Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

On the Performance of Secure Vehicular Communication Systems

Published: 01 November 2011 Publication History

Abstract

Vehicular communication (VC) systems are being developed primarily to enhance transportation safety and efficiency. Vehicle-to-vehicle communication, in particular, frequent cooperative awareness messages or safety beacons, has been considered over the past years as a main approach. Meanwhile, the need to provide security and to safeguard users' privacy is well understood, and security architectures for VC systems have been proposed. Although technical approaches to secure VC have several commonalities and a consensus has formed, there are critical questions that have remained largely unanswered: Are the proposed security and privacy schemes practical? Can the secured VC systems support the VC-enabled applications as effectively as unsecured VC would? How should security be designed so that its integration into a VC system has a limited effect on the system's performance? In this paper, we provide answers to these questions, investigating the joint effect of a set of system parameters and components. We consider the state-of-the-art approach in secure VC, and we evaluate analytically and through simulations the interdependencies among components and system characteristics. Overall, we identify key design choices for the deployment of efficient, effective, and secure VC systems.

Cited By

View all
  • (2024)Future-proofing Secure V2V Communication against Clogging DoS AttacksProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670932(1-8)Online publication date: 30-Jul-2024
  • (2022)Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)IEEE Communications Surveys & Tutorials10.1109/COMST.2022.317808124:3(1574-1601)Online publication date: 1-Jul-2022
  • (2019)Resilient Privacy Protection for Location-Based Services through DecentralizationACM Transactions on Privacy and Security10.1145/331940122:4(1-36)Online publication date: 25-Sep-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 8, Issue 6
November 2011
159 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 November 2011

Author Tags

  1. Security and protection
  2. and serviceability.
  3. availability
  4. reliability
  5. wireless communication

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Future-proofing Secure V2V Communication against Clogging DoS AttacksProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670932(1-8)Online publication date: 30-Jul-2024
  • (2022)Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)IEEE Communications Surveys & Tutorials10.1109/COMST.2022.317808124:3(1574-1601)Online publication date: 1-Jul-2022
  • (2019)Resilient Privacy Protection for Location-Based Services through DecentralizationACM Transactions on Privacy and Security10.1145/331940122:4(1-36)Online publication date: 25-Sep-2019
  • (2019)Scaling pseudonymous authentication for large mobile systemsProceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3317549.3323410(174-184)Online publication date: 15-May-2019
  • (2018)Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETsProceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/3212480.3212481(172-183)Online publication date: 18-Jun-2018
  • (2018)Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems2018 21st International Conference on Intelligent Transportation Systems (ITSC)10.1109/ITSC.2018.8569635(307-312)Online publication date: 4-Nov-2018
  • (2017)SA-EASTACM Transactions on Embedded Computing Systems10.1145/297967716:2(1-22)Online publication date: 2-Jan-2017
  • (2017)Collaborative Authentication in Decentralized Dense Mobile Networks With Key PredistributionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.270558412:10(2261-2275)Online publication date: 1-Oct-2017
  • (2016)The impact of malicious nodes positioning on vehicular alert messaging systemAd Hoc Networks10.1016/j.adhoc.2016.08.00852:C(3-16)Online publication date: 1-Dec-2016
  • (2016)Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networksSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-015-1737-y20:8(3335-3346)Online publication date: 1-Aug-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media