Ala'a Al-Momani, R. V. D. Heijden, F. Kargl, C. Waldschmidt
{"title":"Exploiting propagation effects for authentication and misbehavior detection in VANETs","authors":"Ala'a Al-Momani, R. V. D. Heijden, F. Kargl, C. Waldschmidt","doi":"10.1109/VNC.2016.7835973","DOIUrl":null,"url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) are a critical and potentially vulnerable target for attacks on both message integrity and authenticity. Existing approaches are based on computationally expensive digital signature, which also creates large message sizes due to the attachment of signatures and certificates to messages. This leads to high communication and verification overheads, both in terms of bandwidth and computational effort. In this paper we discuss an alternative approach to ensure message integrity using characteristics of the received signal for authentication and misbehavior detection.","PeriodicalId":352428,"journal":{"name":"2016 IEEE Vehicular Networking Conference (VNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Vehicular Networking Conference (VNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VNC.2016.7835973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Vehicular Ad-hoc Networks (VANETs) are a critical and potentially vulnerable target for attacks on both message integrity and authenticity. Existing approaches are based on computationally expensive digital signature, which also creates large message sizes due to the attachment of signatures and certificates to messages. This leads to high communication and verification overheads, both in terms of bandwidth and computational effort. In this paper we discuss an alternative approach to ensure message integrity using characteristics of the received signal for authentication and misbehavior detection.