2006
DOI: 10.1007/11814764_22
|View full text |Cite
|
Sign up to set email alerts
|

Threats to Security in DSRC/WAVE

Abstract: Abstract. Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the messages exchanged between the vehicles and between the vehicles and specialized infrastructure be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats according to th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
60
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
3
3
2

Relationship

4
4

Authors

Journals

citations
Cited by 56 publications
(61 citation statements)
references
References 12 publications
(11 reference statements)
1
60
0
Order By: Relevance
“…It is based on an evaluation framework proposed by the European Telecommunications Standards Institute (ETSI) in [2]; but slightly modified in order to take into account the suggestions introduced in [3] for identifying relevant threats and security flaws on current wireless network applications.…”
Section: Analysis Methodologymentioning
confidence: 99%
“…It is based on an evaluation framework proposed by the European Telecommunications Standards Institute (ETSI) in [2]; but slightly modified in order to take into account the suggestions introduced in [3] for identifying relevant threats and security flaws on current wireless network applications.…”
Section: Analysis Methodologymentioning
confidence: 99%
“…Nevertheless, Johnston and Walker in their recent article criticize the adoption of Data Over Cable Service Interface Specifications (DOCSIS) [10]. Although designed to solve the last mile problem for cable, it has an otherwise different threat model from IEEE 802.16 since the former is wired while the latter is wireless technology [13].…”
Section: Ieee 80216mentioning
confidence: 99%
“…We gauge the security of the SAB protocol in terms of its effect on the risks uncovered in the WAVE threat analysis [19]. We compare the performance of SAB with WAVE in terms of broadcast message size and cryptographic operation execution time required for sending and receiving broadcast messages.…”
Section: Sab Analysismentioning
confidence: 99%
“…A threat with a high or medium impact and with high or moderate motivation and little technical difficulty is ranked as critical. Of the threats to WAVE identified in [19], four are affected by the proposed SAB protocol: location tracking (which is a critical threat), masquerading, replay and false broadcast messages (minor threats).…”
Section: Threat Analysismentioning
confidence: 99%
See 1 more Smart Citation