Vehicular Ad hoc Network Applications and Security: A Study into the Economic and the Legal...

19
International Journal of Electronic Security and Digital Forensics, Vol. x, No. x, 2013 1 Copyright © 2013 Inderscience Enterprises Ltd. Vehicular Ad hoc Network Applications and Security: A Study into the Economic and the Legal implications Patrice Seuwou*, Dilip Patel, George Ubakanma Centre for Information Systems and Management Department of Informatics, London South Bank University, London SE1 OAA {seuwoup, dilip, ubakang}@lsbu.ac.uk *Corresponding author Abstract Vehicular ad hoc network (VANET) is an important component of the Intelligent Transportation System. In this context, vehicle are equipped with complex systems and advanced technologies such as communication systems, computing platform with numerous processors, artificial intelligence and automatic control. This emerging technology is attracting more and more attention as it is a combination of multiple academic subjects and the latest technologies representing the developing tendency of future automobile technology. The main benefit of VANET communication is seen in active safety systems that increase passenger safety by exchanging life critical warning messages between vehicles. In this paper, we discuss the background of VANETs, its application and the current security issues, furthermore we study a number of key elements related to the economic and legal aspects to be considered before VANET can be successfully deployed. Keywords: Vehicular ad hoc network, application, security, economic, legal. 1. Introduction In today’s world, road traffic activities play a very important role in everyday life. In order to continuously improve safety and efficiency of the transportation systems, to provide innovative services relating to different modes of transport and traffic management and to enable drivers to be better informed and make more coordinated and safer decisions on the road, Intelligent Transportation Systems (ITS) have been deployed. In various national plans, Vehicular Ad hoc Network also known as VANET is recognised as an important component of ITS (US DOT, 2013) and could be a solution to decrease the number of accident on

Transcript of Vehicular Ad hoc Network Applications and Security: A Study into the Economic and the Legal...

International Journal of Electronic Security and Digital Forensics, Vol. x, No. x, 2013 1

Copyright © 2013 Inderscience Enterprises Ltd.

Vehicular Ad hoc Network Applications and Security: A Study into the

Economic and the Legal implications

Patrice Seuwou*, Dilip Patel, George Ubakanma

Centre for Information Systems and Management

Department of Informatics,

London South Bank University,

London SE1 OAA

{seuwoup, dilip, ubakang}@lsbu.ac.uk

*Corresponding author

Abstract

Vehicular ad hoc network (VANET) is an important component of the Intelligent

Transportation System. In this context, vehicle are equipped with complex

systems and advanced technologies such as communication systems, computing

platform with numerous processors, artificial intelligence and automatic control.

This emerging technology is attracting more and more attention as it is a

combination of multiple academic subjects and the latest technologies

representing the developing tendency of future automobile technology. The main

benefit of VANET communication is seen in active safety systems that increase

passenger safety by exchanging life critical warning messages between vehicles.

In this paper, we discuss the background of VANETs, its application and the

current security issues, furthermore we study a number of key elements related to

the economic and legal aspects to be considered before VANET can be

successfully deployed.

Keywords: Vehicular ad hoc network, application, security, economic, legal.

1. Introduction

In today’s world, road traffic activities play a very important role in everyday

life. In order to continuously improve safety and efficiency of the transportation

systems, to provide innovative services relating to different modes of transport

and traffic management and to enable drivers to be better informed and make

more coordinated and safer decisions on the road, Intelligent Transportation

Systems (ITS) have been deployed. In various national plans, Vehicular Ad hoc

Network also known as VANET is recognised as an important component of ITS

(US DOT, 2013) and could be a solution to decrease the number of accident on

the road. Indeed, despite the introduction of seat belts, airbags and anti-lock

braking system (ABS), there are still many people who die because of road

accidents. According to the Annual statistical report 2010 published by the

European Road Safety Observatory, Road traffic accidents in the Members States

of the European Union annually claim about 35.000 lives and leave more than

1.6 million people injured (ERSO, 2010). VANET is an emerging technology,

also a subset of Mobile Ad hoc Networks (MANETs) that uses moving cars as

nodes in a network to create mobile networks, meaning that every node can move

freely within the network coverage and stay connected with each other. In this

type of network, nodes could be vehicles or Road Side Units (RSU) and they can

communicate with other nodes in single hop or multi hop. However VANET is

differentiated from MANET by many aspects such as dynamic topology changes

and high mobility of the nodes (De Fuentes and González-Tablas, 2011).

The network Vehicle was a new technology initiative by Delphi Delco

Electronics Systems and its partners (IBM, Netscape Communications and Sun

Microsystems) their aim was to offer more productivity tools, safety,

convenience and entertainment to millions of drivers. It was designed to

demonstrate how technology could be used to enhance vehicles. The Network

Vehicle made its debut at COMDEX ’97 and has since directed the attention of

today research efforts (Lind et al, 1998). Integrating a network interface, GPS

receiver, different sensors and on-board computer provide the opportunity to

design a powerful car-safety system able to gather, to process and distribute

information. In regards to the application in VANETs, they have been

categorised into safety-related and comfort-related (commercial) applications

(Jakubiak and Koucheryavy 2008). VANET offers several benefits to

organisations of any size. While such a network does pose certain safety

concerns (for example, one cannot safely type an email while driving), this does

not limit VANET’s potential as a productivity tool.

The main contributions of this paper are as followed: (1) we provide a ground for

the economic aspect to be considered for a successful VANET deployment, (2)

we identify a number of pieces of UK legislation that will need to be updated

with the introduction and the full implementation of this new technology.

The rest of the paper is organised as follows. In section 2 we provide a

background of VANET, in section 3 VANET Applications are discussed. In

section 4 we focus on the security issues and challenges in VANET. In section 5,

we look at the economic implications of VANET and in section 6 the legal

implications. Our concluding remarks and future work are presented in section 7

of the paper.

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

2. Background of VANET

Vehicular Ad-Hoc Network (VANET) is regarded as the first commercial version

of mobile ad-hoc networks (MANETs) as well as one of the most promising

MANET application scenarios (Schoch et al., 2006; Zhang, 2010). MANETs are

formed without any central administration and consist of mobile nodes that use a

wireless interface to send packet data. The roots of ad hoc networking could be

traced back as far as 1968 (Frodigh et al., 2000) with some early applications

such as the DARPA Packet Radio Network (PRNet) project in 1972 developed

by the Defence Advanced Research Projects Agency (DARPA). It was predicted

that in the near future, most new vehicles will be equipped with short-range

radios capable of communicating with other vehicles or with highway

infrastructure at distances of at least one kilometre (Parno and Perrig, 2005).

Vehicles will require an authority to oversee and to govern these

communications. Multiple ad-hoc networking technologies such as WiFi IEEE

802.11 b/g, WiMAX IEEE 802.16, Bluetooth. IRA, ZigBee are integrated in

VANET to allow an easy, effective, accurate and simple communication amongst

vehicles on dynamic mobility (Singh et al, 2011). Therefore a VANET could be

defined as communication network composed of vehicles (cars, buses, trucks and

so on) and road side base stations. It is a network that enables communications

between vehicles and RSUs, and the RSUs can be connected to a backbone

network (Qian and Moayeri, 2008). This communication is Ad hoc, meaning that

each connected node can move freely, no wires required and the routers used in

this context are called Road Side Units (RSU). Each vehicle will be equipped

with an On-board unit (OBU) allowing connection of the vehicle with (RSU) via

dedicated short-range communications (DSRC) radios. Furthermore, a Tamper

Proof Device (TPD) holding all critical information about the vehicle such as

vehicle secrets, trip details, drivers identity, speed and position will also be

involved in that communication. OBUs are allowed to talk to other OBUs and the

road-side infrastructure formed by road-side units (RSUs). The OBUs and RSUs

are equipped with on-board sensory, processing, and wireless communication

modules, forming a self-organised network allowing many other network

applications and services, including Internet access to be provided to vehicles.

Figure 1 shows a graphical depiction of a VANET identifying different types of

communications including both vehicle-to-vehicle communications (V2V) and

vehicle-to-roadside communications (V2R).

Figure 1 An example of a VANET

In the recent years, several projects have been launched in Europe, US and Japan

with the unique goal of realising the dream of networking car and a successful

implementation of vehicular networks. Numerous projects held in Europe,

Joining partners from the industry, governmental agencies and academia. Topics

covered within these activities include hazard warnings triggered by hazard

flashers, elaborated within Inter-Vehicle Hazard Warning project (IVHW);

cooperative driving addressed in CarTALK 2000, PROMOTE-Chauffeur and

INVENT VLA projects and driver information and warning issues addressed by

PReVENT WILLWARN, SAFESPOT and FleetNET. The Car2Car

Communication Consortium, a non-profit industry driven organisation initiated

by European car manufacturers in 2004 and supported by equipment suppliers,

research organisations and other partners. Its goal is to create a European

industrial standard for car-to-car communications extend across all brands (C2C

CC, 2013). FleetNet was a program which ran from 2000 to 2003, their research

was dominated by efforts to standardise MANET protocols, focusing on the

network layer (Fussler et al, 2007). Furthermore, we have the project Network

On Wheels (NOW) a German research project initiated in 2004 and funded by

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

the German government with the main partners including academia, automotive

and IT industries which adopts an IEEE 802.11 standard for wireless access

adapted to European market, with their main objectives to solve technical issues

related to communication protocols and data security for car-to-car

communications (Abdalla, and Senouci, 2007). The radio used for the

communication is Dedicated Short-Range Communications (DSRC). In 1999, the

United States Federal Communications Commission (FCC) in the USA allocated

75MHz of spectrum in the 5.9GHz band for DSRC to be used by Intelligent

Transportation Systems (ITS). Also, in Europe in August 2008 the European

Telecommunications Standards Institute (ETSI) has allocated 30 MHz of

spectrum in the 5.9GHz band for ITS. Although the IEEE 802.11 standards

family was initially developed for the use of laptops and PDAs in hot-spots, it is

relatively easily converted for vehicular use, moving to a different, licensed

frequency band, common for all participating countries. Despite the amount of

publication done in this area, economical, legal and institutional issues remain

unresolved. After they are dealt with, the deployment phase would start

(Jakubiak and Koucheryavy, 2008).

3. VANET Applications

Driving is a skill that requires full attention to safely control the vehicle and

respond to events happening on the road ahead. Distraction occurs when the

driver focus moves from the road to other activities. In order to maintain the

driver awareness of his/her environment and decrease the number of accident on

the road, the fast deployment of VANET enabled technologies become a

necessity. The main purpose of VANET was to provide ubiquitous connectivity

while on the road to mobile users, who are otherwise connected to the outside

world through other networks (Wang and Li, 2009). Integrating a network

interface, GPS receiver, different sensors and on-board computer gives the

opportunity to build powerful car-safety system, able of gathering, processing

and distributing high volume of information (Jakubiak and Koucheryavy, 2008).

A vehicular network model normally consists of three layers: data traffic,

vehicular traffic, and road network. While the first two are dynamic, the last is

naturally fixed. Communications between nodes can be either single-hop or

multi-hop and RSUs are assumed to be connected with each other. Researchers

are currently working on VANET technologies to make transportation systems

more intelligent so they can provide drivers with crucial information like traffic

congestion, road closures, weather conditions, their current position and other

data on the surrounding traffic. The movement of vehicles is very fast and

vehicles act as transceivers. They send and receive signals simultaneously

creating an extremely dynamic network which changes continuously.

Furthermore, the concentration of vehicles varies from point to point and also

depends of the time of day. For instance, the density might decrease at night and

increase during peak commuting hours.

ITS in many sources include the integration of advanced communication

technologies into the traffic infrastructure as a means to improve driving safety,

efficiency and awareness. Thus, ITS is more focused on the upgrade of

infrastructure, and the potential applications supported by the upgraded

infrastructures while VANETs are generally more autonomous, allowing

individual vehicles to interact and function. Each vehicle can take the role of a

sender, receiver, and router to broadcast information to the vehicular network or

transportation agency, which then uses the information to ensure safe, free-flow

of traffic. For communication to occur between vehicles and Road Side Units

(RSUs), vehicles must be equipped with a radio interface or On Board Unit

(OBU) that enables short-range wireless ad hoc networks to be formed. Vehicles

must also be fitted with hardware that permits detailed position information such

as a Global Positioning System (GPS) receiver. Figure 2 shows a graphical

depiction of a Vehicular Ad hoc network. The unloading vehicle blocks a route

and the surrounding vehicles can adopt alternative routes to avoid disruption.

Figure 2 A graphical depiction of a Vehicular Ad hoc NETwork (VANET). The

unloading vehicle blocks a route and the surrounding vehicles can adopt alternative

routes to avoid disruption. (Image Extracted from CAR 2 CAR Communication

Consortium at www.car-to-car.org/).

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

In practice, a good system design depends on understanding the applications that

will be carried in the network. These applications exhibit different

communication patterns such as one-to-one, one-to-many, many-to-many and

also have diverse requirements such as bandwidth, delay, security and reliability.

VANET enable systems will support a number of applications including Traffic

Signal, Vision Enhancement, Weather Conditions, Safety and Entertainment.

Safety Warning Applications, Life-Critical Safety Applications, Electronic Toll

Collection, Internet Access, Group Communications, and Road side Service

Finder. Most of these applications are proposed by vehicle manufacturers and can

be divided into two major categories which are safety-related applications and

comfort-related applications (commercial) (Raya and Hubaux, 2007).

3.1 Safety-related applications

Safety-related applications such as Collision Avoidance, Cooperative Driving

may prevent life-endangering accidents. Signals transmitted from a roadside base

station to a vehicle could warn a driver on potential danger while entering an

intersection. Communication between vehicles and communication between

vehicles and the roadsides can save many lives and prevent injuries. Therefore

the security of this category is mandatory, since the proper operation of any of

these applications should be guaranteed even in the presence of attackers.

Jakubiak and Koucheryavy (2008) have grouped safety-related applications in

three main classes which are assistance (navigation, cooperative collision

avoidance and lane-changing), information (speed limit or work zone info) and

warning (post-crash, obstacle or road condition warnings). VANETs are believed

to improve traffic safety and transportation management while lowering costs.

Various safety and traffic information, including road hazard, accident

notification and collision avoidance can be shared via VANETs. Most

information in VANET applications has real-time requirements, such as end-to-

end delay. For instance, a succession crash could be avoided if the message delay

is less than 0.1 seconds, while a delay of 0.4 seconds is not sufficient. In

Dedicated short-Range Communications (DSRC), the end-to-end delay for

critical applications is required to be within 1 second, or even less, within 100ms.

However, the delay of 802.11p, which is part of the VANET protocol stack, is

usually over 1 second. Many VANET applications have either delay constraints

or other Quality of Service (QoS) requirements. A solution to provide Quality of

Service (QoS) and reliability in VANET routing is still a challenging problem.

For instance, when a brake event happens, the message should be transferred and

should arrive in a certain time to avoid an accident (Li and Chigan, 2010). These

types of signals are life critical therefore demand direct communication due to

their delay-critical nature.

3.2 Non Safety-related applications (Comfort-related)

The purpose of these applications is to improve passenger comfort and traffic

efficiency. Applications in this category will include weather information, instant

messaging, online games, and internet access allowing passengers on board the

vehicle to have access to internet services. Furthermore, some business will be

able to advertise their products using the technology. But is important that non

safety-related application do not interfere with safety-related application

therefore possible solutions may be to use separate physical channel for each

category of signal or to prioritise the safety-related signals.

4. Security Analysis

In order for VANETs to become a real technology that can be deployed and

guarantee public safety, there is a need for an appropriate security architecture

that will protect them from different types of security attacks. In this section, we

are going to identify possible attacks that could be perpetrated again VANET

system. Furthermore, we will discuss different dimension of attackers and

identify the security requirements for this type of network.

4.1 Possible Attacks

The security of VANETs is vital, as the reason of their very existence relates to

significant life threatening situations. But due to the nature of open wireless

transmission mediums used in VANET, there are high numbers of attacks that

can be mounted against VANET systems. Here we elaborate some of these

attacks.

• Malware: This type of attack (including Viruses and worms) is more likely to

be carried out by insiders rather than outsiders and can be injected into the

network when the On Board Units (OBU) and Road Side Units (RSU) are

performing software updates.

• Spamming: Due to the lack of infrastructure and the decentralised nature of

VANETs, spam messages are difficult to control. Their very existence within the

network increases the possibility of transmission delay, thus affecting the real-

time guarantee requirement.

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

• Denial of Service (DoS) Attack: Overloads the communication channels and

make the network unavailable for authentic users. These attacks can be carried

out internally or externally using techniques such as flooding and jamming.

• Black Hole Attack: This form of attack takes place when an invader refuses to

play its part in the network, by dropping out signals after an established

communication, leading to a failure of message propagation.

• Broadcast Tampering: An attacker may inject false safety messages into the

network. This type of attack can be carried out internally or externally. It allows

the suppression of critical warning messages resulting in accidents.

• Replay Attack: In this attack, a previously received signal is re-injected back

into the network at a later time or in a different location.

• Position Faking: Attackers may diffuse false information in the network to

affect the behaviour of other drivers. Reliable and accurate reporting of vehicle

position information must be guaranteed. Vehicles are exclusively responsible for

providing their location information and impersonation must be intolerable.

Unsecured communication can allow attackers to modify or falsify their own

position information to other vehicles, create additional vehicle identifiers (also

known as a Sybil Attack) or block vehicles from receiving vital safety messages.

• Global Positioning System (GPS) Spoofing: Attackers may fool vehicles into

thinking that they are in a different location. This is done by using GPS satellite

simulator generating signals by producing false readings in the GPS positioning

system devices. This is possible through the use of a GPS satellite simulator

generating signals stronger than those produced by the genuine satellite. The GPS

satellite maintains a location table with the identity of all vehicles on the network

and their geographic location.

• Masquerading: An attacker actively pretends to be another vehicle by posing

as a legitimate vehicle in the network using false identities and can be motivated

by rational or malicious objectives. They are then able to launch a multiplicity of

attacks including production of false messages or the formation of black holes.

• Sybil Attack: This occurs when the attacker uses different identities at the same

time and pretends to be multiple vehicles concurrently. Networks are especially

vulnerable if each vehicle holds multiple keys.

• Certificate Replication/ Key management: Certification Authorities (CA)

will be responsible for issuing key certificates to vehicles. An attacker could

undermine the system by duplicating a vehicle’s identity across several other

vehicles. The objective of such an attack would be to confuse authorities and

prevent identification of vehicles in hit-and-run events. Advantages of using a

Public Key Infrastructure (PKI) for VANET are accompanied by some

challenging problems, notably certificate revocation.

• Message Tampering/Manipulation: An attacker may inject forged or

fabricated messages and is able to suppress or alter transmitter messages. In this

case an attacker either physically disables inter-vehicle communication or

changes the application to prevent it from sending to, or responding from

application beacons. In general, an attacker can modify packet information

including vehicle status, location, emergency braking and other special events. A

threat to authenticity can result from an attacker modifying the messages

exchanged in vehicle-to-vehicle (V2V) or vehicle-to-roadside unit (V2I)

communication.

• Tunnelling: Due to the fact that GPS signals disappear temporarily when

vehicles enter a tunnel, attackers may exploit this momentary loss of positioning

information by injecting false data once vehicles are out of the tunnel and before

reception of updated location information.

4.2 Attackers

Attacker create problem in the network by getting full access of communication

medium DSRC. Raya and Hubaux (2007) classify attackers as having four

dimensions: “Insider versus Outsider”, “Malicious versus Rational”, “Active

versus Passive” and “Local versus Extended”. The ideal solution should allow

drivers to distinguish genuine members of the network from malicious

individuals, by determining the liability of each driver while maintaining their

privacy. The inspiration behind VANET was to merge various disciplines

involving engineers, computer scientists, psychologists, legislators and many

others professionals together with car manufacturers, in order to make driving

more secure and comfortable. Attackers have their own role in this network and

predicting their dynamic behaviour is difficult. If an attacker works on safety

applications and changes the content of safety messages then it will create very

difficult situations on the road where many users may be affected. For example,

an attacker can selectively dropping packets from the network, these packets may

hold critical information for the receiver, the attacker suppress these packets and

can use them again in other time. The purpose of such an attacker may be to

prevent registration and insurance authorities from learning about collisions

involving his vehicle or to avoid delivering collision reports to roadside access

points. An advantage of VANETs over the more common ad hoc network is that

they provide sufficient computational and power resources. Indeed a typical

vehicle may possibly host numerous microprocessors.

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

4.3 Security requirement

Security is amongst the essential user’s requirement in VANET and it will be

difficult to convince drivers to use this new technology unless it is made secure at

an acceptable level. The problem at hand is to secure the operation of VANET

systems by designing protocols that mitigate attacks and thwart deviations from

the implemented protocols to the greatest possible extent. This section includes

some of the basic security requirements for VANET systems based on

application needs as discussed in Seuwou et al (2013).

Authentication: Authentication is the core security requirement in

VANET. Vehicles reactions to events should be based on legitimate

messages. This service is concerned with assuring that the origin of a

message is correctly identified.

Integrity: This is a service assuring that system assets and information

transmitted over the network cannot be altered by unauthorised parties.

Indeed these modifications may include writing, changing, changing the

status, deleting or injecting transmitted messages. Therefore it is

important to highlight that integrity is related to active attacks as well as

technical errors.

Confidentiality (sometimes misleadingly called privacy): In VANET,

vehicles send and receive safety as well as non-safety messages from

either vehicle to vehicle (V2V) or vehicle to infrastructure (V2I). This

service ensures that the transported information is kept secret from all

unauthorised parties and cannot be eavesdropped on its way between the

sender and the receiver.

Privacy: Privacy is an important factor for the public’s acceptance and

successful deployment of VANETs as people are increasingly concerned

about Big Brother enabling technologies. In vehicle context, it is

achieved when two related goals are satisfied (untraceability and

unlinkability). This service ensures the user is able to maintain control of

personal data and his/her location. This service also secures other

information related to the vehicle such as identity of the driver, the

driving behaviour, Electronic License Plate (ELP), speed of the vehicle,

internal car sensor data, the past and present location of the vehicle from

unauthorised parties. Therefore privacy can be of various types:

o User Data Privacy

o Location Privacy

o Route Privacy

Availability: This service requires every node to be able to send

information at any time. As mentioned above, the main purpose of

VANET was to serve users by making driving more secure and

comfortable. For that reason, if the network is not available for

communication, then VANET becomes useless. Vehicular networks

must be available at all times, as many applications require real-time

communications with fast response times. Any delay, even a few

milliseconds may make a specific message become meaningless. This

may lead to terrible accidents or much bigger disasters.

Access control: This service provides users with the ability to restrict

access to resources reserved for privileged entities. Access control

policies can be implemented on Road Side Units (RSU) allowing limited

access to other vehicles infrastructure and application data through

communication channels.

Non-repudiation: This requirement is also called auditability (Kargl et

al, 2006). This service prevents the server or receiver from denying

receipt of a transmitted message. Moreover, senders and receivers can

prove that a particular message has been received or sent.

5. Economic implications of VANET deployment

In the near future, vehicles are expected to be equipped with VANET

technologies although it is likely to take a considerable time before all vehicles

are fully VANET enabled (Weimerskirch et al, 2010). The costs for software and

electronics are estimated to approach the 50% margin level in car manufacturing

in 2015. Furthermore amongst the total number of vehicle innovations today, it is

estimated that 90% are all centred on information technology software and

hardware.

There are two mechanisms that lead to a successful market introduction for

customer technologies:

A visible added value of the technology for the customer

A regulative order that does not leave alternatives requires its use.

Indeed research shows that VANET is a necessity. Therefore, as a means of

accelerating the process of VANET market penetration, collaboration among

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

automotive manufacturers, government agencies, legal authorities and other third

parties must be elaborated. In the USA alone, around 7 million vehicles are sold

per year in a total number of about 243 millions. There will be a need of

supporting infrastructure made available in the form of roadside units (RSUs). It

was estimated that in order to make the network usable, penetration of at least

10% is needed. Provided that 50% of all newly produced vehicles are VANET

enabled, reaching the 10% should take an average of 3 years (Jakubiak and

Koucheryavy, 2008). The cost of security solutions is critical in any IT system.

The risk involved in vehicular networks can be much larger than the risk in

conventional computing world. The hacking of an automotive safety-critical

application system can have far more impact due the life threatening aspect of the

problem to be considered. A possible scenario may be a VANET safety

application successfully compromised by one or more threats of conventional IT

systems such as hacking, phishing, pharming, etc… these security gaps may

create disastrous effects in a VANET context.

There is another cost issue related to various electronic components such as the

Event Data Recorder (EDR) which is an extra security system, a logging

mechanism to track and record events in an accident, similar to the idea of black

box in an airplane. Figure 3 show a smart vehicle with various technologies

which will be imbedded in future cars. This emerging technology is being

introduced slowly into society with equipment such as The Global Positioning

System (GPS) which is a space-based satellite navigation system that provides

location and time information in all weather, anywhere on or near the Earth, the

Forward and Rear radar systems.

Figure 3 A Smart vehicle’s onboard instrumentation. The computing platform

supervises protocol execution, including those related to security. The

communication facility supports wireless data exchange with other vehicles or

fixed stations (Source: Hubaux, Capkun and Luo, 2004).

EDR is a non-volatile tamper-proof storage hardware system used to record all

the emergency-related information received through the VANET, including

speed data, time, vehicle location, acceleration data and so on. Data will be

stored in the Event Data Recorder (EDR) but there will also be equipment called

a Tamper-Proof Device (TPD) generating and receiving encrypted messages to

be stored in EDR. If someone tries to open a TPD by brute-force, there will be a

security measure allowing all the stored keys in it to be erased to prevent them

from being compromised; Similar to the Cryptex in The Da Vinci Code

(Stampoulis and Chai, 2007). Indeed all of the above equipment will be

introduced with their various economic implications. Generally speaking, due to

the familiar threats of conventional IT systems such as hacking, phishing,

pharming…, there is an understanding of security in the computing world by

end-users who are willing to invest in security solutions (firewall and anti-virus

software …). On the other hand, there is little willingness by vehicle buyers to

spend a lot on security. Research shows that the main challenge in providing

security in VANET depends on privacy, trust, cost and gradual deployment.

Therefore, it is crucial for any security solutions to be mainly cost effective.

Despite all the economic problems related to VANET deployment, there is the

potential to successfully introduce the technology into the market as long as there

is cooperation among key parties.

6. Legal implication of VANET deployment

As society changes, its goals and values also change. It is believed that

advancements in technology are not always closely followed by lawmakers as

attackers are continuously looking for ways to escape the juridical system.

Balancing privacy concerns with security needs will require codifying legal,

societal and practical considerations. Most countries have widely divergent laws

concerning their citizens’ right to privacy (Parno and Perrig, 2005). In today’s

world, most car manufacturers operate at an international level in multinational

markets, therefore they will required security solutions able to satisfy the most

severe laws or that can be customised to meet their legal obligations. There are a

number of pieces of UK legislation that may be relevant to information security

in Vehicular Ad hoc Networks. These may include the Telecommunications

Regulations 2003; the Companies Act 2006; the Copyright, Designs and Patents

Act 1988; the Computer Misuse Act 1990 (as updated by the Police and Justice

Act 2006); the Data Protection Act 1998; the Human Rights Act 1998; the

Electronic Communications Act 2000; the Regulation of Investigatory Powers

Act 2000; the Freedom of Information Act 2000; and the software licensing

regulations (Calder and Watkins, 2010).

The legal aspects of VANET are related to the over-lapping areas of law and

Intelligent Transportation System (ITS). Existing transportation law must be

changed or be readapted to reflect developments in the transportation industry

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

due to the synergy of various academic disciplines and professionals, combined

with the exponential growth of information technology. Information technology

law (IT law) should not be confused with the IT aspects of law although there is

an overlap between the two concepts. There is a set of legal requirement

currently in existence in several countries, which governs the transportation.

These laws differ depending on the country. Cyber law or Internet law is a term

that encapsulates the legal issues related to use of the Internet.

Criminals, military, government and the public listen in on conversations, as well

as Law enforcement agencies, but they do it legally. The Electronic

Communications Privacy Act grants law enforcement agencies the right to tap

phones if they can prove to a judge that they have probable cause. This may be

due to an illegal activity, a matter of life or death, in order to enforce a law or to

gain evidence on a criminal element. The courts normally limit the monitoring to

a specific legal duration (Nichols and Lekkas, 2002). In the future, when VANET

technologies will be completely deployed, this law will be amended to

incorporate the changes in the technology.

There are negative implications associated with distracted driving—especially in

conjunction with a crash. Survey research shows that self-reporting of negative

behaviour is lower than actual occurrence of that negative behaviour. There is no

reason to believe that self-reporting of distracted driving to a law enforcement

officer would differ. The inference herein is that the reported driver distraction

during crashes is lower than the actual occurrence (U.S. Department of

Transportation, 2010).

If a driver fatality occurs in the crash, law enforcement must rely on the crash

investigation in order to report on whether driver distraction was involved. Law

enforcement may not have information to indicate distraction. These

investigations may rely on witness account and oftentimes these accounts may

not be available either (U.S. Department of Transportation, 2010).

Through the ability to digitise any form of information, technology is changing

everything. Boundaries between the various forms of surveillance are

disappearing with the application of information technology linking surveillance

techniques into a near seamless web of surveillance. Developments in data

processing suggest that the distinction between informational and physical

privacy is becoming more and more flimsy. Law is a vital institution through

which society achieves its goals (Boyd et al., 1966). Traffic Law System (TLS) is

an important concept in the intelligent transportation system. Legislative

requirements might force VANET to provide strong security and privacy

solutions. Notions of privacy have evolved and changed over time. The classic

definition of the concept is that it consists of the ‘right to let alone’. In terms of

isolation from the scrutiny of others, the average individual living in town or city

enjoys vastly more personal privacy than did our ancestors living in small

villages where every action was known to and a source of comment for

neighbours. The right to privacy receives a measure of recognition in the

European Convention on Human Rights which provides that ‘Everyone has the

right to respect for their private, family life, their home and correspondence’. To

a greater extent than with other basic human rights, the right to privacy must be

subject to considerable qualification and, as epitomised in the on-going debate

concerning the allegedly intrusive nature of media activities. The right to privacy

has to be balanced against a basket of other rights (Lloyd, 1997, p.28).

As transportation systems develop, many new legal policy issues for which there

is now little or inexistent precedent arises. Legislators may be required to

generate laws prohibiting the activities presumed to be causing Highway

Transportation System dysfunctions, finding ways to reinforce these laws. An

official determination of guilt for those accused of not complying with the laws,

an imposition of legal sanctions against those found guilty of disobeying the laws

is required. Deployment of VANETs will create many novel and challenging

problems for the transportation lawyer. It will require the development of new

ideas and new approaches to accomplish new goals for our transportation system.

7. Conclusion and Future works

Vehicular ad hoc network is an emerging area in the field of networking still in

need of more solutions and proposals. In this paper, we gave an overview of the

technologies including the standard and the spectrum frequency allocation; we

investigate its applications and identify the security issues related to the

introduction of this emerging technology. Moreover, we have discussed the

economic and legal implications of VANET market penetration. These issues

remain unresolved and show that VANET deployment will start only after they

are dealt with. The system could become fully functional within few years with

sufficient roadside infrastructure built only if car manufacturers, governmental

agencies, legislators, transportation authorities and other third parties decide to

work together to improve road safety and make driving more enjoyable. Future

work may be to explore ethical implications of VANET implementation.

References:

Abdalla, G. M. T. and Senouci S.M. (2007) “Current Trends in Vehicular Ad

Hoc Networks”, Proceedings of UBIROADS workshop.

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

Calder, A. and Watkins S. (2010) IT Governance, A Manager’s Guide to Data

Security and ISO27001/ISO27002, 4th Ed pp. 21 – 22.

C2C CC (2013)Car-to-Car Communications Consortium, Available at

http://www.car-2-car.org/ (Accessed: 16 August 2013).

De Fuentes, J. M. and González-Tablas, A. I. (2011) “Overview of security

issues in Vehicular Ad-hoc Networks”, in Handbook of research on mobility and

computing: Evolving technologies and ubiquitous impacts, pp.894-911.

ERSO (2010) Annual Statistical Report, based on data from CARE / ES,

SafetyNet project: Building the European Road Safety Observatory. Available at:

http://www.dacota-

project.eu/Deliverables/DaCoTA_WP3_D3_1_final%20with%20Annex.pdf

(Accessed: 16 August 2013).

FCC (1999) Federal Communications Commission Available at:

http://transition.fcc.gov/Bureaus/Engineering_Technology/News_Releases/1999/

nret9006.html (Accessed: 16 August 2013).

Frodigh, M., Johansson, P., Larsson, P. (2000) Wireless ad hoc networking- The

art of networking without a network, Ericsson Review, No. 4.

Fussler, H. Schnaufer, S. Transier, M. Effelsberg, W. (2007)”Vehicular

Ad-Hoc Networks: From Vision to Reality and Back”, Proc. Of IEEE

Wireless on Demand Network Systems and Services.

Hubaux, J.-P., Capkun, S. and Luo, J. (2004) The Security and Privacy of Smart

Vehicles. IEEE Security and Privacy magazine, 2(3), 49-55

Jakubiak, J. and Koucheryavy, Y. (2008) “State of the art and research

challengies for VANETs”, Proceedings of the 5th annual IEEE CCNC, pp.912-

916.

Li, J. and Chigan, C. (2010) Delay-aware Transmission Range Control for

VANETs, IEEE Globecom 2010 proceedings, USA.

Lind, R. Schumacher, R. Reger R. Olney, R . Yen, H. and Laur, M. (1998) The

network vehicle -A glimpse into the future of mobile multi-media, IEEE Aerosp.

Electron. Syst. Mag.

Nichols, R. K., Lekkas P. C. (2002) Wireless Security Models, Threats, and

Solutions, McGraw-Hill Telecom pp 100 – 116.

Parno, B. and Perrig, A. (2005) Challenges in securing vehicular networks, in:

Proceedings of the Workshop on Hot Topics in Networks (HotNets-IV).

Qian, Y. and Moayeri, N. (2008) “Design Secure and Application-Oriented

VANETs”, Proceedings of IEEE VTC’2008-Spring, Singapore.

Raya, M. and Hubaux, J., P. (2007), Securing vehicular ad hoc networks, Journal

of Computer Security, Vol. 15, No. 1, pp. 39-68.

Schoch, E., Kargl, F., Leinmuller, T., Schlott, S. and Papadimitratos, P. (2006),

Impact of Pseudonym Changes on Geographic Routing in VANETs, in Proc. of

the European Workshop on Security and Privacy in Ad hoc and Sensor Networks

(ESAS), pp. 43–57.

Seuwou, P. Patel, D. Protheroe, D. Ubakanma, G. (2012) “Effective security as

an ill-defined problem in vehicular ad hoc networks (VANETs)”, Road Transport

Information and control (RTIC 2012), IET and ITS Conference London. IEEE

[Online]. Available at http://ieeexplore.ieee.org/ (Accessed: 19 August 2013)

Singh, P., K., Lego, K., Tuithung, T. (2011) Network Centric Approach using

MOVE & Application Centric Approach using TraNS for protocols and safety in

VANET, International Journal of Research and Reviews in Computer

Science(IJRRCS), Vol. 2, No.1, pp. 104.

US DOT (2013) U.S. Department of Transportation Research and Innovative

Technology Administration Available at: http://www.its.dot.gov/index.htm/

(Accessed: 16 August 2013).

U.S. Department of Transportation (2010) Distracted Driving 2009, Traffic

Safety Facts Research Note, National Highway Traffic Safety Administration

Vehicular Ad hoc Network Applications and Security: A study into the Economic and the

Legal Implications

Retrieved from: http://www.distraction.gov/research/PDF-Files/Distracted-

Driving-2009.pdf (accessed: 18th August 2013)

Wang, Y. and Li, F. (2009) Vehicular Ad Hoc Networks, Guide To Wireless Ad

Hoc Networks, Computer Communications and Networks, pp 504.

Weimerskirch, A., Haas, J., J., Hu, Y., C. and Laberteaux, K., P. (2010) “Data

Security in Vehicular Communication Networks” VANET Vehicular

Applications and Inter-Networking Technologies

Zhang, Lei, Research on Security and Privacy on Vehicular ad hoc Networks.

[online].Retrieved from :

http://www.tesisenxarxa.net/TESIS_URV/AVAILABLE/TDX-1215110-

120259//tesi.pdf (accessed: 16th August 2013).