particular, and
intelligent transportation systems in general
ESIA: An Efficient and Stable Identity Authentication for Internet of Vehicles
Decentralized, tamper-proof blockchain is regarded as a solution to a
challenging authentication issue in the Internet of Vehicles (IoVs). However,
the consensus time and communication overhead of blockchain increase
significantly as the number of vehicles connected to the blockchain. To address
this issue, vehicular fog computing has been introduced to improve efficiency.
However, existing studies ignore several key factors such as the number of
vehicles in the fog computing system, which can impact the consensus
communication overhead. Meanwhile, there is no comprehensive study on the
stability of vehicular fog composition. The vehicle movement will lead to
dynamic changes in fog. If the composition of vehicular fog is unstable, the
blockchain formed by this fog computing system will be unstable, which can
affect the consensus efficiency. With the above considerations, we propose an
efficient and stable identity authentication (ESIA) empowered by hierarchical
blockchain and fog computing. By grouping vehicles efficiently, ESIA has low
communication complexity and achieves high stability. Moreover, to enhance the
consensus security of the hierarchical blockchain, the consensus process is
from the bottom layer to the up layer (bottom-up), which we call B2UHChain.
Through theoretical analysis and simulation verification, our scheme achieves
the design goals of high efficiency and stability while significantly improving
the IoV scalability to the power of 1.5 (^1.5) under similar security to a
single-layer blockchain. In addition, ESIA has less communication and
computation overhead, lower latency, and higher throughput than other baseline
authentication schemes
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems
Several years of academic and industrial research efforts have converged to a
common understanding on fundamental security building blocks for the upcoming
Vehicular Communication (VC) systems. There is a growing consensus towards
deploying a special-purpose identity and credential management infrastructure,
i.e., a Vehicular Public-Key Infrastructure (VPKI), enabling pseudonymous
authentication, with standardization efforts towards that direction. In spite
of the progress made by standardization bodies (IEEE 1609.2 and ETSI) and
harmonization efforts (Car2Car Communication Consortium (C2C-CC)), significant
questions remain unanswered towards deploying a VPKI. Deep understanding of the
VPKI, a central building block of secure and privacy-preserving VC systems, is
still lacking. This paper contributes to the closing of this gap. We present
SECMACE, a VPKI system, which is compatible with the IEEE 1609.2 and ETSI
standards specifications. We provide a detailed description of our
state-of-the-art VPKI that improves upon existing proposals in terms of
security and privacy protection, and efficiency. SECMACE facilitates
multi-domain operations in the VC systems and enhances user privacy, notably
preventing linking pseudonyms based on timing information and offering
increased protection even against honest-but-curious VPKI entities. We propose
multiple policies for the vehicle-VPKI interactions, based on which and two
large-scale mobility trace datasets, we evaluate the full-blown implementation
of SECMACE. With very little attention on the VPKI performance thus far, our
results reveal that modest computing resources can support a large area of
vehicles with very low delays and the most promising policy in terms of privacy
protection can be supported with moderate overhead.Comment: 14 pages, 9 figures, 10 tables, IEEE Transactions on Intelligent
Transportation System
- âŠ