Skip to main content
Erschienen in: Wireless Networks 4/2015

01.05.2015

VIKE: vehicular IKE for context-awareness

verfasst von: Jiake Xu, Yanheng Liu, Jian Wang, Weiwen Deng, Thierry Ernst

Erschienen in: Wireless Networks | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad-hoc networks differ from the wired networks and behave in a highly dynamic context, e.g. frequently changing signal-to-noise ratio (SNR) and security risks, which undoubtedly affects the experienced quality-of-service (QoS) and security. In this paper, we propose to dynamically balance the anticipated QoS and security for adapting to the varying vehicular context and the served applications with aims to attain a satisfactory performance rating but without compromising any security. To this end, a variant of IKEv2 called Vehicular Internet Key Exchange (VIKE) is put forward to autonomously negotiate the optimal encryption and integrity algorithms and the related profile that particularly suit to the current context with respect to the confronted SNR, security risk and application requirements. We theoretically derive the relations between the QoS and security for analytical solutions in terms of four categories of vehicular applications. The extensive numerical calculations are conducted to comprehensively investigate how the proposed VIKE responses to the various combinations of the SNR, modulation scheme and key length. The results show that the VIKE is capable of self-adapting to the vehicular context, and of contributing to the quality of communication performance without compromising any security. The proposed VIKE is expected to port the mass-deployed IKE into securing the emerging numerous vehicular applications and services.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Simic, M. N. (2013). Vehicular Ad Hoc Networks. In 2013 11th international conference on telecommunication in modern satellite, cable and broadcasting services (TELSIKS) IEEE, vol. 2, pp. 613–618. Simic, M. N. (2013). Vehicular Ad Hoc Networks. In 2013 11th international conference on telecommunication in modern satellite, cable and broadcasting services (TELSIKS) IEEE, vol. 2, pp. 613–618.
2.
Zurück zum Zitat Karagiannis, G., Altintas, O., Ekici, E., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.CrossRef Karagiannis, G., Altintas, O., Ekici, E., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.CrossRef
3.
Zurück zum Zitat European Telecommunications Standards Institute. (2010). ETSI EN 302 665: Intelligent Transport System (ITS); Communication Architecture, v1.1.1. European Telecommunications Standards Institute. (2010). ETSI EN 302 665: Intelligent Transport System (ITS); Communication Architecture, v1.1.1.
4.
Zurück zum Zitat International Organization for Standardization. (2010). ISO 21217: 2010: Intelligent Transport Systems—Communications Access for Land Mobiles (CALM)—Architecture. International Organization for Standardization. (2010). ISO 21217: 2010: Intelligent Transport Systems—Communications Access for Land Mobiles (CALM)—Architecture.
5.
Zurück zum Zitat European Telecommunications Standards Institute. (2011). ETSI TS 102 687: Intelligent transport systems (ITS); decentralized congestion control mechanisms for intelligent transport systems operating in the 5 GHz range; Access layer part, v1.1.1. European Telecommunications Standards Institute. (2011). ETSI TS 102 687: Intelligent transport systems (ITS); decentralized congestion control mechanisms for intelligent transport systems operating in the 5 GHz range; Access layer part, v1.1.1.
6.
Zurück zum Zitat Alsa’deh, A., Meinel, C., & Westphal, F., et al. (2013). CGA integration into IPsec/IKEv2 authentication. In: Proceedings of the 6th international conference on security of information and networks. ACM, pp. 326–330. Alsa’deh, A., Meinel, C., & Westphal, F., et al. (2013). CGA integration into IPsec/IKEv2 authentication. In: Proceedings of the 6th international conference on security of information and networks. ACM, pp. 326–330.
7.
Zurück zum Zitat Wang, Y., & Li, F. (2009). Vehicular ad hoc networks, guide to wireless ad hoc networks. In S. Misra, I. Woungang, & S. C. Misra (Eds.), Computer communications and networks (pp. 503–525). London: Springer. Wang, Y., & Li, F. (2009). Vehicular ad hoc networks, guide to wireless ad hoc networks. In S. Misra, I. Woungang, & S. C. Misra (Eds.), Computer communications and networks (pp. 503–525). London: Springer.
8.
Zurück zum Zitat Cremers, C. (2011). Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2 (pp. 315–334). Berlin Heidelberg: Springer. Cremers, C. (2011). Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2 (pp. 315–334). Berlin Heidelberg: Springer.
9.
Zurück zum Zitat Kaufman, C., Hoffman, P., Nir, Y., & Eronen, P. (2014). Internet key exchange protocol version 2 (IKEv2), IETF RFC7296. Kaufman, C., Hoffman, P., Nir, Y., & Eronen, P. (2014). Internet key exchange protocol version 2 (IKEv2), IETF RFC7296.
10.
Zurück zum Zitat Aamir, M., Zaidi, M., & Mansoor, H. (2012). Performance analysis of diffserv based quality of service in a multimedia wired network and VPN effect using OPNET. International Journal of Computer Science Issues, 9(3), 368–376. Aamir, M., Zaidi, M., & Mansoor, H. (2012). Performance analysis of diffserv based quality of service in a multimedia wired network and VPN effect using OPNET. International Journal of Computer Science Issues, 9(3), 368–376.
11.
Zurück zum Zitat Emmanouilidis, C., Koutsiamanis, R. A., & Tasidou, A. (2013). Mobile guides: Taxonomy of architectures, context awareness, technologies and applications. Journal of Network and Computer Applications, 36(1), 103–125.CrossRef Emmanouilidis, C., Koutsiamanis, R. A., & Tasidou, A. (2013). Mobile guides: Taxonomy of architectures, context awareness, technologies and applications. Journal of Network and Computer Applications, 36(1), 103–125.CrossRef
12.
Zurück zum Zitat Shankar, P., Nadeem, T., & Rosca, J., et al. (2008). Cars: Context-aware rate selection for vehicular networks. In Proceedings of IEEE International Conference on Network Protocols, pp. 1–12. Shankar, P., Nadeem, T., & Rosca, J., et al. (2008). Cars: Context-aware rate selection for vehicular networks. In Proceedings of IEEE International Conference on Network Protocols, pp. 1–12.
13.
Zurück zum Zitat Liu, J., Sun, J., & Lv, S. (2010). A novel throughput optimization approach in wireless systems. In Proceedings of IEEE international conference on communication technology, pp. 1373–1377. Liu, J., Sun, J., & Lv, S. (2010). A novel throughput optimization approach in wireless systems. In Proceedings of IEEE international conference on communication technology, pp. 1373–1377.
14.
Zurück zum Zitat Haleem, M. A., Mathur, C. N., Chandramouli, R., et al. (2006). On optimizing the security-throughput trade-off in wireless networks with adversaries (pp. 448–458). Applied Cryptography and Network Seurity. Springer: Berlin Heidelberg. Haleem, M. A., Mathur, C. N., Chandramouli, R., et al. (2006). On optimizing the security-throughput trade-off in wireless networks with adversaries (pp. 448–458). Applied Cryptography and Network Seurity. Springer: Berlin Heidelberg.
15.
Zurück zum Zitat Haleem, M. A., Mathur, C. N., Chandramouli, R., et al. (2007). Opportunistic encryption: A trade-off between security and throughput in wireless networks. IEEE Transactions on Dependable and Secure Computing, 4(4), 313–324.CrossRef Haleem, M. A., Mathur, C. N., Chandramouli, R., et al. (2007). Opportunistic encryption: A trade-off between security and throughput in wireless networks. IEEE Transactions on Dependable and Secure Computing, 4(4), 313–324.CrossRef
16.
Zurück zum Zitat Chen, J., Zeng, H., Hu, C., et al. (2011). Optimization between security and delay of quality-of-service. Journal of Network and Computer Applications, 34(2), 603–608.CrossRef Chen, J., Zeng, H., Hu, C., et al. (2011). Optimization between security and delay of quality-of-service. Journal of Network and Computer Applications, 34(2), 603–608.CrossRef
17.
Zurück zum Zitat Jindal, P., & Tingh, B. (2012). Study and performance evaluation of seurity-throughput tradeoff with link adaptive encryption scheme. arXiv:1211.5080. Jindal, P., & Tingh, B. (2012). Study and performance evaluation of seurity-throughput tradeoff with link adaptive encryption scheme. arXiv:1211.5080.
18.
Zurück zum Zitat Jindal, P., & Singh, B. (2013). Performance evaluation of security-throughput tradeoff with channel adaptive encryption. International Journal of Computer Network and Information Security, 5(1), 49–55.CrossRef Jindal, P., & Singh, B. (2013). Performance evaluation of security-throughput tradeoff with channel adaptive encryption. International Journal of Computer Network and Information Security, 5(1), 49–55.CrossRef
19.
Zurück zum Zitat Zibideh, W. Y., & Matalgah, M. M. (2012). An optimized encryption framework based on the modified-DES algorithm: A trade-off between security and throughput in wireless channels. In IEEE Radio and Wireless Symposium, pp. 419–422. Zibideh, W. Y., & Matalgah, M. M. (2012). An optimized encryption framework based on the modified-DES algorithm: A trade-off between security and throughput in wireless channels. In IEEE Radio and Wireless Symposium, pp. 419–422.
20.
Zurück zum Zitat Zhou, X., Ganti, R. K., Andrews, J. G., et al. (2011). On the throughput cost of physical layer security in decentralized wireless networks. IEEE Transactions on Wireless Communications, 10(8), 2764–2775.CrossRef Zhou, X., Ganti, R. K., Andrews, J. G., et al. (2011). On the throughput cost of physical layer security in decentralized wireless networks. IEEE Transactions on Wireless Communications, 10(8), 2764–2775.CrossRef
21.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef Wei, L., Zhu, H., Cao, Z., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef
22.
Zurück zum Zitat Wei, L., Zhu, H., & Cao, Z., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. In IEEE international conference on distributed computing systems workshops, pp. 52–61. Wei, L., Zhu, H., & Cao, Z., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. In IEEE international conference on distributed computing systems workshops, pp. 52–61.
23.
Zurück zum Zitat Zhou, Y., Zhang, Y., Liu, H., et al. (2012). A bare-metal and asymmetric partitioning approach to client virtualization. IEEE Transactions on Services Computing, 7(1), 40–53.CrossRef Zhou, Y., Zhang, Y., Liu, H., et al. (2012). A bare-metal and asymmetric partitioning approach to client virtualization. IEEE Transactions on Services Computing, 7(1), 40–53.CrossRef
24.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
25.
Zurück zum Zitat Zhang, Y., Li, X., Yang, J., et al. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia Tools and Applications, 67(1), 97–117.CrossRef Zhang, Y., Li, X., Yang, J., et al. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia Tools and Applications, 67(1), 97–117.CrossRef
26.
Zurück zum Zitat Yang, H., Zhang, Y., Zhou, Y., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., Zhang, Y., Zhou, Y., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
27.
Zurück zum Zitat Attar, A., Tang, H., Vasilakos, A. V., et al. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., et al. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef
28.
Zurück zum Zitat Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.CrossRef Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.CrossRef
29.
Zurück zum Zitat Faigl, Z., Lindskog, S., & Brunstrom, A. (2010). Performance evaluation of IKEv2 authentication methods in next generation wireless networks. Security and Communication Networks, 3(1), 83–98. Faigl, Z., Lindskog, S., & Brunstrom, A. (2010). Performance evaluation of IKEv2 authentication methods in next generation wireless networks. Security and Communication Networks, 3(1), 83–98.
30.
Zurück zum Zitat Lee, D. H., & Kim, J. G. (2014). IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. Personal and Ubiquitous Computing, 18(3), 493–501.CrossRef Lee, D. H., & Kim, J. G. (2014). IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. Personal and Ubiquitous Computing, 18(3), 493–501.CrossRef
31.
Zurück zum Zitat Raza, S., Voigt, T., & Jutvik, V. (2012). Lightweight IKEv2: A key management solution for both the compressed IPSec and the IEEE 802.15.4 security. In Proceedings of the IETF workshop on smart object security. Raza, S., Voigt, T., & Jutvik, V. (2012). Lightweight IKEv2: A key management solution for both the compressed IPSec and the IEEE 802.15.4 security. In Proceedings of the IETF workshop on smart object security.
32.
Zurück zum Zitat Ruiz, P. J. F., & Skarmeta, A. F. G. (2011). Providing security using IKEv2 in a vehicular network based on WiMAX technology. In Proceedings of IEEE Consumer Communications and Networking Conference, pp. 282–286. Ruiz, P. J. F., & Skarmeta, A. F. G. (2011). Providing security using IKEv2 in a vehicular network based on WiMAX technology. In Proceedings of IEEE Consumer Communications and Networking Conference, pp. 282–286.
Metadaten
Titel
VIKE: vehicular IKE for context-awareness
verfasst von
Jiake Xu
Yanheng Liu
Jian Wang
Weiwen Deng
Thierry Ernst
Publikationsdatum
01.05.2015
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2015
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-014-0856-1

Weitere Artikel der Ausgabe 4/2015

Wireless Networks 4/2015 Zur Ausgabe

Neuer Inhalt