Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
DoS-resilient cooperative beacon verification for vehicular communication systems
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems Engineering.ORCID iD: 0000-0003-2022-3976
KTH, School of Electrical Engineering and Computer Science (EECS), Network and Systems Engineering.ORCID iD: 0000-0002-3267-5374
2019 (English)In: Ad hoc networks, ISSN 1570-8705, E-ISSN 1570-8713, Vol. 90, article id UNSP 101775Article in journal (Refereed) Published
Abstract [en]

Authenticated safety beacons in Vehicular Communication (VC) systems ensure awareness among neighboring vehicles. However, the verification of beacon signatures introduces significant processing overhead for resource-constrained vehicular On-Board Units (OBUs). Even worse in dense neighborhood or when a clogging Denial of Service (DoS) attack is mounted. The OBU would fail to verify for all received (authentic or fictitious) beacons. This could significantly delay the verifications of authentic beacons or even affect the awareness of neighboring vehicle status. In this paper, we propose an efficient cooperative beacon verification scheme leveraging efficient symmetric key based authentication on top of pseudonymous authentication (based on traditional public key cryptography), providing efficient discovery of authentic beacons among a pool of received authentic and fictitious beacons, and can significantly decrease waiting times of beacons in queue before their validations. We show with simulation results that our scheme can guarantee low waiting times for received beacons even in high neighbor density situations and under DoS attacks, under which a traditional scheme would not be workable. rights reserved.

Place, publisher, year, edition, pages
ELSEVIER SCIENCE BV , 2019. Vol. 90, article id UNSP 101775
Keywords [en]
Security, Privacy, Pseudonymous authentication, Efficiency
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-255177DOI: 10.1016/j.adhoc.2018.10.003ISI: 000471740100005Scopus ID: 2-s2.0-85055875023OAI: oai:DiVA.org:kth-255177DiVA, id: diva2:1348443
Note

QC 20190904

Available from: 2019-09-04 Created: 2019-09-04 Last updated: 2019-09-04Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Jin, HongyuPapadimitratos, Panagiotis

Search in DiVA

By author/editor
Jin, HongyuPapadimitratos, Panagiotis
By organisation
Network and Systems Engineering
In the same journal
Ad hoc networks
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 69 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf