Resilient Secure Aggregation for Vehicular Networks

被引:23
|
作者
Dietzel, Stefan [1 ]
Schoch, Elmar
Koenings, Bastian
Weber, Michael
Kargl, Frank [2 ]
机构
[1] Univ Ulm, Inst Media Informat, D-89069 Ulm, Germany
[2] Univ Twente, Distributed & Embedded Secur Grp, Enschede, Netherlands
来源
IEEE NETWORK | 2010年 / 24卷 / 01期
关键词
D O I
10.1109/MNET.2010.5395780
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Innovative ways to use ad hoc networking between vehicles are an active research topic and numerous proposals have been made for applications that make use of it. Due to the bandwidth-limited wireless communication medium, scalability is one crucial factor for the success of these future protocols. Data aggregation is one solution to accomplish such scalability. The goal of aggregation is to semantically combine information and only disseminate this combined information in larger regions. However, the integrity of aggregated information cannot be easily verified anymore. Thus, attacks are possible resulting in lower user acceptance of applications using aggregation or, even worse, in accidents due to false information crafted by a malicious user. Therefore, it is necessary to design novel mechanisms to protect aggregation techniques. However, high vehicle mobility, as well as tight bandwidth constraints, pose strong requirements on the efficiency of such mechanisms. We present new security mechanisms for semantic data aggregation that are suitable for use in vehicular ad hoc networks. Resilience against both malicious users of the system and wrong information due to faulty sensors are taken into consideration. The presented mechanisms are evaluated with respect to their bandwidth overhead and their effectiveness against possible attacks.
引用
下载
收藏
页码:26 / 31
页数:6
相关论文
共 50 条
  • [21] A Resilient and Scalable Flocking Scheme in Autonomous Vehicular Networks
    Naixue Xiong
    Athanasios V. Vasilakos
    Laurence T. Yang
    Witold Pedrycz
    Yan Zhang
    Yingshu Li
    Mobile Networks and Applications, 2010, 15 : 126 - 136
  • [22] Secure and resilient localization in wireless sensor networks
    Ning, Peng
    Liu, Donggang
    Du, Wenliang
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 161 - +
  • [23] Efficient secure aggregation in sensor networks
    Jadia, P
    Mathuria, A
    HIGH PERFORMANCE COMPUTING - HIPC 2004, 2004, 3296 : 40 - 49
  • [24] Resilient aggregation with attack detection in sensor networks
    Buttyán, L
    Schaffer, P
    Vajda, I
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 332 - +
  • [25] Secure Data Aggregation for Sensor Networks
    Zhang Peng
    Yu Jian-ping
    2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, : 1853 - 1856
  • [26] Efficient secure aggregation in sensor networks
    Jadia, Pawan
    Mathuria, Anish
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3296 : 40 - 49
  • [27] Linear approaches to resilient aggregation in sensor networks
    Henry, Kevin J.
    Stinson, Douglas R.
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (04) : 245 - 272
  • [28] Secure crash reporting in Vehicular Ad hoc Networks
    Rahman, Sumair Ur
    Hengartner, Urs
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 443 - 452
  • [29] Secure Opportunistic Routing for Vehicular Ad Hoc Networks
    Das, Debasis
    Vasudev, Harsha
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 210 - 217
  • [30] PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS
    Qian, Yi
    Lu, Kejie
    Moayeri, Nader
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1082 - +