Wireless communications are increasingly-often selected as a cable replacement for on-board vehicular networks. When a wireless technology implements safety critical application, cryptographic countermeasures are required. This paper describes the impact of security on intra-vehicular communication in a real tunnel scenario, e.g. for urban transit or mining vehicles where the usage of security is mandatory in order to maintain the system safety. The measurement campaign was carried out in a sport ski-tunnel using commercial off-the-shelf (COTS) Wi-Fi modules. The objective was to understand the impact of overhead on security in a tunnel considering line-of-sight (LOS) and non-LOS (NLOS) scenarios. In addition, the study compared different solutions for security to evaluating lesser known protocols. These field trials showed that wireless security is feasible up to 300 m in NLOS without repeaters. Finally, the experiment presented confirms the effectiveness of the Host Identity Protocol when used as standalone or in combination with other security solution. © 2013 IEEE.

Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario

Soderi S.;
2013-01-01

Abstract

Wireless communications are increasingly-often selected as a cable replacement for on-board vehicular networks. When a wireless technology implements safety critical application, cryptographic countermeasures are required. This paper describes the impact of security on intra-vehicular communication in a real tunnel scenario, e.g. for urban transit or mining vehicles where the usage of security is mandatory in order to maintain the system safety. The measurement campaign was carried out in a sport ski-tunnel using commercial off-the-shelf (COTS) Wi-Fi modules. The objective was to understand the impact of overhead on security in a tunnel considering line-of-sight (LOS) and non-LOS (NLOS) scenarios. In addition, the study compared different solutions for security to evaluating lesser known protocols. These field trials showed that wireless security is feasible up to 300 m in NLOS without repeaters. Finally, the experiment presented confirms the effectiveness of the Host Identity Protocol when used as standalone or in combination with other security solution. © 2013 IEEE.
2013
978-1-4799-0846-2
HIP
Security
Tunnel
Vehicle
Wireless
File in questo prodotto:
File Dimensione Formato  
06685559.pdf

non disponibili

Tipologia: Versione Editoriale (PDF)
Licenza: Nessuna licenza
Dimensione 754.56 kB
Formato Adobe PDF
754.56 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11771/15705
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
social impact