JiST: an efficient approach to simulation using virtual machines: Research Articles
Software—Practice & Experience
An integrated mobility and traffic model for vehicular wireless networks
Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Flexible hardware reduction for elliptic curve cryptography in GF(2m)
Proceedings of the conference on Design, automation and test in Europe
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Secure and efficient beaconing for vehicular networks
Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Communication patterns in VANETs
IEEE Communications Magazine
Flooding-resilient broadcast authentication for VANETs
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
EDA for secure and dependable cybercars: challenges and opportunities
Proceedings of the 49th Annual Design Automation Conference
Congestion-based certificate omission in VANETs
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Hi-index | 0.00 |
Direct inter-vehicle communication enables numerous safety applications like intersection collision warning. Beacons - periodic one-hop link-layer broadcast messages containing, e.g., location, heading, and speed - are the basis for many such applications. For security, current work often requires all messages to be signed and to carry a certificate to ensure integrity and authenticity. However, high beacon frequency of 1 - 10 Hz and dense traffic situations lead to significant communication and computational overhead. In this paper, we propose several mechanisms to significantly reduce this overhead while maintaining a comparable level of security. The general idea is to omit signatures, certificates, or certificate verification in situations where they are not necessarily required. This creates a security-performance trade-off that we analyze in detail. The results show that significant savings can be achieved with only small impact on security.