did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781118132722

Vehicle Safety Communications Protocols, Security, and Privacy

by ;
  • ISBN13:

    9781118132722

  • ISBN10:

    1118132726

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2012-10-16
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $146.08 Save up to $0.73
  • Buy New
    $145.35
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Owing to their safety applications, cooperative vehicle systems, which use sensors and wireless technologies to reduce traffic accidents, continue to be the focus of heavy research and development efforts around the world. Written by industry professionals, this book provides a systematic description of cooperative vehicle systems, discussing key technical issues in such systems, the latest advances in enabling technologies, and cutting-edge research trends. Coverage includes important technologies such as 5.9 GHz Dedicated Short Range Communications (DSRC), on-board equipment (OBE), and roadside equipment (RSE).

Author Biography

LUCA DELGROSSI, PhD, is Director of Driver Assistance and Chassis Systems U.S. at Mercedes-Benz Research & Development North America, Inc., Chairman of the Board of Directors at the VII Consortium, and coeditor of the IEEE Communications Magazine Automotive Networking Series.

TAO ZHANG, PhD, is Chief Scientist for Smart Connected Vehicles at Cisco Systems. He is a Fellow of the IEEE and the coauthor of IP-Based Next-Generation Wireless Networks.

Table of Contents

Foreword xv
Ralf G. Herrtwich

Foreword xvii
Flavio Bonomi

Foreword xix
Adam Drobot

Preface xxi

Acknowledgments xxv

1 Traffic Safety 1

1.1 Traffic Safety Facts / 1

1.1.1 Fatalities / 2

1.1.2 Leading Causes of Crashes / 3

1.1.3 Current Trends / 5

1.2 European Union / 5

1.3 Japan / 7

1.4 Developing Countries / 7

References / 8

2 Automotive Safety Evolution 10

2.1 Passive Safety / 10

2.1.1 Safety Cage and the Birth of Passive Safety / 10

2.1.2 Seat Belts / 11

2.1.3 Air Bags / 11

2.2 Active Safety / 12

2.2.1 Antilock Braking System / 12

2.2.2 Electronic Stability Control / 13

2.2.3 Brake Assist / 13

2.3 Advanced Driver Assistance Systems / 14

2.3.1 Adaptive Cruise Control / 15

2.3.2 Blind Spot Assist / 16

2.3.3 Attention Assist / 16

2.3.4 Precrash Systems / 16

2.4 Cooperative Safety / 17

References / 18

3 Vehicle Architectures 20

3.1 Electronic Control Units / 20

3.2 Vehicle Sensors / 21

3.2.1 Radars / 21

3.2.2 Cameras / 21

3.3 Onboard Communication Networks / 22

3.3.1 Controller Area Network / 23

3.3.2 Local Interconnect Network / 23

3.3.3 FlexRay / 24

3.3.4 Media Oriented Systems Transport / 24

3.3.5 Onboard Diagnostics / 24

3.4 Vehicle Data / 25

3.5 Vehicle Data Security / 26

3.6 Vehicle Positioning / 27

3.6.1 Global Positioning System / 27

3.6.2 Galileo / 29

3.6.3 Global Navigation Satellite System / 29

3.6.4 Positioning Accuracy / 30

References / 30

4 Connected Vehicles 32

4.1 Connected Vehicle Applications / 32

4.1.1 Hard Safety Applications / 32

4.1.2 Soft Safety Applications / 33

4.1.3 Mobility and Convenience Applications / 33

4.2 Uniqueness in Consumer Vehicle Networks / 34

4.3 Vehicle Communication Modes / 36

4.3.1 Vehicle-to-Vehicle Local Broadcast / 36

4.3.2 V2V Multihop Message Dissemination / 37

4.3.3 Infrastructure-to-Vehicle Local Broadcast / 38

4.3.4 Vehicle-to-Infrastructure Bidirectional Communications / 39

4.4 Wireless Communications Technology for Vehicles / 39

References / 42

5 Dedicated Short-Range Communications 44

5.1 The 5.9 GHz Spectrum / 44

5.1.1 DSRC Frequency Band Usage / 45

5.1.2 DSRC Channels / 45

5.1.3 DSRC Operations / 46

5.2 DSRC in the European Union / 46

5.3 DSRC in Japan / 47

5.4 DSRC Standards / 48

5.4.1 Wireless Access in Vehicular Environments / 48

5.4.2 Wireless Access in Vehicular Environments Protocol Stack / 48

5.4.3 International Harmonization / 50

References / 50

6 WAVE Physical Layer 52

6.1 Physical Layer Operations / 52

6.1.1 Orthogonal Frequency Division Multiplexing / 52

6.1.2 Modulation and Coding Rates / 53

6.1.3 Frame Reception / 54

6.2 PHY Amendments / 55

6.2.1 Channel Width / 56

6.2.2 Spectrum Masks / 56

6.2.3 Improved Receiver Performance / 57

6.3 PHY Layer Modeling / 57

6.3.1 Network Simulator Architecture / 58

6.3.2 RF Model / 59

6.3.3 Wireless PHY / 61

References / 62

7 WAVE Media Access Control Layer 64

7.1 Media Access Control Layer Operations / 64

7.1.1 Carrier Sensing Multiple Access with Collision Avoidance / 64

7.1.2 Hidden Terminal Effects / 65

7.1.3 Basic Service Set / 66

7.2 MAC Layer Amendments / 66

7.3 MAC Layer Modeling / 67

7.3.1 Transmission / 68

7.3.2 Reception / 68

7.3.3 Channel State Manager / 68

7.3.4 Back-Off Manager / 69

7.3.5 Transmission Coordination / 70

7.3.6 Reception Coordination / 71

7.4 Overhauled ns-2 Implementation / 72

References / 74

8 DSRC Data Rates 75

8.1 Introduction / 75

8.2 Communication Density / 76

8.2.1 Simulation Study / 77

8.2.2 Broadcast Reception Rates / 78

8.2.3 Channel Access Delay / 81

8.2.4 Frames Reception Failures / 83

8.3 Optimal Data Rate / 85

8.3.1 Modulation and Coding Rates / 85

8.3.2 Simulation Study / 86

8.3.3 Simulation Matrix / 87

8.3.4 Simulation Results / 88

References / 91

9 WAVE Upper Layers 93

9.1 Introduction / 93

9.2 DSRC Multichannel Operations / 94

9.2.1 Time Synchronization / 94

9.2.2 Synchronization Intervals / 95

9.2.3 Guard Intervals / 96

9.2.4 Channel Switching / 96

9.2.5 Channel Switching State Machine / 96

9.3 Protocol Evaluation / 97

9.3.1 Simulation Study / 98

9.3.2 Simulation Scenarios / 99

9.3.3 Simulation Results / 99

9.3.4 Protocol Enhancements / 102

9.4 WAVE Short Message Protocol / 103

References / 104

10 Vehicle-to-Infrastructure Safety Applications 106

10.1 Intersection Crashes / 106

10.2 Cooperative Intersection Collision Avoidance System for Violations / 107

10.2.1 CICAS-V Design / 107

10.2.2 CICAS-V Development / 110

10.2.3 CICAS-V Testing / 116

10.3 Integrated Safety Demonstration / 118

10.3.1 Demonstration Concept / 118

10.3.2 Hardware Components / 120

10.3.3 Demo Design / 121

References / 124

11 Vehicle-to-Vehicle Safety Applications 126

11.1 Cooperation among Vehicles / 126

11.2 V2V Safety Applications / 127

11.3 V2V Safety Applications Design / 128

11.3.1 Basic Safety Messages / 129

11.3.2 Minimum Performance Requirements / 129

11.3.3 Target Classifi cation / 131

11.3.4 Vehicle Representation / 132

11.3.5 Sample Applications / 133

11.4 System Implementation / 135

11.4.1 Onboard Unit Hardware Components / 135

11.4.2 OBU Software Architecture / 135

11.4.3 Driver–Vehicle Interface / 137

11.5 System Testing / 138

11.5.1 Communications Coverage and Antenna Considerations / 138

11.5.2 Positioning / 139

References / 140

12 DSRC Scalability 141

12.1 Introduction / 141

12.2 DSRC Data Traffi c / 142

12.2.1 DSRC Safety Messages / 142

12.2.2 Transmission Parameters / 143

12.2.3 Channel Load Assessment / 144

12.3 Congestion Control Algorithms / 145

12.3.1 Desired Properties / 145

12.3.2 Transmission Power Adjustment / 146

12.3.3 Message Rate Adjustment / 147

12.3.4 Simulation Study / 148

12.4 Conclusions / 148

References / 149

13 Security and Privacy Threats and Requirements 151

13.1 Introduction / 151

13.2 Adversaries / 151

13.3 Security Threats / 152

13.3.1 Send False Safety Messages Using Valid Security Credentials / 152

13.3.2 Falsely Accuse Innocent Vehicles / 153

13.3.3 Impersonate Vehicles or Other Network Entities / 153

13.3.4 Denial-of-Service Attacks Specific to Consumer Vehicle Networks / 154

13.3.5 Compromise OBU Software or Firmware / 155

13.4 Privacy Threats / 155

13.4.1 Privacy in a Vehicle Network / 155

13.4.2 Privacy Threats in Consumer Vehicle Networks / 156

13.4.3 How Driver Privacy can be Breached Today / 158

13.5 Basic Security Capabilities / 159

13.5.1 Authentication / 159

13.5.2 Misbehavior Detection and Revocation / 160

13.5.3 Data Integrity / 160

13.5.4 Data Confidentiality / 160

13.6 Privacy Protections Capabilities / 161

13.7 Design and Performance Considerations / 161

13.7.1 Scalability / 162

13.7.2 Balancing Competing Requirements / 162

13.7.3 Minimal Side Effects / 163

13.7.4 Quantifi able Levels of Security and Privacy / 163

13.7.5 Adaptability / 163

13.7.6 Security and Privacy Protection for V2V Broadcast / 163

13.7.7 Security and Privacy Protection for Communications with Security Servers / 164

References / 165

14 Cryptographic Mechanisms 167

14.1 Introduction / 167

14.2 Categories of Cryptographic Mechanisms / 167

14.2.1 Cryptographic Hash Functions / 168

14.2.2 Symmetric Key Algorithms / 169

14.2.3 Public Key (Asymmetric Key) Algorithms / 170

14.3 Digital Signature Algorithms / 172

14.3.1 The RSA Algorithm / 172

14.3.2 The DSA Algorithm / 178

14.3.3 The ECDSA Algorithm / 184

14.3.4 ECDSA for Vehicle Safety Communications / 194

14.4 Message Authentication and Message Integrity Verifi cation / 196

14.4.1 Authentication and Integrity Verifi cation Using Hash Functions / 197

14.4.2 Authentication and Integrity Verifi cation Using Digital Signatures / 198

14.5 Diffi e–Hellman Key Establishment Protocol / 200

14.5.1 The Original Diffie–Hellman Key Establishment Protocol / 200

14.5.2 Elliptic Curve Diffie–Hellman Key Establishment Protocol / 201

14.6 Elliptic Curve Integrated Encryption Scheme (ECIES) / 202

14.6.1 The Basic Idea / 202

14.6.2 Scheme Setup / 202

14.6.3 Encrypt a Message / 202

14.6.4 Decrypt a Message / 204

14.6.5 Performance / 204

References / 206

15 Public Key Infrastructure for Vehicle Networks 209

15.1 Introduction / 209

15.2 Public Key Certificates / 210

15.3 Message Authentication with Certificates / 211

15.4 Certifi cate Revocation List / 212

15.5 A Baseline Reference Vehicular PKI Model / 213

15.6 Confi gure Initial Security Parameters and Assign Initial Certificates / 215

15.6.1 Vehicles Create Their Private and Public Keys / 216

15.6.2 Certificate Authority Creates Private and Public Keys for Vehicles / 217

15.7 Acquire New Keys and Certifi cates / 217

15.8 Distribute Certifi cates to Vehicles for Signature Verifications / 220

15.9 Detect Misused Certifi cates and Misbehaving Vehicles / 222

15.9.1 Local Misbehavior Detection / 223

15.9.2 Global Misbehavior Detection / 224

15.9.3 Misbehavior Reporting / 224

15.10 Ways for Vehicles to Acquire CRLs / 226

15.11 How Often CRLs should be Distributed to Vehicles? / 228

15.12 PKI Hierarchy / 230

15.12.1 Certifi cate Chaining to Enable Hierarchical CAs / 231

15.12.2 Hierarchical CA Architecture Example / 231

15.13 Privacy-Preserving Vehicular PKI / 233

15.13.1 Quantitative Measurements of Vehicle Anonymity / 234

15.13.2 Quantitative Measurement of Message Unlinkability / 234

References / 235

16 Privacy Protection with Shared Certificates 237

16.1 Shared Certificates / 237

16.2 The Combinatorial Certificate Scheme / 237

16.3 Certificate Revocation Collateral Damage / 239

16.4 Certified Intervals / 242

16.4.1 The Concept of Certified Interval / 242

16.4.2 Certified Interval Produced by the Original Combinatorial Certificate Scheme / 242

16.5 Reduce Collateral Damage and Improve Certified Interval / 244

16.5.1 Reduce Collateral Damage Caused by a Single Misused Certificate / 245

16.5.2 Vehicles Become Statistically Distinguishable When Misusing Multiple Certificates / 248

16.5.3 The Dynamic Reward Algorithm / 250

16.6 Privacy in Low Vehicle Density Areas / 253

16.6.1 The Problem / 253

16.6.2 The Blend-In Algorithm to Improve Privacy / 256

References / 259

17 Privacy Protection with Short-Lived Unique Certificates 260

17.1 Short-Lived Unique Certificates / 260

17.2 The Basic Short-Lived Certificate Scheme / 261

17.3 The Problem of Large CRL / 263

17.4 Anonymously Linked Certificates to Reduce CRL Size / 264

17.4.1 Certificate Tags / 264

17.4.2 CRL Processing by Vehicles / 265

17.4.3 Backward Unlinkability / 267

17.5 Reduce CRL Search Time / 268

17.6 Unlinked Short-Lived Certificates / 269

17.7 Reduce the Volume of Certificate Request and Response Messages / 270

17.8 Determine the Number of Certificates for Each Vehicle / 270

References / 273

18 Privacy Protection with Group Signatures 274

18.1 Group Signatures / 274

18.2 Zero-Knowledge Proof of Knowledge / 275

18.3 The ACJT Group Signature Scheme and its Extensions / 277

18.3.1 The ACJT Group Signature Scheme / 277

18.3.2 The Challenge of Group Membership Revocation / 282

18.3.3 ACJT Extensions to Support Membership Revocation / 283

18.4 The CG Group Signature Scheme with Revocation / 286

18.5 The Short Group Signatures Scheme / 288

18.5.1 The Short Group Signatures Scheme / 288

18.5.2 Membership Revocation / 291

18.6 Group Signature Schemes with Verifier-Local Revocation / 292

References / 293

19 Privacy Protection against Certificate Authorities 295

19.1 Introduction / 295

19.2 Basic Idea / 295

19.3 Baseline Split CA Architecture, Protocol, and Message Processing / 297

19.4 Split CA Architecture for Shared Certifi cates / 301

19.5 Split CA Architecture for Unlinked Short-Lived Certificates / 302

19.5.1 Acquire One Unlinked Certifi cate at a Time / 302

19.5.2 Assign Batches of Unlinked Short-Lived Certifi cates / 304

19.5.3 Revoke Batches of Unlinked Certifi cates / 306

19.5.4 Request for Decryption Keys for Certificate Batches / 307

19.6 Split CA Architecture for Anonymously Linked Short-Lived Certificates / 308

19.6.1 Assign One Anonymously Linked Short-Lived Certificate at a Time / 308

19.6.2 Assign Batches of Anonymously Linked Short-Lived Certificates / 311

19.6.3 Revoke Batches of Anonymously Linked Short-Lived Certificates / 312

19.6.4 Request for Decryption Keys for Certificate Batches / 313

References / 314

20 Comparison of Privacy-Preserving Certificate Management Schemes 315

20.1 Introduction / 315

20.2 Comparison of Main Characteristics / 316

20.3 Misbehavior Detection / 320

20.4 Abilities to Prevent Privacy Abuse by CA and MDS Operators / 321

20.5 Summary / 322

21 IEEE 1609.2 Security Services 323

21.1 Introduction / 323

21.2 The IEEE 1609.2 Standard / 323

21.3 Certificates and Certificate Authority Hierarchy / 325

21.4 Formats for Public Key, Signature, Certificate, and CRL / 327

21.4.1 Public Key Formats / 327

21.4.2 Signature Formats / 328

21.4.3 Certificate Format / 329

21.4.4 CRL Format / 332

21.5 Message Formats and Processing for Generating Encrypted Messages / 333

21.6 Sending Messages / 335

21.7 Request Certifi cates from the CA / 336

21.8 Request and Processing CRL / 343

21.9 What the Current IEEE 1609.2 Standard Does Not Cover / 344

21.9.1 No Support for Anonymous Message Authentication / 344

21.9.2 Separate Vehicle-CA Communication Protocols Are Required / 344

21.9.3 Interactions and Interfaces between CA Entities Not Addressed / 346

References / 346

22 4G for Vehicle Safety Communications 347

22.1 Introduction / 347

22.2 Long-Term Revolution (LTE) / 347

22.3 LTE for Vehicle Safety Communications / 353

22.3.1 Issues to Be Addressed / 353

22.3.2 LTE for V2I Safety Communications / 353

22.3.3 LTE for V2V Safety Communications / 356

22.3.4 LTE Broadcast and Multicast Services / 357

References / 358

Glossary 360

Index 367

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program