Abstract
A Vehicular ad hoc network called VANETs is a mobile network allowing to vehicles to communicate with each other in the absence of fixed infrastructure, with the aim of improving road safety through the exchange of alerts between neighborhood vehicles or to offer new comfort services to road users. The characteristics of these networks such as: shared wireless medium and the highly dynamic network topology pose a number of nontrivial challenges to security design.
In these networks each vehicle coordinates with every other vehicle in forwarding their packets to reach the destination. Since these vehicles operate in a physically insecure environment; they are vulnerable to different types of attacks such as the blackhole attack, Sybil attack, selective forwarding and altering routing information.
This paper proposes a security solution for VANETs using a pre-existing routing protocol Greedy Perimeter Stateless routing. In this solution, each node in a network has a list of its neighbor nodes including a shared secret key which is obtained by executing a key agreement Diffie Hellman, this key will be used by the AES symmetric encryption algorithm to generate a digital signature, after applying the MD5 hashing algorithm on the non-modifiable data of GPSR packets. Our idea consists that each vehicle verifies the integrity and authenticates the sender in the process of route discovery, Comparing with other recently proposed security routing protocols, our security solution needs less computation times in routing transactions because it use AES and does not need any centralized element in vehicular ad-hoc networks.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Khalfallah, S., Jerbi, M., Cherif, M.O., Senouci, S.-M., Ducourthial, B.: Expérimentations des communications inter-véhicules, Colloque Francophone sur l’Ingénierie des Protocoles (CFIP). Les Arcs, France (2008)
Jerbi, M.: Protocoles pour les communications dans les réseaux de véhicules en environnement urbain: Routage et GeoCast basés sur les intersections. Thèse, France (2008)
Idjiwa, A., Radhouane, B., Rebecca, B., Laurent, G.: Protocole de routage ad hoc sécurisé dans une architecture clusterisée, http://idjiwa.free.fr/wordpress/?cat=3
Hu, C., Perrig, A., Johnson, D.B.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols (2003)
Zapata, M.G.: Internet draft. In: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing (September 15, 2005)
Papadimitratos, P., Haas, Z.J., Samar, P.: The Secure Routing Protocol (SRP) for Ad Hoc Networks (December 2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On Demand Routing Protocol for Ad Hoc Networks
Karp, B., Kung, H.T.: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom 2000, Boston, MA (August 2000)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole Detection in Wireless Ad Hoc Networks. Technical Report TR 01- 384, Department of Computer Science, Rice University (June 2002)
Karlof, C., Wagner, D.: Securing Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, pp. 113–127 (May 2003)
Zhou, Z., Yow, K.C.: Geographic Ad Hoc Routing Security: Attacks and Countermeasures. Ad Hoc & Sensor Wireless Networks, 235–253 (March 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Erritali, M., El Ouahidi, B., Bourget, D. (2013). Secured Geographic Routing Protocol for Vehicular Ad Hoc Networks (VANETs). In: Gramoli, V., Guerraoui, R. (eds) Networked Systems. NETYS 2013. Lecture Notes in Computer Science, vol 7853. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40148-0_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-40148-0_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40147-3
Online ISBN: 978-3-642-40148-0
eBook Packages: Computer ScienceComputer Science (R0)