Analysis of Security Overhead in Broadcast V2V Communications

被引:4
作者
Muhammad, Mujahid [1 ]
Kearney, Paul [1 ]
Aneiba, Adel [1 ]
Kunz, Andreas [2 ]
机构
[1] Birmingham City Univ, Birmingham, W Midlands, England
[2] Lenovo, Oberursel, Germany
来源
COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019 | 2019年 / 11699卷
关键词
V2V; Security; Performance; Queuing theory;
D O I
10.1007/978-3-030-26250-1_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper concerns security issues for broadcast vehicle to vehicle (V2V) messages carrying vehicle status information (location, heading, speed, etc.). These are often consumed by safety-related applications that e.g. augment situational awareness, issue alerts, recommend courses of action, and even trigger autonomous action. Consequently, the messages need to be both trustworthy and timely. We explore the impact of authenticity and integrity protection mechanisms on message latency using a model based on queuing theory. In conditions of high traffic density such as found in busy city centres, even the latency requirement of 100 ms for first generation V2V applications was found to be challenging. Our main objective was to compare the performance overhead of the standard, PKC-based, message authenticity and integrity protection mechanism with that of an alternative scheme, TESLA, which uses symmetric-key cryptography combine with hash chains. This type of scheme has been dismissed in the past due to supposed high latency, but we found that in high traffic density conditions it outperformed the PKC-based scheme. without invoking congestion management measures. Perhaps the most significant observation from a security perspective is that denial of service attacks appear very easy to carry out and hard to defend against. This merits attention from the research and practitioner communities and is a topic we intend to address in the future.
引用
收藏
页码:251 / 263
页数:13
相关论文
共 50 条
[21]   Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs [J].
Wei, Lu ;
Cui, Jie ;
Zhong, Hong ;
Xu, Yan ;
Liu, Lu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) :3280-3297
[22]   Context-Aware Authentication Framework for Secure V2V and V2I Communications in Autonomous Vehicles Using LLM [J].
Sharma, Ankita ;
Rani, Shalli .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025,
[23]   Certificateless Signature Scheme With Batch Verification for Secure and Privacy-Preserving V2V Communications in VANETs [J].
Wu, Qian ;
Zhang, Lei ;
Yang, Yafang ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) :1448-1459
[24]   Secure V2V Communications in Relay-Assisted Cognitive Radio Vehicular Networks With Imperfect CSI [J].
Zhang, Yang ;
Hou, Jun ;
Zhao, Xiangmo .
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (01) :2129-2138
[25]   Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review [J].
Berlato, Stefano ;
Centenaro, Marco ;
Ranise, Silvio .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) :10086-10103
[26]   Analysis of Opportunistic Relaying and Load Balancing Gains Through V2V Clustering [J].
Kassir, Saadallah ;
de Veciana, Gustavo ;
Wang, Nannan ;
Wang, Xi ;
Palacharla, Paparao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (09) :9896-9911
[27]   Group Security of V2V using Cloud Computing Processing and 4G Wireless Services [J].
Panja, Biswajit ;
Morrison, David ;
Meharia, Priyanka ;
Bhargava, Bharat ;
Prakash, Atul .
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2014, 5 (03) :218-232
[28]   Application of a HID Certificate Issue Algorithm for Strengthening Private Information Security Over the V2V Environment [J].
Park, Sung-Su ;
Du, Sang Gyun ;
Kim, Keecheon .
2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, :611-615
[29]   Physical Layer Evaluation on IEEE 802.11p With Different Configurations in NLOS Scenarios for V2V Communications [J].
Guo, Shuting ;
Aloi, Daniel N. ;
Li, Jia ;
Zhao, Hongmei .
IEEE ACCESS, 2025, 13 :44428-44444
[30]   A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations [J].
Bahramnejad, Somayeh ;
Movahhedinia, Naser .
COMPUTING, 2022, 104 (08) :1923-1947