Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2030613.2030635acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Flooding-resilient broadcast authentication for VANETs

Published: 19 September 2011 Publication History

Abstract

Digital signatures are one of the fundamental security primitives in Vehicular Ad-Hoc Networks (VANETs) because they provide authenticity and non-repudiation in broadcast communication. However, the current broadcast authentication standard in VANETs is vulnerable to signature flooding: excessive signature verification requests that exhaust the computational resources of victims. In this paper, we propose two efficient broadcast authentication schemes, Fast Authentication (FastAuth) and Selective Authentication (SelAuth), as two countermeasures to signature flooding. FastAuth secures periodic single-hop beacon messages. By exploiting the sender's ability to predict its own future beacons, FastAuth enables 50 times faster verification than previous mechanisms using the Elliptic Curve Digital Signature Algorithm. SelAuth secures multi-hop applications in which a bogus signature may spread out quickly and impact a significant number of vehicles. SelAuth pro- vides fast isolation of malicious senders, even under a dynamic topology, while consuming only 15%--30% of the computational resources compared to other schemes. We provide both analytical and experimental evaluations based on real traffic traces and NS-2 simulations. With the near-term deployment plans of VANET on all vehicles, our approaches can make VANETs practical.

Supplementary Material

JPG File (mobicom_5_4.jpg)
MP4 File (mobicom_5_4.mp4)

References

[1]
LEA-6 u-blox 6 GPS modules data sheet, 2010.
[2]
BAI, F., KRISHNAN, H., SADEKAR, V., HOLLAND, G., AND ELBATT, T. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE AutoNet (2006).
[3]
BAI, F., STANCIL, D. D., AND KRISHNAN, H. Toward understanding characteristics of dedicated short range communications from a perspective of vehicular network engineers. In Proceedings of ACM MobiCom (2010).
[4]
BLOOM, B. H. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (1970), 422--426.
[5]
CANETTI, R., GARAY, J., ITKIS, G., MICCIANCIO, D., NAOR, M., AND PINKAS, B. Multicast security: A taxonomy and some efficient constructions. In Proceedings of IEEE INFOCOMM (1999).
[6]
CHEN, Q., SCHMIDT-EISENLOHR, F., JIANG, D., TORRENT-MORENO, M., DELGROSSI, L., AND HARTENSTEIN, H. Overhaul of IEEE 802.11 modeling and simulation in ns-2. In Proceedings of ACM MSWiM (2007).
[7]
CHIANG, J. T., AND HU, Y.-C. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of ACM MobiCom (2007).
[8]
FRANCILLON, A., DANEV, B., AND CAPKUN, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of NDSS (2010).
[9]
GENNARO, R., AND ROHATGI, P. How to sign digital streams. In Proceedings of CRYPTO (1997).
[10]
GUNTER, C. A., KHANNA, S., TAN, K., AND VENKATESH, S. DoS protection for reliably authenticated broadcast. In Proceedings of NDSS (2004).
[11]
HAAS, J. J., AND HU, Y.-C. Communication requirements for crash avoidance. In Proceedings of VANET (2010).
[12]
HSIAO, H.-C., STUDER, A., DUBEY, R., SHI, E., AND PERRIG, A. Efficient and secure threshold-based event validation for vanets. In Proceedings of ACM Conference on Wireless Network Security (WiSec) (2011).
[13]
HU, Y.-C., AND LABERTEAUX, K. P. Strong VANET security on a budget. In Proceedings of ESCAR (2006).
[14]
HUFFMAN, D. A. A method for the construction of minimum-redundancy codes. Institute of Radio Engineers 40, 9 (September 1952), 1098--1101.
[15]
IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Standards, 2006.
[16]
JUNG, J., KRISHNAMURTHY, B., AND RABINOVICH, M. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In Proceedings of ACM WWW (2002).
[17]
K. DANIEL, H., GEORG, R., AND PETER, W. SUMO (Simulation of Urban MObility) - an open-source traffic simulation. In Proceedings of MESM (2002).
[18]
KARLOF, C., SASTRY, N., LI, Y., PERRIG, A., AND TYGAR, J. D. Distillation codes and applications to DoS resistant multicast authentication. In Proceedings of NDSS (2004).
[19]
KHANNA, S., VENKATESH, S. S., FATEMIEH, O., KHAN, F., AND GUNTER, C. A. Adaptive selective verification. In Proceedings of IEEE INFOCOM (2008).
[20]
KOSCHER, K., CZESKIS, A., ROESNER, F., PATEL, S., KOHNO, T., CHECKOWAY, S., MCCOY, D., KANTOR, B., ANDERSON, D., SHACHAM, H., AND SAVAGE, S. Experimental security analysis of a modern automobile. In Proceedings of IEEE Symposium on Security and Privacy (2010).
[21]
LAMPORT, L. Constructing digital signatures from a one-way function. Tech. rep., October 1979.
[22]
LI, Z., AND CHIGAN, C. On resource-aware message verification in VANETs. In Proceedings of IEEE ICC (2010).
[23]
LIU, Y., NING, P., DAI, H., AND LIU, A. Randomized differential DSSS: jamming-resistant wireless broadcast communication. In Proceedings of IEEE INFOCOM (2010).
[24]
LUK, M., PERRIG, A., AND WHILLOCK, B. Seven cardinal properties of sensor network broadcast authentication. In Proceedings of ACM workshop on Security of ad hoc and sensor networks (SASN) (2006).
[25]
MCAULEY, A. J. Reliable broadband communication using a burst erasure correcting code. SIGCOMM Comput. Commun. Rev. 20, 4 (1990), 297--306.
[26]
MCCANNE, S., FLOYD, S., AND FALL, K. ns2 (network simulator 2). http://www-nrg.ee.lbl.gov/ns/.
[27]
MERKLE, R. C. A digital signature based on a conventional encryption function. In Proceedings of CRYPTO (1987).
[28]
MUÑOZ, J. L., FORNÉ, J., ESPARZA, O., AND REY, M. Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT). Trust, Privacy and Security in Digital Business 3592 (2005), 119--127.
[29]
PANNETRAT, A., AND MOLVA, R. Efficient multicast packet authentication. In Proceedings of NDSS (2003).
[30]
PERRIG, A. The BiBa one-time signature and broadcast authentication protocol. In Proceedings of ACM CCS (2001).
[31]
PERRIG, A., CANETTI, R., TYGAR, J. D., AND SONG, D. The TESLA broadcast authentication protocol. RSA CryptoBytes (2002).
[32]
RAYA, M., AND HUBAUX, J.-P. Securing vehicular ad hoc networks. JCS-SASN (2007).
[33]
REED, I., AND SOLOMON, G. Polynomial codes over certain finite fields. J. SIAM 8, 2 (1960), 300--304.
[34]
RISTANOVIC, N., PAPADIMITRATOS, P., THEODORAKOPOULOS, G., HUBAUX, J.-P., AND LEBOUDEC, J.-Y. Adaptive message authentication for vehicular networks. In Proceedings of ACM VANET (2009).
[35]
ROUF, I., MILLER, R., MUSTAFA, H., TAYLOR, T., OH, S., XU, W., GRUTESER, M., TRAPPE, W., AND SESKAR, I. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium (2010).
[36]
SCHOCH, E., AND KARGL, F. On the efficiency of secure beaconing in VANETs. In Proceedings of ACM WiSec (2010).
[37]
STUDER, A., BAI, F., BELLUR, B., AND PERRIG, A. Flexible, extensible, and efficient VANET authentication. Journal of Communications and Networks 11, 6 (Dec. 2009), 574--588.
[38]
WANG, R., DU, W., AND NING, P. Containing denial-of-service attacks in broadcast authentication in sensor networks. In Proceedings of ACM MobiHoc (2007).

Cited By

View all
  • (2024)Authentication and PHY-Security Schemes for Electric Vehicle Dynamic Wireless ChargingIEEE Transactions on Vehicular Technology10.1109/TVT.2023.331847273:2(1698-1712)Online publication date: Feb-2024
  • (2024)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle ConnectionsIEEE Transactions on Mobile Computing10.1109/TMC.2023.327521823:4(3309-3327)Online publication date: Apr-2024
  • (2023)SECMACE+: Upscaling Pseudonymous Authentication for Large Mobile SystemsIEEE Transactions on Cloud Computing10.1109/TCC.2023.3250584(1-18)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. Flooding-resilient broadcast authentication for VANETs

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiCom '11: Proceedings of the 17th annual international conference on Mobile computing and networking
      September 2011
      362 pages
      ISBN:9781450304924
      DOI:10.1145/2030613
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 September 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. VANETs
      2. broadcast authentication
      3. flooding resilience
      4. signatures

      Qualifiers

      • Research-article

      Conference

      Mobicom'11
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 440 of 2,972 submissions, 15%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)13
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 13 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Authentication and PHY-Security Schemes for Electric Vehicle Dynamic Wireless ChargingIEEE Transactions on Vehicular Technology10.1109/TVT.2023.331847273:2(1698-1712)Online publication date: Feb-2024
      • (2024)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle ConnectionsIEEE Transactions on Mobile Computing10.1109/TMC.2023.327521823:4(3309-3327)Online publication date: Apr-2024
      • (2023)SECMACE+: Upscaling Pseudonymous Authentication for Large Mobile SystemsIEEE Transactions on Cloud Computing10.1109/TCC.2023.3250584(1-18)Online publication date: 2023
      • (2021)Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc NetworkSensors10.3390/s2114493521:14(4935)Online publication date: 20-Jul-2021
      • (2021)A Survey on Machine-Learning Based Security Design for Cyber-Physical SystemsApplied Sciences10.3390/app1112545811:12(5458)Online publication date: 12-Jun-2021
      • (2021)Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2020.298188720:7(2473-2489)Online publication date: 1-Jul-2021
      • (2021)A secure authentication technique for connecting different IoT devices in the smart city infrastructureCluster Computing10.1007/s10586-021-03444-825:4(2333-2349)Online publication date: 2-Nov-2021
      • (2021)Preventing DoS Attack in VANET by Novel RBS-IP-CHOCK ModelOptical and Wireless Technologies10.1007/978-981-16-2818-4_31(281-293)Online publication date: 2-Sep-2021
      • (2020)A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle CommunicationSensors10.3390/s2004100020:4(1000)Online publication date: 13-Feb-2020
      • (2020)An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETsICC 2020 - 2020 IEEE International Conference on Communications (ICC)10.1109/ICC40277.2020.9149028(1-7)Online publication date: Jun-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media