Report on the "secure vehicular communications: results and challenges ahead" workshop

Panagiotis Papadimitratos, Jean-Pierre Hubaux
2008 ACM SIGMOBILE Mobile Computing and Communications Review  
The Workshop on Secure Vehicular Communications: Results and Challenges Ahead took place in February 20-21, 2008, on the EPFL campus, Lausanne, Switzerland. The event brought together experts, from a variety of organizations, working on vehicular communication systems, security and privacy. The fourteen presentations offered an overview of the latest results and reflected the views of public authorities, academia, and industry. During the one and a half days of the workshop, the thirty-five
more » ... ndees had the opportunity to have an in-depth discussion on future research and development directions for vehicular communication systems security and privacy. The developments in the area of vehicular networks and communication systems, and the increasing attention from industry, academia and authorities, motivated us to organize this workshop. Vehicular communications (VC), including vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication, with the latter leading to vehicular ad hoc networks (VANETs), lie at the core of a number of research initiatives. They aim to enhance transportation safety and efficiency, with applications that provide, for example, warnings about environmental hazards (e.g., ice on the pavement), traffic and road conditions (e.g., emergency braking, congestion, or construction sites), and local (e.g., tourist) information. Nonetheless, the unique features of VC are a double-edged sword: the rich set of tools they offer make possible a formidable set of abuses and attacks. Consider any wireless-enabled device that runs a rogue version of the vehicular communication protocol stack and injects forged messages or meaningfully modifies messages transmitted by vehicle onboard communication units; or a vehicle that forges messages in order to masquerade an emergency vehicle and mislead other vehicles to slow down and yield. Furthermore, it is possible for the vehicles and their sensing, processing, and communication platforms to be compromised. Worse even, it is not difficult to consider a node could 'contaminate' large portions of the vehicular network with false information: for
doi:10.1145/1394555.1394567 fatcat:dm3n5y2zdbhflcewysxaalhs6m