Analysis of Security Overhead in Broadcast V2V Communications

被引:4
作者
Muhammad, Mujahid [1 ]
Kearney, Paul [1 ]
Aneiba, Adel [1 ]
Kunz, Andreas [2 ]
机构
[1] Birmingham City Univ, Birmingham, W Midlands, England
[2] Lenovo, Oberursel, Germany
来源
COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019 | 2019年 / 11699卷
关键词
V2V; Security; Performance; Queuing theory;
D O I
10.1007/978-3-030-26250-1_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper concerns security issues for broadcast vehicle to vehicle (V2V) messages carrying vehicle status information (location, heading, speed, etc.). These are often consumed by safety-related applications that e.g. augment situational awareness, issue alerts, recommend courses of action, and even trigger autonomous action. Consequently, the messages need to be both trustworthy and timely. We explore the impact of authenticity and integrity protection mechanisms on message latency using a model based on queuing theory. In conditions of high traffic density such as found in busy city centres, even the latency requirement of 100 ms for first generation V2V applications was found to be challenging. Our main objective was to compare the performance overhead of the standard, PKC-based, message authenticity and integrity protection mechanism with that of an alternative scheme, TESLA, which uses symmetric-key cryptography combine with hash chains. This type of scheme has been dismissed in the past due to supposed high latency, but we found that in high traffic density conditions it outperformed the PKC-based scheme. without invoking congestion management measures. Perhaps the most significant observation from a security perspective is that denial of service attacks appear very easy to carry out and hard to defend against. This merits attention from the research and practitioner communities and is a topic we intend to address in the future.
引用
收藏
页码:251 / 263
页数:13
相关论文
共 50 条
  • [21] Secure V2V Communications in Relay-Assisted Cognitive Radio Vehicular Networks With Imperfect CSI
    Zhang, Yang
    Hou, Jun
    Zhao, Xiangmo
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (01): : 2129 - 2138
  • [22] Analysis of Opportunistic Relaying and Load Balancing Gains Through V2V Clustering
    Kassir, Saadallah
    de Veciana, Gustavo
    Wang, Nannan
    Wang, Xi
    Palacharla, Paparao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (09) : 9896 - 9911
  • [23] Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review
    Berlato, Stefano
    Centenaro, Marco
    Ranise, Silvio
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) : 10086 - 10103
  • [24] Group Security of V2V using Cloud Computing Processing and 4G Wireless Services
    Panja, Biswajit
    Morrison, David
    Meharia, Priyanka
    Bhargava, Bharat
    Prakash, Atul
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2014, 5 (03): : 218 - 232
  • [25] Application of a HID Certificate Issue Algorithm for Strengthening Private Information Security Over the V2V Environment
    Park, Sung-Su
    Du, Sang Gyun
    Kim, Keecheon
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 611 - 615
  • [26] Physical Layer Evaluation on IEEE 802.11p With Different Configurations in NLOS Scenarios for V2V Communications
    Guo, Shuting
    Aloi, Daniel N.
    Li, Jia
    Zhao, Hongmei
    IEEE ACCESS, 2025, 13 : 44428 - 44444
  • [27] A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations
    Bahramnejad, Somayeh
    Movahhedinia, Naser
    COMPUTING, 2022, 104 (08) : 1923 - 1947
  • [28] Zone Encryption with Anonymous Authentication for V2V Communication
    Camenisch, Jan
    Drijvers, Manu
    Lehmann, Anja
    Neven, Gregory
    Towa, Patrick
    2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 405 - 424
  • [29] A Digital Signature Architecture Suitable for V2V Applications
    Mosanaei-Boorani, Hatameh
    Bayat-Sarmadi, Siavash
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2024, 71 (02) : 731 - 739
  • [30] Integration of V2V With Cloud Computing to Provide Group Security Through the use of 4G LTE
    Panja, Biswajit
    Morrison, David
    Turner, Stephen
    Meharia, Priyanka
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 167 - 175