Analysis of Security Overhead in Broadcast V2V Communications

被引:4
|
作者
Muhammad, Mujahid [1 ]
Kearney, Paul [1 ]
Aneiba, Adel [1 ]
Kunz, Andreas [2 ]
机构
[1] Birmingham City Univ, Birmingham, W Midlands, England
[2] Lenovo, Oberursel, Germany
关键词
V2V; Security; Performance; Queuing theory;
D O I
10.1007/978-3-030-26250-1_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper concerns security issues for broadcast vehicle to vehicle (V2V) messages carrying vehicle status information (location, heading, speed, etc.). These are often consumed by safety-related applications that e.g. augment situational awareness, issue alerts, recommend courses of action, and even trigger autonomous action. Consequently, the messages need to be both trustworthy and timely. We explore the impact of authenticity and integrity protection mechanisms on message latency using a model based on queuing theory. In conditions of high traffic density such as found in busy city centres, even the latency requirement of 100 ms for first generation V2V applications was found to be challenging. Our main objective was to compare the performance overhead of the standard, PKC-based, message authenticity and integrity protection mechanism with that of an alternative scheme, TESLA, which uses symmetric-key cryptography combine with hash chains. This type of scheme has been dismissed in the past due to supposed high latency, but we found that in high traffic density conditions it outperformed the PKC-based scheme. without invoking congestion management measures. Perhaps the most significant observation from a security perspective is that denial of service attacks appear very easy to carry out and hard to defend against. This merits attention from the research and practitioner communities and is a topic we intend to address in the future.
引用
收藏
页码:251 / 263
页数:13
相关论文
共 50 条
  • [1] 5G-based V2V broadcast communications: A security perspective
    Muhammad, Mujahid
    Safdar, Ghazanfar Ali
    ARRAY, 2021, 11
  • [2] Theoretical Broadcast Rate Optimization for V2V Communications at Intersection
    Kimura, Tatsuaki
    Saito, Hiroshi
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) : 3360 - 3372
  • [3] A Security Credential Management System for V2V Communications
    Whyte, William
    Weimerskirch, Andre
    Kumar, Virendra
    Hehn, Thorsten
    2013 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2013, : 1 - 8
  • [4] Performance Analysis of CSMA/CA Broadcast Relay Network for ITS V2V Communications
    Cheng, Huiting
    Yamao, Yasushi
    2012 IEEE 75TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2012,
  • [5] Efficient Urban Broadcast Protocol for V2V Communications with Relay Control
    Cao, Ke
    Kinoshita, Atsushi
    Takaki, Yumi
    Ohta, Chikara
    Tamaki, Hisashi
    2013 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2013, : 24 - 30
  • [6] Efficient Distribution of Key Chain Commitments for Broadcast Authentication in V2V Communications
    Muhammad, Mujahid
    Kearney, Paul
    Aneiba, Adel
    Kunz, Andreas
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [7] A Novel Geo-Broadcast Algorithm for V2V Communications over WSN
    Anaya, Jose J.
    Talavera, Edgar
    Jimenez, Felipe
    Gomez, Nuria
    Naranjo, Jose E.
    ELECTRONICS, 2014, 3 (03): : 521 - 537
  • [8] Power Control for Broadcast V2V Communications with Adjacent Carrier Interference Effects
    Hisham, Anver
    Sun, Wanlu
    Strom, Erik G.
    Brannstrom, Fredrik
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [9] Analysis of V2V Sidelink Communications for Platoon Applications
    Giambene, Giovanni
    Rahman, Md Saifur
    Vinel, Alexey
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [10] V2V Communications Performance Enhancement
    Hamarsheh, Qadri
    Daoud, Omar
    Al-Akaidi, Marwan
    Damati, Ahlam
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2387 - 2401