SECURITY AND COMMUNICATION NETWORKS
Security Comm. Networks 2011; 4:771–784
Published online 8 February 2011 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.266
SPECIAL ISSUE PAPER
RAMV: ensuring resource-aware message verification
in VANETs
Zhengming Li
*,†
and Chunxiao Chigan
‡
Department of ECE, Michigan Technological University, MI, U.S.A.
ABSTRACT
Driven by road safety applications and commercial applications, verification of messages’ content integrity and authenticity
in vehicular ad hoc networks (VANETs) is indispensable. However, due to numerous message exchanges in VANETs,
message verification often leads to excessive resource consumption and even resource depletion in vehicular nodes. To
tackle the scalability issue, a novel resource-aware message verification (RAMV) scheme is proposed in this paper. With
application specific differentiation of the messages to better support road safety applications, RAMV streamlines the
existing message verification schemes to keep their resource consumption within the preset resource budget. Meanwhile,
the common security requirements for message verification are all properly met by RAMV. Enabling resource-aware,
safety-upholding, and secure message verification, RAMV is especially appealing to the forthcoming massive deployment
of VANETs. Copyright © 2011 John Wiley & Sons, Ltd.
KEYWORDS
VANET; message verification; resource consumption
*
Correspondence
Chunxiao Chigan, Department of ECE, Michigan Technological University, MI, U.S.A.
E-mail: cchigan@mtu.edu
†
Zhengming Li is a PhD candidate with ECE Department of Michigan Technological University. His research interest is mainly focused
on security provisioning and privacy protection in VANETs.
‡
Chunxiao Chigan is currently an associate professor with ECE Department of Michigan Technological University. Her research interest
includes message dissemination and security provisioning in VANETs, as well as cognitive radio networking and its security.
1. INTRODUCTION
Nowadays Vehicular Ad Hoc Networks (VANETs) open the
door to numerous promising applications for road safety,
driving convenience and commercial activities. On the other
hand, the application significance of VANETs imposes
severe security challenges[1], including privacy, message
authenticity, message integrity, node non-repudiation, etc.
Among them, message authenticity requires that each mes-
sage contains valid content, which is critical to various
VANET (especially road safety) applications. Message
integrity requires that each message can be proved to be gen-
erated by the claimed source, which is useful for the liability
scenarios. Thus, content verification and source verification,
two forms of message verification, are critical to VANETs to
ensure message authenticity and message integrity, respec-
tively. Regardless of the implementation details, message
verification, especially source verification which relies on
digital signature verification, is surely resource demanding.
In VANETs, message verification threatens varying and
excessive resource consumption in face of the massive mes-
sage exchanges. Such massive message exchanges result
from the periodic messages broadcasted by each node
to support road safety applications (Beacons) and other
applications (neighbor information for proactive routing[2],
information abstract in epidemic routing[3], or simplistic
message flooding[4]). Each node thus needs to receive and
verify numerous messages per second, the exact number
of which changes linearly with the node density in the
neighborhood. The resource consumed by message veri-
fication, given any algorithms adopted, tends to be huge
and will make message verification non-scalable. Moreover,
the variances in resource consumption will also negatively
affect the resource available to other VANET applications.
Thus, it is desirable to make message verification in each
node resource-aware, in that its resource consumption in
any circumstances will be bounded by the actual resource
available to message verification, in form of resource bud-
get. For brevity, this paper only explicitly considers the
verification of Beacons, which, periodically broadcasted by
each node to signal the driving status, may be the most
prevalent messages in VANETs.
Copyright © 2011 John Wiley & Sons, Ltd. 771