Literature Database Entry


Michael Feiri, "Scalable Broadcast Authentication for V2V Communication," PhD Thesis (Dissertation), Centre for Telematics and Information Technology, University of Twente, October 2016. (Advisors: Frank Kargl and Jonathan Petit; Referees: Falko Dressler and Robert Schmidt)


Vehicular Ad Hoc Networking (VANET) technology is, at it's core, the simple idea of outfitting vehicles with wireless data communication equipment for automatic information exchange. This technology is expected to serve as a foundation for a set of novel safety, automation, and infotainment applications. The most prominent among these applications are expected to be driver assistance systems which also support advanced levels of automated driving. These applications stand to benefit from enhanced situational awareness, which is made possible through the cooperative exchange of information about environmental influences and the presence and condition of surrounding vehicles. Wireless networking technology and networking in general are well understood domains in computer science. However, the context of connected vehicles and the associated requirements and communication patterns imposes a set of unique challenges, which require solutions that differ from established networking practices. The susceptibility of wireless communication to packet loss and the very high mobility of vehicular communication nodes make VANET technology extremely volatile. At the same time the usage in safety critical applications demands very low latency and high availability of the communication infrastructure for frequent information exchange. And on top of these challenges security and privacy need taken into account in the design of the overall communication infrastructure. Classic solutions for stable networks cannot provide optimal performance characteristics under these conditions. The focus of this work is specifically on vehicle-to-vehicle technology (V2V), which is a subset of the more general vehicle-to-anything (V2X) topic. This subset of VANET is concerned with the direct information exchange among vehicles without the involvement of additional infrastructure, which may or may not be available to vehicles which driving. Direct V2V communication is expected to always be available between vehicle within a safety critical range. Therefore, this communication path is expected to be used to enable the most safety critical applications. The scalability of security solutions for vehicular communication remains an untested aspect of ongoing efforts to bring VANET technology to the market on a larger scale. Filed operational test projects have started to trial VANET deployments to investigate, but penetration rates are too low to allow for realistic extrapolations of future scalability problems. This dissertations contributes to the research efforts that sup- port the development of secure vehicular communication technology through investigations of attributes and solutions for scalable security for V2V broadcast communication. Part II reviews security requirements and provides detailed quantifications of performance requirements for security in V2V broadcast communication. These requirements define the solution space for applicable broadcast authentication techniques. Additionally, the review of achievable security and privacy goals enables informed trade-offs between security and privacy in the context of effective and efficient pseudonymity schemes. Finally, an information flow analysis shows the broader need to consider attacker models beyond the classic network oriented view, in order to capture the full spectrum of the threat landscape for connected vehicle technology. Part III contributes a study of hardware assisted scalability solutions for the relevant cryptographic algorithms in V2V broadcast authentication. This specifically concerns the performance characteristics of dedicated hardware security modules and the feasibility of reaching sufficient performance levels to satisfy the requirements of the expected communication patterns in vehicular environments. A second contribution under the topic of hardware assisted scalability solutions is a novel storage systems for pseudonymous identities. An application of Physically Inclinable Functions (PUF) allows for very efficient and secure storage of large sets of private key material, as it is expected to be used for privacy protection on vehicular communication. Part IV contributes detailed simulation studies of the costs and benefits of in-line certificate management in the V2V communication channel with a focus on scalability. The increased communication load due to the inclusion of certificate material can cause availability problems in highly congested situations. Proposals for certificate omission schemes exist, but do not sufficiently take scalability in extremely congested situations into account. A novel congestion-based certificate omission scheme is proposed and evaluated in simulation studies. Additionally, a novel certificate pre-distribution approach is proposed, which is permissible under the assumptions of achievable privacy and can offer enhanced availability during privacy preserving pseudonym changes.

Quick access

BibTeX BibTeX


Michael Feiri

BibTeX reference

    author = {Feiri, Michael},
    referee = {Dressler, Falko and Schmidt, Robert},
    advisor = {Kargl, Frank and Petit, Jonathan},
    title = {{Scalable Broadcast Authentication for V2V Communication}},
    institution = {Centre for Telematics and Information Technology},
    year = {2016},
    month = {October},
    location = {Enschede, The Netherlands},
    school = {University of Twente},
    type = {PhD Thesis (Dissertation)},

Copyright notice

Links to final or draft versions of papers are presented here to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or distributed for commercial purposes without the explicit permission of the copyright holder.

The following applies to all papers listed above that have IEEE copyrights: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

The following applies to all papers listed above that are in submission to IEEE conference/workshop proceedings or journals: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.

The following applies to all papers listed above that have ACM copyrights: ACM COPYRIGHT NOTICE. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or

The following applies to all SpringerLink papers listed above that have Springer Science+Business Media copyrights: The original publication is available at

This page was automatically generated using BibDB and bib2web.