Skip to main content

Securing VANETs for Vehicular CPS

  • Chapter
  • First Online:
Vehicular Cyber Physical Systems

Abstract

This chapter presents trust-based security in vehicular CPS using probabilistic and deterministic approaches, which are based on the local information obtained through interactions among vehicles to determine legitimacy of the messages and to decide whether the messages would be considered for further transmission over the network or be dropped.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. P. Bahl, V. Padmanabhan, RADAR: an in-building RF-based user location and tracking system, in IEEE INFOCOM, vol. 2 (2000), pp. 775–784

    Google Scholar 

  2. A.R. Beresford, F. Stajano, Mix Zones: user privacy in location-aware services, in PERCOMW 2004, Washington, DC, USA (2004), p. 127

    Google Scholar 

  3. California Partners for Advanced Transit and Highways (PATH) (2010). http://www.path.berkeley.edu/

  4. Car to Car Communication Consortium (C2CCC) (2010). http://www.car-to-car.org/

  5. DISCO Lab (2010). http://discolab.rutgers.edu/traffic

  6. F. Dotzer, Privacy issues in vehicular ad hoc networks, in Privacy Enhancing Technologies (2005), pp. 197–209

    Google Scholar 

  7. H. Hartenstein, K. Laberteaux (eds.), VANET: Vehicular Applications and Inter-Networking Technologies (Wiley, New York, 2010)

    Google Scholar 

  8. T. He, C. Huang, B. Blum, J. Stankovic, T. Abdelzaher, Range-free localization schemes for large scale sensor networks, in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (2003), pp. 81–95

    Google Scholar 

  9. U. Minhas, Intelligent agents in mobile vehicular ad hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, in Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI IAT) (2010), pp. 243 – 247

    Google Scholar 

  10. U. Minhas, J. Zhang, T. Tran, R. Cohen, Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Pract. (IJCITP) 5, 3–15 (2010)

    Google Scholar 

  11. National Highway Traffic Safety Administration 2012 Report. http://www.nhtsa.gov/staticfiles/administration/pdf/Budgets/FY2012_Budget_Overviewv3.pdf

  12. Network on Wheels (NoW) (2010). http://www.network-onwheels.de/

  13. S. Olariu, M.C. Weigle (eds.), Vehicular Networks: From Theory to Practice (CRC Press/Taylor & Francis, Boca Raton, 2009)

    Google Scholar 

  14. B. Ostermaier, F. Dotzer, M. Strassberger, Enhancing the security of local danger warnings in VANETs-a simulative analysis of voting schemes, in The Second International Conference on Availability, Reliability and Security, 2007. ARES 2007 (2007), pp. 422–431

    Google Scholar 

  15. PREVENT project (2010). http://www.prevent-ip.org

  16. T. Rappaport, Wireless Communications: Principles and Practice (Prentice Hall PTR, New Jersey, 2002)

    Google Scholar 

  17. D.B. Rawat, G. Yan, in Infrastructures in Vehicular Communications: Status, Challenges and Perspectives, ed. by M. Watfa, (eds.) (IGI Global, 2010)

    Google Scholar 

  18. D.B. Rawat, B.B. Bista, G. Yan, M.C. Weigle, Securing vehicular ad-hoc networks against malicious drivers: a probabilistic approach, in Proceedings of the 5th International Conference on Complex, Intelligent, and Software Intensive Systems, June 2011

    Google Scholar 

  19. D.B. Rawat, D.C.Popescu, G. Yan, S. Olariu, Enhancing VANET performance by joint adaptation of transmission power and contention window size. IEEE Trans. Parallel Distrib. Syst. 22(9), 1528–1535 (2011)

    Google Scholar 

  20. D.B. Rawat, G. Yan, B.B. Bista, M.C. Weigle, Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc Sens. Wirel. Network. 24(3-4), 283–305 (2015)

    Google Scholar 

  21. M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks, in SASN ’05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (ACM, New York, 2005), pp. 11–21

    Google Scholar 

  22. M. Raya, P. Papadimitratos, I. Aad, D. Jungels, Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007)

    Google Scholar 

  23. M. Raya, P. Papadimitratos, V. D. Gligor, J.-P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in The 27th Conference on Computer Communications, INFOCOM 2008. IEEE (2008), pp. 1238–1246

    Google Scholar 

  24. D. Rick, Deriving the haversine formula, in The Math Forum, April 1999

    Google Scholar 

  25. P. Rong, M. Sichitiu, Angle of arrival localization for wireless sensor networks, in 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006. SECON’06, vol. 1 (2007), pp. 374–382

    Google Scholar 

  26. R. Sengupta, Q. Xu, DSRC for safety systems. Calif. PATH – Partners Adv. Transit Highw. 10(4), 2–5 (2004)

    Google Scholar 

  27. J. Serna, J. Luna, M. Medina, Geolocation-based trust for vanet’s privacy, in 4th International Conference on Information Assurance and Security, ISIAS’08 (2008), pp. 287–290

    Google Scholar 

  28. G. Shafer, A Mathematical Theory of Evidence, vol. 1 (Princeton University Press, Princeton, 1976)

    Google Scholar 

  29. A. Tajeddine, A. Kayssi, A. Chehab, A privacy-preserving trust model for VANETs, in Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT) (2010), pp. 832–837

    Google Scholar 

  30. Vehicle Safety Communications Project Task 3 Final Report: Identify Intelligent Vehicle Safety Applications Enabled by DSRC. Vehicle Safety Communications Consortium consisting of BMW, Daimler-Chrysler, Ford, GM, Nissian, Toyota, and VW

    Google Scholar 

  31. P. Wex, J. Breuer, A. Held, T. Leinmuller, L. Delgrossi, Trust issues for vehicular ad hoc networks, in Proceedings of the IEEE Vehicular Technology Conference (VTC Spring 2008) (2008),pp. 2800–2804

    Google Scholar 

  32. Q. Xu, T. Mak, J. Ko, R. Sengupta, Vehicle-to-vehicle safety messaging in dsrc, in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (2004), pp. 19–28

    Google Scholar 

  33. J. Zhang, A survey on trust management for VANETs, in Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA) (2011), pp. 105–112

    Google Scholar 

  34. S. Zhang, H. Wang, An improved delta and over-issued certificate revocation mechanism, in Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management (2008), pp. 346–350

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Danda B. Rawat .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rawat, D.B., Bajracharya, C. (2017). Securing VANETs for Vehicular CPS. In: Vehicular Cyber Physical Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-44494-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44494-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44493-2

  • Online ISBN: 978-3-319-44494-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics