This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Securing Vehicular Communications - Assumptions, Requirements, and Principles P. Papadimitratos EPFL Lausanne, Switzerland email@example.com V. Gligor University of Maryland College Park, USA firstname.lastname@example.org J-P. Hubaux EPFL Lausanne, Switzerland email@example.com Abstract Among civilian communication systems, vehicular networks emerge as one of the most convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. Thanks to the substantial research efforts carried out by the community so far, we make the following contributions in this paper: we outline security requirements for vehicular communication systems, we provide models for the system and the communication, as well as models for the adversaries, and propose a set of design principles for future security and privacy solutions for vehicular communication systems. I. INTRODUCTION Vehicular ad hoc networks (VANET) are a new technology that has recently drawn the attention of the industry and academia. Vehicular communications (VC) lie at the core of a number of research initiatives that aim to enhance safety and efficiency of transportation systems; with envisioned ap- plications providing, for example, warnings on environmental hazards (e.g., ice on the pavement), traffic and road conditions (e.g., emergency braking, congestion, or construction sites), and local (e.g., tourist) information. In fact, vehicular networks emerge, among civilian communication systems, as one of the most convincing and yet most challenging instantiations of the mobile ad hoc networking technology. To enable such applications, vehicles and road-side in- frastructure units (RSUs), namely network nodes, will be equipped with on-board processing and wireless communi- cation modules. Then, vehicle-to-vehicle (V2V) and vehicle- to-infrastructure (V2I) (bidirectional) communication will be possible directly when in range, or, in general, across multiple wireless links (hops), with nodes acting both as end points and routers. Relying on such hybrid networking appears to be the only means to realize safety and driving assistance applica- tions, as an omnipresent infrastructure can be impractical, too costly, and thus very slowly deployed. A comprehensive set of security mechanisms integrated into the VC systems is critical for their deployment. Otherwise, the efficiency of the transportation systems, as well as the physical safety of vehicles, drivers, and passengers could be jeopardized. Even worse, VC-based applications can be of life- critical nature. At the same time, VANETs are particulary challenging to secure due to the tight coupling between applications and the networking fabric, as well as additional societal, legal, and economical considerations, which raise a unique combination of operational and security requirements.unique combination of operational and security requirements....
View Full Document
This note was uploaded on 03/31/2009 for the course ECE 18731 taught by Professor Perrig during the Spring '08 term at Carnegie Mellon.
- Spring '08