Impact of Vehicular Communications Security on Transportation Safety

Reading time: 6 minute
...

📝 Original Info

  • Title: Impact of Vehicular Communications Security on Transportation Safety
  • ArXiv ID: 0808.2666
  • Date: 2016-11-17
  • Authors: Researchers from original ArXiv paper

📝 Abstract

Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time, there is consensus among authorities, industry, and academia on the need to secure VC systems. With specific proposals in the literature, a critical question must be answered: can secure VC systems be practical and satisfy the requirements of safety applications, in spite of the significant communication and processing overhead and other restrictions security and privacy-enhancing mechanisms impose? To answer this question, we investigate in this paper the following three dimensions for secure and privacy-enhancing VC schemes: the reliability of communication, the processing overhead at each node, and the impact on a safety application. The results indicate that with the appropriate system design, including sufficiently high processing power, applications enabled by secure VC can be in practice as effective as those enabled by unsecured VC.

💡 Deep Analysis

Deep Dive into Impact of Vehicular Communications Security on Transportation Safety.

Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time, there is consensus among authorities, industry, and academia on the need to secure VC systems. With specific proposals in the literature, a critical question must be answered: can secure VC systems be practical and satisfy the requirements of safety applications, in spite of the significant communication and processing overhead and other restrictions security and privacy-enhancing mechanisms impose? To answer this question, we investigate in this paper the following three dimensions for secure and privacy-enhancing VC schemes: the reliability of communication, the processing overhead at each node, and the impact on a safety application. The results indicate that with the appropriate system design, including sufficiently high processing power, applications enabled by secure VC can be in practice as effective

📄 Full Content

arXiv:0808.2666v1 [cs.CR] 19 Aug 2008 Impact of Vehicular Communications Security on Transportation Safety Panos Papadimitratos∗, Giorgio Calandriello†, Jean-Pierre Hubaux∗and Antonio Lioy† ∗Laboratory for Computer Communications and Applications EPFL, Switzerland Email: {panos.papadimitratos, jean-pierre.hubaux}@epfl.ch †Dipartimento di Automatica e Informatica Politecnico di Torino, Italy Email: {giorgio.calandriello, lioy}@polito.it Abstract— Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time, there is consensus among authorities, industry, and academia on the need to secure VC systems. With specific proposals in the literature, a critical question must be answered: can secure VC systems be practical and satisfy the requirements of safety applications, in spite of the significant communication and processing overhead and other restrictions security and privacy-enhancing mechanisms impose? To answer this question, we investigate in this paper the following three dimensions for secure and privacy-enhancing VC schemes: the reliability of communication, the processing overhead at each node, and the impact on a safety application. The results indicate that with the appropriate system design, including sufficiently high processing power, applications enabled by secure VC can be in practice as effective as those enabled by unsecured VC. I. INTRODUCTION Vehicular communication (VC) systems are developed as a means to enhance transportation safety and efficiency. Ve- hicles and road-side infrastructure units (RSUs) are equipped with on-board sensors, computers, and wireless transceivers. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication enable primarily safety applications. Many research and development projects, including the Car-to-Car Communication Consortium in Europe and the US Department of Transportation VII initiative, converge towards a design with vehicles frequently beaconing their position along with warnings on their condition or the environment. Typical bea- coning periods considered are in the order of one beacon per 100 milliseconds per vehicle. At the same time, it has been understood that VC systems are vulnerable to attacks and that the privacy of their users is at stake. For example, an attacker could inject messages with false information, or collect vehicle messages to track their locations and infer sensitive user data. As a result, the research community in industry and academia, with the endorsement of authorities, has undertaken three major efforts to design security and privacy enhancing solutions for VC: the NoW project [8], the IEEE 1609.2 working group [9], and the SeVeCom project [11]. A few basic ideas transcend all these efforts to develop VC security architectures. They all build on top of a currently well-understood vehicular communication protocol stack that includes safety beaconing. Moreover, they all utilize a Certifi- cation Authority (CA) and public key cryptography to protect V2V and V2I messages. Their primary requirements are message authentication, integrity, and non-repudiation, as well as protection of private user information. To address those apparently contradictory goals, they all rely on the concept of pseudonymity or pseudonymous authentication [8], [9], [11]: they require that (i) each vehicle (node) is equipped with multiple certified public keys (pseudonyms) that do not reveal the node identity, and (ii) the vehicle uses them alternately, each for a short period of time, so that messages signed under different pseudonyms cannot be linked. It is becoming clear that the security overhead of such systems will be significant; for example, each safety beacon has to be signed, and each vehicle has to validate every 100 milliseconds beacons from several dozens of vehicles within range. Which, not to forget, may essentially change their identity (pseudonym) at any point in time, thus making it harder for their neighboring vehicles to validate their signed beacons. The immediate question, for designers and users of vehic- ular communication systems alike, arises: What is the effect of security and notably these broadly accepted pseudonym- based mechanisms on safety applications? In plain terms, can, for example, vehicle collisions still be avoided when an emergency braking situation arises? There has been a timid approach to answer this question in our earlier work [5], whose main contribution was the sim- plification of key (pseudonym) management while satisfying privacy and security requirements. But, in terms of evaluating the impact of security on the VC system effectiveness, we analyzed only a simple transportation scenario: the distance at which a fast-approaching vehicle receives an emergency braking signal from a vehicle ahead. In this paper, we extend the work in [5] to investigate the impact of security on trans

…(Full text truncated)…

📸 Image Gallery

cover.png page_2.webp page_3.webp

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut