Vehicle Communication and Infrastructure Security

The concept of Vehicle to Vehicle communication is vast and the development process is quick but the major problems that occur are the issues with Scalability and the Data Security, therefore in this research these issues will be discussed.

The current concepts and data models have a less range and accuracy in V2V. So to solve these issues and increase the Scalability and range different authors have explained different solutions which is discussed further in the article. And one major issue which is faced in all the concepts is Data Security. Several authors have different methods and authentication processes to answer the issues which are explained in the later part of the article.

Introduction

The main issue everybody faces when driving a car is safety. Therefore to improve the safety standards many car manufacturers, government organizations and telecom partners are working towards developing an invisible concept which can completely blend in and provide critical data to the driver. Vehicle to Vehicle Communication is a concept where each car can transmit, receive and process the data about potential dangers and give important information to the driver through the Infotainment medium available in the car.

There are several sensors installed such as Fire, Smoke, Object and Accident sensors which are placed around the vehicle to give information about the designated application to it. And Radars placed in the front and back scans for vehicles around and all the information is processed in the Processing platform and the results are presented through Man- Machine interface. However it is important to implement this concept because it will avoid potential accidents, help in traffic management and will assist in smart parking too.

Several countries have already deployed the working models and are gaining crucial testing results from those models. In USA they have developed Intelligent Transport Society (ITS), in Japan there is Automated Highway System (AHS) and in Germany there is Vissim. So if all these major countries are already ahead in the race we can know the weightage of importance for this concept to be implemented.

Vehicle Communication and Infrastructure Security

Research Methodology

Qualitative research was conducted by the author because only research papers and articles were used and no numerical data was used.

Summary

The engineers had to provide and implement a secure system in Vehicle to Vehicle communication to let people take full advantage of the new application and features in their vehicle. The author describes about providing secure systems in the vehicle will deter unauthorized parties from accessing V2V system and causing hazards in the road. The author mentions that there were two techniques to provide secure communication between the vehicles via wireless network and to develop and enhance the security between the telematics and the ECU’s.

Strength

The author explains that there was a hardware introduced which uses Cryptography and Digital Signature. This method allows two components, a remote database and a network system to generate a key and encrypt the data with the use of encryption algorithm. And the author goes on explaining about the Identity based Batch Verification technique which uses a key for identification to avoid the use of certificates and the signatures collected would be verified based on DSRC. The author explains the Multiplexing methods that can be used to connect ECU with the CAN bus that allows two way communication between each other. Later explaining about the two primary methods used in Multiplexing are time division and frequency division which does not accommodate new systems such as Collision Avoidance, GPS and many related systems.

Weakness

The author however mentions about the security issues but does not discuss in detail about them. The article has just a brief about the two levels of security, the first level is Dispatcher to Vehicle and the second level is Intra Vehicle communication. And the author mentions about the second level of security is between Module to Module and it is difficult for hackers to break in. And the author also mentions the use of key infrastructure to address the operations of V2V. However the key answers and detailed versions of this concepts were missing in the article. The author also mentions that customer’s privacy is the most neglected area but he too does not seem to be interested in that area. And in the conclusion the authors just mentions that some security methods needs to be improved and enhanced but he does not mention about what in particular.

Toward Secure Vehicular Ad hoc Networks

Research Methodology

The author has used qualitative research method here as there was no statistics or numerical experiments that were conducted.

Summary

Vehicular Ad-hoc Networks are wireless communication networks that provide information about safety, traffic density, alternate routes that are available, estimated time to destination. Not only research on technology related to VANETs is being conducted by universities, but it is also being widely encouraged by industry and governments. . This paper describes characteristics that distinguish VANETs from other wireless ad hoc networks, VANETs security and privacy requirements, types of attacks and attackers and techniques that have been proposed in literature to address security problems in VANETs.

Strength

The author describes about the VANET characteristics such as Nature of communication, Dynamic nature and Mobility, Frequency information exchange, Real time processing, Wireless nature, Position detection and Identity exposure. And the author explains about the security objectives in a framework, such as Authenticity/Integrity, Privacy/Confidentiality, Information availability, Short term link ability, Traceability and revocation and efficiency. And the author mentions about the type of attacks and attackers, such as Bogus information attack, Unauthorized preemption attack, Movement tracking, Brute force attack, Illusion attack, Packet dropping, Sybil attack and the combination of above attacks.

Weakness

The author mentions that he recognizes three types of privacy attackers, namely Global passive, Restricted passive, Local active but the author evades to explain these attackers and the solutions to it. However the author continues that the objective is to improve research to achieve security, scalability, authentication techniques and privacy was to mitigate different attacks such as Sybil attacks, reproduction, injecting false messages, capturing RSUs, forging messages, and other different attacks. For achieving such objectives, researchers started using PKI-based systems with certificate validation. However, such proposed techniques seem to be non practical since vehicles need to maintain public key certificates, which incur huge overhead for communication and computation on one side as well as storage requirement to maintain CRLs.

Security Concepts and Issues in Intra-Inter Vehicle Communication Network.

Research Methodology

The author uses the qualitative research method in this article and all his work in this article is mainly based on literature and referred articles.

Summary

The most scenario for hacking to occur is to take full advantage of the wireless features in the vehicle and performing the functions. The first solution to Inter-Vehicle communication uses cryptography and data security. Inter-Controller Area Network (ICAN) is a network protocol designed primarily for the vehicle networking environment. A CAN controller acts as medium to the node from overloading with the message transfers.

In CAN, disputes between messages are determined on a bit-by-bit basis in a non-destructive settlement, which result in the highest priority message gaining access to the bus. The message contains an identifier which indicates the type of information present. This feature allows for convenient addition or deletion of the intelligent nodes in an automotive system. Also, each node decides whether to read or ignore a CAN message.

Strength

The author explains about Threat Modeling which is a design method used during product development, is a method that can be used to ensure all security threats have been eliminated. The author also mentions about Security issues and threats in V2V. Such as, Boot loader which is an update process which can downgrade as well as upgrade any components. And also mentions the importance about Operating Systems (OS) and its issues such as developers adding their own encryption in their own code which leads to weaknesses in encryption and security problems.

Weakness

The author mentions about solving the privacy issues regarding customer privacy in the vehicle, but earlier in the article he never explains about the solutions. The author further adds that a study will be conducted on security requirements to V2V and V2I. The author mentions that focus will be on how to develop cryptographic methods to procure security.

Light weight security protocol for communications in vehicular networks.

Research Methodology

The authors have done a mixed research using concurrent triangulation method since there is qualitative and quantitative data involved.

Summary

The author explains about vehicular network and the security issues that show up and how important it is to develop a light weight scheme for V2V communication. Further the author mentions about the security and privacy concerns in V2V. As the vehicular network is open wireless, it is prone to a number of security threats and attacks. Normal systems can stop attackers from accessing the system whereas in V2V network, locating the attacker is difficult as the attacker moves along with the normal vehicle. Security attack in V2V can create more worse situations.

Strength

The authors discusses the related work and the proposed scheme. The cryptographic methods used are managed with in. And gives an overlook of the results and the comparisons with the earlier results. Further explains the Cryptanalysis of the proposed scheme. They clearly explain the steps involved in a Dynamic Key Distribution for VANET such as if a vehicle key is required AND certificate, allocate an ID to the vehicle, generate polynomial, for each RSU send respective polynomial and vehicle ID’s to the vehicle, end for and end if.

Weakness

The authors mentions that there are many issues related to On board Device (OBD). But the authors are not clear in explaining what are the issues about OBD. The authors mention about attack techniques that are classified based on the type of attacker, namely external attackers, interrupting cruel nodes and materialistic rational radios but fails to explain briefly and moves on to other things. They mention that the proposed scheme ensures secrecy and verification, but suffers from the problem of conceded nodes. If a node gets conceded, then the undisclosed key information of the child nodes is also compromised.

Applications and Evaluation of Ambiguous Multi-Symmetric Cryptography in Vehicular Ad-hoc Networks.

Research Methodology

The authors use qualitative research method to explain their article. With the use of figures and literature.

Summary

In this research the author applies the Ambiguous Multi-Symmetric Cryptographic (AMSC) primitive in four different models to vehicular ad-hoc networks. The goal of these models is to ensure the confidentiality of messages using a secure encryption scheme. Currently, the only agreed upon standards for VANET in the United States are defined by the IEEE WAVE 1609 protocol stack which implements reserved channels in the 5. 9 GHz band defined by IEEE 802. 11p WLAN; however, there is still need for a comprehensive protocol that addresses private, secure, and efficient message transfer between vehicles or infrastructure.

Strength

The author explains about the two studies of cryptography that VANETs are primarily concerned with; symmetric key cryptography which uses a secret key between the two interactive nodes, and asymmetric cryptography which consists of public and private key pairs for each node. And briefly explains how the AMSC algorithm works. And describes in detail the four models of their protocol.

Weakness

The Model 1 - Clustering Vehicles with a Cluster Head for Aggregation has a limitation that the clustering protocol must be agreed upon. And in Model 2 -Clustering Vehicles with a Shared Key and No Cluster Head, this model does not aggregate messages from a cluster since there is no cluster head, therefore this model does not delete duplicate messages, thus increasing bandwidth consumption. Lately, in Model 3 – Clustering Vehicles with No Shared Key and No Cluster Head this model depends mainly on RSUs, since they are not deployed densely, vehicles in this model cannot be tracked and long distance ad-hoc communication between vehicles may be too time consuming or difficult since the vehicle range may not be as large as an RSU range.

Improving the scalability performance of DSRC

Research Methodology

The author has used mixed research technique to explain his article. Because he has used both qualitative data and quantitative data.

Summary

The author gives a brief introduction to Vehicular safety communication and then moves on to explain about enabling cooperative active safety systems based on V2V safety communication and gives an idea about DSRC bandwidth, protocol stack, IEEE 802. 11p. And the author explains the results conducted on Reliability on DSRC based communication in V2V, and produces results on Influence of data rate, Influence of propagation model and adaptive communication protocol.

Strength

The author performs simulations to study the relationship between the number of INs and the transmission range and MGR. The goal is to see if there is any optimal configuration for the two control parameters that minimize the number of INs in most traffic scenarios. Two different traffic scenarios are set up. The first uses a highway topology where 489 vehicles are placed uniformly on a 6km course of road. The second is an urban scenario which features a road network of size 1375m by 800m extracted from a map segment of Chicago. Simulation figures are neatly shown in the form of figures.

Weakness

The author introduces a new metric called Invisible Neighbor(IN), but fails to give a detail explanation of it. And the author mentions about algorithms based on transmission power and message rate to regulate channel load but the communication performance is sacrificed.

Improving Vehicular Authentication in VANET using Cryptography

Summary

The authors discusses about the related work of VANET and explains the new authentication algorithm and briefs about its model and framework and present keys management protocol. And conducts simulations and determines the performance and exhibits the result.

Strength

The authors explains about the importance of Public Key Infrastructure, Digital Signatures which ensures the authentication of the user, message integrity and non- repudiation. The authors has clearly explained about the Multi Stage Authentication algorithm which has four parts, such as Keys management, Authentication model, Authentication framework and Authentication process. The authors have contributed for the certification creation and revocation, which will improve security. Putting more than one technique together instead of using one technique provides higher security. To develop and implement the challenge-response authentication stage, assuming all other stages are already implemented.

Weakness

The authors had issues with, the certification revocation happening whenever the vehicle is switched off, CRL memory size will be huge, which may cause a problems and consume more time. The proposed four stages authentication will consume a huge memory size and power.

Reducing side-sweep accidents with vehicle-to-vehicle communication.

Research Methodology

The authors have used Quantitative research because there were plenty of simulations and iterations used to derive the mean average.

Summary

The author has used more than 300 iterations in each experiment and have conducted several calculations to procure accurate results. The author uses several scenarios such as Reckless driver, Average driver, Driver using turn signals and the author researches about all these scenarios.

Strength

The author created a simulation model for lane changing vehicles, with a special focus on side-sweep accidents. This simulation model can take into account many detailed aspects of the lane change process, such as the vehicle and road geometry, driver behavior as well as communication technologies. Study about traffic density. And about lane changing vehicle study.

Weakness

The author limits his article and does not do any experiments or study on blind spots and communication study. And does not give much importance to the driver behavior as well.

Discussion

The scalability in V2V can be improved with a combination of some existing models and some proposed new models. The density in this concept keeps growing as we advance to the implementation of V2V. Hence we can use some concepts like STE based classification to reduce the message transmission time, and DSRC concept to improve range and safety standards, ETPC algorithm to determine or estimate channel load. And a new algorithm was introduced to levitate EDCA capability of IEEE 802. 11p to improve DSRC performance.

The security in V2V can be improved by using Elliptic Curve Cryptography and Digital Signature, Threat modelling, Boot loader and DSRC models. Advancement in security is still a concern because more and more privacy issues arise. Hence the development of new concepts regarding security issues is needed.

Conclusion

The fully working concept of Vehicle to Vehicle communication will be implemented in the mere future as it has been taken up seriously by government organizations and the automobile heads. It will benefit everyone by increasing safety standards and gaining critical information about surroundings. The developed systems are easy to install and feasible to upgrade the present infrastructure. But there are some critical issues to be addressed and solved yet when it comes to privacy, data security and scalability of the system. Many researchers are involved and the development of new techniques are underway.

18 March 2020
close
Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon
Thanks!

Your essay sample has been sent.

Order now
exit-popup-close
exit-popup-image
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now