Reliable broadband communication using a burst erasure correcting code
SIGCOMM '90 Proceedings of the ACM symposium on Communications architectures & protocols
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Containing denial-of-service attacks in broadcast authentication in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Overhaul of ieee 802.11 modeling and simulation in ns-2
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Adaptive message authentication for vehicular networks
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
On the efficiency of secure beaconing in VANETs
Proceedings of the third ACM conference on Wireless network security
Randomized differential DSSS: jamming-resistant wireless broadcast communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Experimental Security Analysis of a Modern Automobile
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Communication requirements for crash avoidance
Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Efficient and secure threshold-based event validation for VANETs
Proceedings of the fourth ACM conference on Wireless network security
Efficient certificate revocation system implementation: Huffman Merkle Hash Tree (HuffMHT)
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Towards a theory of trust in networks of humans and computers
SP'11 Proceedings of the 19th international conference on Security Protocols
A novel data broadcast strategy for traffic information query in the VANETs
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
An urban area-oriented traffic information query strategy in VANETs
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Review: Information management in vehicular ad hoc networks: A review
Journal of Network and Computer Applications
Mutual authentication in self-organized VANETs
Computer Standards & Interfaces
Hi-index | 0.01 |
Digital signatures are one of the fundamental security primitives in Vehicular Ad-Hoc Networks (VANETs) because they provide authenticity and non-repudiation in broadcast communication. However, the current broadcast authentication standard in VANETs is vulnerable to signature flooding: excessive signature verification requests that exhaust the computational resources of victims. In this paper, we propose two efficient broadcast authentication schemes, Fast Authentication (FastAuth) and Selective Authentication (SelAuth), as two countermeasures to signature flooding. FastAuth secures periodic single-hop beacon messages. By exploiting the sender's ability to predict its own future beacons, FastAuth enables 50 times faster verification than previous mechanisms using the Elliptic Curve Digital Signature Algorithm. SelAuth secures multi-hop applications in which a bogus signature may spread out quickly and impact a significant number of vehicles. SelAuth pro- vides fast isolation of malicious senders, even under a dynamic topology, while consuming only 15%--30% of the computational resources compared to other schemes. We provide both analytical and experimental evaluations based on real traffic traces and NS-2 simulations. With the near-term deployment plans of VANET on all vehicles, our approaches can make VANETs practical.