Analysis of security approaches for vehicular ad-hoc networks

被引:2
|
作者
Mihaita , Alexandra [1 ]
Dobre, Ciprian [1 ]
Mocanu, Bogdan [1 ]
Pop, Florin [1 ]
Cristea, Valentin [1 ]
机构
[1] Univ Politehn Bucuresti, Bucharest, Romania
关键词
D O I
10.1109/3PGCIC.2015.184
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the last years, the number of vehicles has increased up to a point where the road infrastructure cannot easily cope anymore, and congestion in cities becomes the norm rather then exception. Smart technologies are vastly employed to cope with advanced scheduling mechanisms - from intelligent traffic lights designed to control traffic, up to applications running inside the car to provide updated information to the driver, or simply keep him socially connected. The time for such smart technologies is right: the power of computation along with the memory size of microprocessors have increased, while price per computation, storage and networking power decreased. What few years ago might have sounded rather futuristic, like technologies designed to facilitate communication between cars and automate the exchange of data about traffic, accidents or congestion, is now becoming reality. But the implications of these ideas have only recently become relevant; in particular, security and trust-related implications are just now arising as critical topics for such new applications. The reason is that drivers face new challenges, from their personal data being stolen or applications being fed with false information about traffic conditions, to technology being exposed to all kind of hijacking attacks. A practitioner developing a smart traffic application is faced with an important problem: what security technology or algorithm to use to better cope with these challenges. In this paper, we first present an analysis of various cryptographic algorithms in the context of vehicular scenarios. Our scope is to analyze the designs and approaches for securing networks formed between vehicles. In particular, we are interested in the security layers able to provide strong cryptographic algorithms implementation that can guarantee high levels of trust and security for vehicular applications. The analysis exploits the realistic simulator being developed at the University Politehnica of Bucharest.
引用
下载
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [1] Routing and Security Analysis in Vehicular Ad-Hoc Networks (VANETs)
    Deepak
    Kumar, Raj
    Rishi, Rahul
    PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, INTELLIGENT CONTROL AND ENERGY SYSTEMS (ICPEICES 2016), 2016,
  • [2] Security Models in Vehicular Ad-hoc Networks: A Survey
    Maria de Fuentes, Jose
    Gonzalez-Manzano, Lorena
    Isabel Gonzalez-Tablas, Ana
    Blasco, Jorge
    IETE TECHNICAL REVIEW, 2014, 31 (01) : 47 - 64
  • [3] Towards the Security Measures of the Vehicular Ad-Hoc Networks
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    INTERNET OF VEHICLES: TECHNOLOGIES AND SERVICES TOWARDS SMART CITY (IOV 2018), 2018, 11253 : 233 - 248
  • [4] Security solution methods in the Vehicular Ad-Hoc Networks
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    17TH INTERNATIONAL CONFERENCE ON ADVANCES IN MOBILE COMPUTING & MULTIMEDIA (MOMM2019), 2019, : 127 - 135
  • [5] A Review of Security Aspects in Vehicular Ad-Hoc Networks
    Talavera, Edgar
    Diaz Alvarez, Alberto
    Naranjo, Jose E.
    IEEE ACCESS, 2019, 7 : 41981 - 41988
  • [6] Security of Vehicular Ad-Hoc Networks (VANET): A survey
    Afzal, Zehra
    Kumar, Manoj
    THIRD NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2019), 2020, 1427
  • [7] Security of vehicular ad-hoc networks: A comprehensive survey
    Malhi, Avleen Kaur
    Batra, Shalini
    Pannu, Husanbir Singh
    COMPUTERS & SECURITY, 2020, 89
  • [8] Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
    Houmer, Meriem
    Hasnaoui, Moulay Lahcen
    Elfergougui, Abdeslam
    2018 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE AND WIRELESS NETWORKING (MOWNET), 2018, : 21 - 26
  • [9] Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks
    Li, Wei
    Ge, Chenyu
    Gu, Dawu
    Liao, Linfeng
    Gao, Zhiyong
    Shi, Xiujin
    Lu, Ting
    Liu, Ya
    Liu, Zhiqiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (07): : 3421 - 3437
  • [10] On trust models for communication security in vehicular ad-hoc networks
    Fan, Na
    Wu, Chase Q.
    AD HOC NETWORKS, 2019, 90