TY - CHAP
T1 - Secure Opportunistic Vehicle-to-Vehicle Communication
AU - Mihaita, Alexandra Elena
AU - Dobre, Ciprian
AU - Pop, Florin
AU - Mavromoustakis, Constandinos X.
AU - Mastorakis, George
N1 - Funding Information:
The research in this paper is supported by national project MobiWay— Mobility beyond Individualism (PN-II-PT-PCCA-2013-4-0321), and by national project DataWay— Real-time Data Processing Platform for Smart Cities: Making sense of Big Data (PN-II-RU-TE-2014-4-2731). The authors would like to thank the reviewers for their time and expertise, constructive comments and valuable insight.
Publisher Copyright:
© 2017, Springer International Publishing Switzerland.
PY - 2017
Y1 - 2017
N2 - How much time do you spend stuck in traffic? Well, the average person spends around 43 hours a year stuck just because of the over-populated streets. The road infrastructure is something that cannot be easily improved, which is why the field of Intelligent Transportation Systems (ITS) has emerged. The most common example of such systems is the navigators which integrate the location monitoring of drivers with the services that help predict faster(or at least, most pleasant) alternative route(s). But, since everyone tries to find the optimal route, conflict of interest between the drivers can appear: one driver can choose to send bad data in order to give a false image of the map and gain advantages. The present chapter describes a solution to create a security mechanism in the context of ITS. The solution is a heterogeneous solution in which both symmetrical and asymmetrical encryption are used. Section 1 makes a short introduction into the field of ITS with its main challenges. The related work is then presented in Sect. 2. A theoretical approach (see Sect. 3) over the security mechanism proposed in the chapter is then made, followed by the practical description of the implementation (Sect. 4) and the constructive details (Sect. 5). Section 6 presents the experimental evaluation and the results of the security proposal. Finally, the conclusion are presented in the final Sect. 7 and some future work is mentioned.
AB - How much time do you spend stuck in traffic? Well, the average person spends around 43 hours a year stuck just because of the over-populated streets. The road infrastructure is something that cannot be easily improved, which is why the field of Intelligent Transportation Systems (ITS) has emerged. The most common example of such systems is the navigators which integrate the location monitoring of drivers with the services that help predict faster(or at least, most pleasant) alternative route(s). But, since everyone tries to find the optimal route, conflict of interest between the drivers can appear: one driver can choose to send bad data in order to give a false image of the map and gain advantages. The present chapter describes a solution to create a security mechanism in the context of ITS. The solution is a heterogeneous solution in which both symmetrical and asymmetrical encryption are used. Section 1 makes a short introduction into the field of ITS with its main challenges. The related work is then presented in Sect. 2. A theoretical approach (see Sect. 3) over the security mechanism proposed in the chapter is then made, followed by the practical description of the implementation (Sect. 4) and the constructive details (Sect. 5). Section 6 presents the experimental evaluation and the results of the security proposal. Finally, the conclusion are presented in the final Sect. 7 and some future work is mentioned.
KW - Advance Encryption Standard
KW - Certificate Authority
KW - Intelligent Transportation System
KW - Malicious Node
KW - Security Mechanism
UR - http://www.scopus.com/inward/record.url?scp=85087631912&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-45145-9_10
DO - 10.1007/978-3-319-45145-9_10
M3 - Chapter
AN - SCOPUS:85087631912
T3 - Studies in Big Data
SP - 229
EP - 268
BT - Studies in Big Data
PB - Springer Science and Business Media Deutschland GmbH
ER -