Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions

Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions

Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon
DOI: 10.4018/978-1-60960-549-0.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This article provides a panorama on the security in vehicular networks’ environments. The special characteristics of these environments are presented and a general classification for the different types of attacks illustrated by some relevant attacks examples is introduced. Consequently, some key security requirements and security challenges are derived, considering Intelligent Transportation System (ITS) or Safety services as well as non-ITS or non-Safety services. Finally, some existing contributions in this subject are presented, and their deployment feasibility is discussed.
Chapter Preview
Top

Introduction

Vehicular communication is an emerging class of mobile communication enabling mobile users in their vehicles to communicate to the road and to each other. Currently, Inter-Vehicle Communication Systems (IVCS) are widely discussed, attracting considerable attention from the research community as well as the automotive industry. In fact, vehicular networks are expected to be massively deployed in the near future, driven by navigation safety requirements and by the investments of car manufacturers and Public Transportation Authorities. New standards are emerging for vehicular communications. Dedicated Short Range Communications (DSRC) is a block of spectrum in the 5.850 to 5.925 GHz band allocated by the US Federal Communications Commission (FCC) to vehicular communications (5.9 GHz DSRC). Consensus around the world is emerging around a customized version of IEEE 802.11 in the 5GHz band also known as 802.11p or WAVE (Wireless Access for the Vehicular Environment). Vehicular networks have special behavior and characteristics, distinguishing them from other types of ad-hoc networks. The nodes’ (vehicles’) mobility in these networks is high and may reach up to 200Km/h, these networks may experience frequent disconnections and impaired propagation channel resulting in a highly bandwidth constrained environment, these networks performance and motion patterns are closely interdependent, these networks topologies are dynamic but constrained by roads’ topologies, these networks may scale to a very large number of nodes (vehicles) according to the traffic condition and finally these networks probably have a potentially heterogeneous administration. We can assume that vehicular communications, opposing the wireless mobile communications, are not resource constrained (energy, CPU, memory, etc.) as vehicles are not tiny nodes and are capable of providing large resources.

Although, vehicular networks are considered as one of the promising concrete applications of ad hoc networks, their special behavior and characteristics create some communication challenges (for network operators and service providers), which can greatly impact the future deployment of these networks. An important research and development aspect in vehicular communication concerns the development of security mechanisms that allow trust among the communicating parties (whether vehicles or infrastructure elements) and guarantee only authorized users’ access to network resources and services offered by the provider as well as secure data transfer. In fact, security requirements differ according to the type of applications/services, where different security levels are needed. We notice that vehicular communication security is a young research domain, showing few contributions and lacking concrete security solutions.

This article gives a panorama on vehicular communication security. We discuss the different types of attacks in this environment and present from a deployment perspective the security requirements that should be satisfied, taking into consideration safety applications and commercial applications expected in the future. The remainder of this article is organized as follows: Section 2 figures out services and potential architectures in vehicular networks. Section 3 presents a classification for potential attacks giving some attacks examples. Section 4 introduces our view of the main security requirements and security challenges for vehicular communications deployment. In Section 5, we give an overview on the related work discussing the main contributions and mentioning their limitations as well as some open issues. Finally, the article is concluded in Section 6.

Complete Chapter List

Search this Book:
Reset