M. Fiore, C. Casetti, C. Chiasserini, Panos Papadimitratos
{"title":"Secure neighbor position discovery in vehicular networks","authors":"M. Fiore, C. Casetti, C. Chiasserini, Panos Papadimitratos","doi":"10.1109/Med-Hoc-Net.2011.5970496","DOIUrl":null,"url":null,"abstract":"In vehicular ad hoc networks, knowledge of neighbor positions is a requirement in a number of important tasks. However, distributed techniques to perform secure neighbor position discovery, suitable for highly mobile ad hoc environments, are missing. In this paper, we address this need by proposing a lightweight distributed protocol that relies only on information exchange among neighbors, without any need of a-priori trustworthy nodes. We present a detailed security analysis of our protocol in presence of one or multiple adversaries, and we evaluate its performance in a realistic vehicular environment.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970496","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
In vehicular ad hoc networks, knowledge of neighbor positions is a requirement in a number of important tasks. However, distributed techniques to perform secure neighbor position discovery, suitable for highly mobile ad hoc environments, are missing. In this paper, we address this need by proposing a lightweight distributed protocol that relies only on information exchange among neighbors, without any need of a-priori trustworthy nodes. We present a detailed security analysis of our protocol in presence of one or multiple adversaries, and we evaluate its performance in a realistic vehicular environment.