16,584 research outputs found
Impact of Vehicular Communications Security on Transportation Safety
Transportation safety, one of the main driving forces of the development of
vehicular communication (VC) systems, relies on high-rate safety messaging
(beaconing). At the same time, there is consensus among authorities, industry,
and academia on the need to secure VC systems. With specific proposals in the
literature, a critical question must be answered: can secure VC systems be
practical and satisfy the requirements of safety applications, in spite of the
significant communication and processing overhead and other restrictions
security and privacy-enhancing mechanisms impose? To answer this question, we
investigate in this paper the following three dimensions for secure and
privacy-enhancing VC schemes: the reliability of communication, the processing
overhead at each node, and the impact on a safety application. The results
indicate that with the appropriate system design, including sufficiently high
processing power, applications enabled by secure VC can be in practice as
effective as those enabled by unsecured VC
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has
begun and many research challenges still need to be addressed. Location privacy
continues to be in the top of these challenges. Indeed, both of academia and
industry agreed to apply the pseudonym changing approach as a solution to
protect the location privacy of VANETs'users. However, due to the pseudonyms
linking attack, a simple changing of pseudonym shown to be inefficient to
provide the required protection. For this reason, many pseudonym changing
strategies have been suggested to provide an effective pseudonym changing.
Unfortunately, the development of an effective pseudonym changing strategy for
VANETs is still an open issue. In this paper, we present a comprehensive survey
and classification of pseudonym changing strategies. We then discuss and
compare them with respect to some relevant criteria. Finally, we highlight some
current researches, and open issues and give some future directions
iTETRIS: An Integrated Wireless and Traffic Platform for Real-Time Road Traffic Management Solutions
Wireless vehicular cooperative systems have been identified as an attractive solution to improve road traffic management, thereby contributing to the European goal of safer, cleaner, and more efficient and sustainable traffic solutions. V2V-V2I communication technologies can improve traffic management through real-time exchange of data among vehicles and with road infrastructure. It is also of great importance to investigate the adequate combination of V2V and V2I technologies to ensure the continuous and costefficient operation of traffic management solutions based on wireless vehicular cooperative solutions. However, to adequately design and optimize these communication protocols and analyze the potential of wireless vehicular cooperative systems to improve road traffic management, adequate testbeds and field operational tests need to be conducted.
Despite the potential of Field Operational Tests to get the first insights into the benefits and problems faced in the development of wireless vehicular cooperative systems, there is yet the need to evaluate in the long term and large dimension the true potential benefits of wireless vehicular cooperative systems to improve traffic efficiency. To this aim, iTETRIS is devoted to the development of advanced tools coupling traffic and wireless communication simulators
On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets
Millimeter wave (mmWave) vehicular communica tion systems have the potential
to improve traffic efficiency and safety. Lack of secure communication links,
however, may lead to a formidable set of abuses and attacks. To secure
communication links, a physical layer precoding technique for mmWave vehicular
communication systems is proposed in this paper. The proposed technique
exploits the large dimensional antenna arrays available at mmWave systems to
produce direction dependent transmission. This results in coherent transmission
to the legitimate receiver and artificial noise that jams eavesdroppers with
sensitive receivers. Theoretical and numerical results demonstrate the validity
and effectiveness of the proposed technique and show that the proposed
technique provides high secrecy throughput when compared to conventional array
and switched array transmission techniques
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion
Recent advances in wireless technologies have enabled many new applications
in Intelligent Transportation Systems (ITS) such as collision avoidance,
cooperative driving, congestion avoidance, and traffic optimization. Due to the
vulnerable nature of wireless communication against interference and
intentional jamming, ITS face new challenges to ensure the reliability and the
safety of the overall system. In this paper, we expose a class of stealthy
attacks -- Stuck in Traffic (SiT) attacks -- that aim to cause congestion by
exploiting how drivers make decisions based on smart traffic signs. An attacker
mounting a SiT attack solves a Markov Decision Process problem to find
optimal/suboptimal attack policies in which he/she interferes with a
well-chosen subset of signals that are based on the state of the system. We
apply Approximate Policy Iteration (API) algorithms to derive potent attack
policies. We evaluate their performance on a number of systems and compare them
to other attack policies including random, myopic and DoS attack policies. The
generated policies, albeit suboptimal, are shown to significantly outperform
other attack policies as they maximize the expected cumulative reward from the
standpoint of the attacker
Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems
Standardization and harmonization efforts have reached a consensus towards
using a special-purpose Vehicular Public-Key Infrastructure (VPKI) in upcoming
Vehicular Communication (VC) systems. However, there are still several
technical challenges with no conclusive answers; one such an important yet open
challenge is the acquisition of shortterm credentials, pseudonym: how should
each vehicle interact with the VPKI, e.g., how frequently and for how long?
Should each vehicle itself determine the pseudonym lifetime? Answering these
questions is far from trivial. Each choice can affect both the user privacy and
the system performance and possibly, as a result, its security. In this paper,
we make a novel systematic effort to address this multifaceted question. We
craft three generally applicable policies and experimentally evaluate the VPKI
system performance, leveraging two large-scale mobility datasets. We consider
the most promising, in terms of efficiency, pseudonym acquisition policies; we
find that within this class of policies, the most promising policy in terms of
privacy protection can be supported with moderate overhead. Moreover, in all
cases, this work is the first to provide tangible evidence that the
state-of-the-art VPKI can serve sizable areas or domain with modest computing
resources.Comment: 6 pages, 7 figures, IoV-VoI'1
- …