Cover
Vol. 11 No. 1 (2015)

Published: July 31, 2015

Pages: 18-31

Original Article

Security Issues of Solar Energy Harvesting Road Side Unit (RSU)

Abstract

Vehicular network security had spanned and covered a wide range of security related issues. However solar energy harvesting Road Side Unit (RSU) security was not defined clearly, it is this aspect that is considered in this paper. In this work, we will suggest an RSU security model to protect it against different internal and external threats. The main goal is to protect RSU specific data (needed for its operation) as well as its functionality and accessibility. The suggested RSU security model must responds to many objectives, it should ensure that the administrative information exchanged is correct and undiscoverable (information authenticity and privacy), the source (e.g., VANET server) is who he claims to be (message integrity and source authentication) and the system is robust and available (using Intrusion Detection System (IDS)). In this paper, we suggest many techniques to strength RSU security and they were prototyped using an experimental model based on Ubicom IP2022 network processor development kit .

References

  1. T. Wu, W. Liao and C. Chang, , "A Cost-Effective Strategy for Road-Side Unit Placement in Vehicular Networks", IEEE Transactions On Communications, Vol. 60, No. 8, August 2012.
  2. J. Barrachina, P. Garrido, M. Fogue, F. J. Martinez, J. Cano, P. Manzoni, "Road Side Unit Deployment: A DensityBased Approach, IEEE Intelligent transportation systems magazine, 2013.
  3. Q. I. Ali, " Design, Implementation & Optimization of an Energy Harvesting System for VANETS' Road Side Units(RSU)", IET Intelligent Transportation Systems, Vol.8,
  4. Q. I. Ali, " Event Driven Duty Cycling(EDDC): An Efficient Power Management Scheme for a Solar-Energy Harvested Road Side Unit (RSU)", Energy 2015 Conference,
  5. Q. I. Ali, A. Fawzi " Design & Implementation of a High Resolution Navigation System for Intelligent Transportation System”, Alrafidien Engineering Journal, 2014.
  6. G. Calandriello, P. Papadimitratis, J. P. Hubaux, A. Lioy, On the Performance of Secure Vehicular Communication Systems, IEEE transactions on dependable and secure computing, 2010.
  7. G. Samara, S. Ramadas, and W.A.H. Al-Salihy, Design of Simple and Efficient Revocation List Distribution in Urban Areas for VANET's. International Journal of Computer Science, 2010.
  8. J.J. Haas, Y.C. Hu, and K.P. Laberteaux. Design and analysis of a lightweight certificate revocation mechanism for VANET. in VANET '09: Proceedings of the sixth ACM
  9. D. K. Nilsson, U. E. Larson, E. Jonsson, Low-Cost Key Management for Hierarchical Wireless Vehicle Networks,
  10. Y. Hao, Y. Cheng and K. Ren, Distributed key management with protection against RSU compromise in
  11. A. Studer, E. Shi, F. Bai, A. Perrig, Tracking together efficient authentication, revocation and privacy in VANETs, 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON 09), 2009.
  12. S. Sivagurunathan, P. Subathra, V. Mohan and N. Ramaraj, Authentic vehicular Environment Using a Cluster Based Key Management, European Journal of Scientific Research, vol. 36, no. 2, September, 2009.
  13. Q.I. Ali, "Design & Implementation of an embedded
  14. M. Erritali, B. El Ouahidi, A Survey on VANET Processing and Informatics, 2013.
  15. S. Sharma , M. Sisodia. ”Network Intrusion Detection By using Supervised and Unsupervised Machine Learning Techniques: A Survey". International Journal of Computer Technology and Electronics Engineering. 2011.
  16. N. meyer, J. Njeukam, J. Petit, and K. M. Bayarou, “Central misbehavior evaluation for VANETs based on mobility data plausibility,” in Proceedings of the ninth ACM workshop on Vehicular systems, and applications - VANET ’12, New York, USA: ACM Press 2012.
  17. J. Grover, V. Laxmi, and M. Gaur, “Misbehavior detection based on ensemble learning in vanet,” in Advanced Computing, Networking and Security, ser. Lecture Notes in Computer Science, Eds. Springer Berlin / Heidelberg, vol. 7135, 2012.
  18. S.Chang, Y.Qi, H.Zhu, J.Zhao, and X.Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks”, IEEE Trans. Parallel and Distributed Systems, vol.23, June. 2012.
  19. M.S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, “Sybil Nodes Detection Based on Received Signal Strength Variations within Vanet,”, Int’l J. Network Security, vol. 9, no. 1, 2009.
  20. H. Kaur , S. Batish and A.Kakaria, An approach to detect the wormhole attack in vehicular ad hoc network in: journal of smart sensors and ad hoc networks,4,2012.
  21. A. Sinha, S.K. Mishra, Preventing VANET From DOS & DDOS Attack, International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10- Oct 2013.
  22. Q. Wu, J. Domingo-Ferrer, and U. Gon_zalez-Nicola´ s, “Balanced Trustworthiness, Safety and Privacy in Vehicle-tovehicle Communications,” Trans. Vehicular Technology, vol. 59, no. 2, 2010.
  23. D. Eckhoff, C. Sommer, T. Gansen, R. German, and F. Dressler, “SlotSwap: Strong and Affordable Location Privacy Magazine, vol. 49, no. 11, 2011.
  24. S.K. Dhurandher, M.S. Obaidat, A. Tyagi, “Securing Vehicular Networks: A Reputation and Plausibility Checksbased Approach”, IEEE Globecom 2010 Workshop on Web and Pervasive Security, 2010.
  25. X. Xiaoping, N. DING, J. Yiwen, “A trusted neighbor table based location verification for VANET Routing”, IET 3rd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2010), 2010.