Publications
Fonseca, E.; Festag, A.; Baldessari, R.; Aguiar, R.
Support of Anonymity in VANETs – Putting Pseudonymity into Practice Proceedings Article
In: IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, 2007.
Abstract | Links | BibTeX | Tags: security, V2X communication
@inproceedings{Fonseca:WCNC:2007,
title = {Support of Anonymity in VANETs – Putting Pseudonymity into Practice},
author = {E. Fonseca and A. Festag and R. Baldessari and R. Aguiar},
url = {https://ieeexplore.ieee.org/document/4224870},
doi = {10.1109/WCNC.2007.625},
year = {2007},
date = {2007-03-11},
urldate = {2007-06-04},
booktitle = {IEEE Wireless Communications and Networking Conference (WCNC)},
address = {Hong Kong},
abstract = {Despite great advantages of vehicular ad hoc networks (VANETs), they also introduce challenges with respect to security and privacy. Today, people are more and more concerned about their privacy. Using unique identifiers for communication, a vehicle can easily be located and tracked. Alternatively, a technical solution to protect drivers' privacy is the use of changing pseudonyms. Existing work mainly focuses on algorithms for pseudonym change and neglect practical implications and realizability. For deployment and integration of pseudonymity into a VANET communication system, several issues need to be solved. This paper analyzes the practical challenges and proposes protocol- and implementation-related solutions necessary to turn pseudonymity support into practice. Finally, the paper concludes by means of analysis and measurements that the burden of pseudonymity can be alleviated at reasonable costs and compromises in anonymity support.},
keywords = {security, V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Armknecht, F.; Festag, A.; Westhoff, D.; Zeng, K.
Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication Proceedings Article
In: 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern Switzerland, 2007.
Abstract | Links | BibTeX | Tags: security, V2X communication
@inproceedings{Armknecht:WMAN:2007,
title = {Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication},
author = {F. Armknecht and A. Festag and D. Westhoff and K. Zeng},
url = {https://festag-net.de/wp-content/uploads/2007_Armknecht_WMAN.pdf},
year = {2007},
date = {2007-03-01},
urldate = {2007-03-01},
booktitle = {4th Workshop on Mobile Ad-Hoc Networks (WMAN)},
address = {Bern Switzerland},
abstract = {We propose a security architecture that provides two fundamental security services for VANETs: i) non-repudiation and ii) privacy enhancement. Due to a new PKI concept, referred to as PKI+, users are autonomous in deriving public keys, certificates and pseudonyms which minimizes the communication to the certificate authority. Security techniques are supported on all layers of the protocol stack. In particular we show how to link the PKI+ concepts to solutions for routing in vehicle-to-vehicle and vehicle-to-infrastructure communication.},
keywords = {security, V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Festag, A.; Baldessari, R.
Internet Access for Vehicular Communication – A Two-Stage Approach with Public Hot-Spots and Dedicated Road-Side Units Proceedings Article
In: ITS World Congress and Exhibition, London, UK, 2006.
Abstract | Links | BibTeX | Tags: mobile communication, V2X communication
@inproceedings{Festag:ITSWC:2006,
title = {Internet Access for Vehicular Communication – A Two-Stage Approach with Public Hot-Spots and Dedicated Road-Side Units},
author = {A. Festag and R. Baldessari},
url = {https://festag-net.de/wp-content/uploads/2006_Festag_ITSWC.pdf},
year = {2006},
date = {2006-10-08},
urldate = {2006-10-08},
booktitle = {ITS World Congress and Exhibition},
address = {London, UK},
abstract = {Communication capabilities in future vehicles and a road-side infrastructure, deploying wireless LAN IEEE 802.11 technology, are expected to provide Internet access for drivers and passengers. This paper analyzes two approaches for Internet access with respect to its technical deployability in vehicular scenarios: With increasing proliferation of WIFI hots spots, access points at public places can be reused in scenarios with low mobility. Alternatively, road-side units mainly dedicated to road safety, can be enhanced to provide Internet connectivity as an additional service. Judging the merits of public hot spots and dedicated road-side units we propose an integrated solution and discuss technical issues for their deployment. Experiments in a real-world environment demonstrate the feasibility of vehicular Internet access.},
keywords = {mobile communication, V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Leiggener, A.; Schmitz, R.; Festag, A.; Eggert, L.; Effelsberg, W.
Analysis of Path Characteristics and Transport Protocol Design in Vehicular Ad Hoc Networks Proceedings Article
In: IEEE Vehicular Technology Conference (VTC), Melbourne, VIC, Australia, 2006.
Abstract | Links | BibTeX | Tags: V2X communication
@inproceedings{Leiggener:VTC:2006,
title = {Analysis of Path Characteristics and Transport Protocol Design in Vehicular Ad Hoc Networks},
author = {A. Leiggener and R. Schmitz and A. Festag and L. Eggert and W. Effelsberg},
url = {https://ieeexplore.ieee.org/document/1682880},
doi = {10.1109/VETECS.2006.1682880},
year = {2006},
date = {2006-05-07},
urldate = {2006-05-07},
booktitle = {IEEE Vehicular Technology Conference (VTC)},
address = {Melbourne, VIC, Australia},
abstract = {Vehicular ad hoc networks (VANETs) enable new applications by providing self-organizing vehicle-to-vehicle and vehicle-to-roadside communication. Some of these applications require reliable, in-order data delivery across end-to-end connections. The performance of a vehicular transport protocol (VTP) that provides such a service depends on its ability to adapt quickly to the varying path characteristics of highly dynamic environments. This paper studies path characteristics of VANETs in highway scenarios. An analytical evaluation derives upper bounds on the expected connectivity and disruption duration. Simulations validate these results and study further metrics, such as packet loss, packet reordering and round trip times. The paper also briefly outlines a preliminary VTP design that incorporates these analytical results.},
keywords = {V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Torrent-Moreno, M.; Festag, A.; Hartenstein, H.
System Design for Information Dissemination in VANETs Proceedings Article
In: International Workshop on Intelligent Transportation (WIT), pp. 27 –33, Hamburg, Germany, 2006.
Abstract | Links | BibTeX | Tags: V2X communication
@inproceedings{Torrent-Moreno:WIT:2006,
title = {System Design for Information Dissemination in VANETs},
author = {M. Torrent-Moreno and A. Festag and H. Hartenstein},
url = {https://festag-net.de/wp-content/uploads/2006_TorrentMoreno_WIT.pdf},
year = {2006},
date = {2006-03-14},
urldate = {2006-03-14},
booktitle = {International Workshop on Intelligent Transportation (WIT)},
pages = {27 –33},
address = {Hamburg, Germany},
abstract = {In the architectural design of a communication technology the assignment of responsibilities to its different modules or layers is a key issue. The modularization and assignment of functions to modules has a strong impact on the system performance. In this paper, we address data forwarding as a key responsibility of a VANET's (Vehicular Ad hoc NETwork) communication device. More specifically, we discuss two different approaches, packet-centric forwarding (PCF) and information-centric forwarding (ICF), both aimed to disseminate information in a VANET environment. Basically, assuming a layered protocol design adapted to VANETs, it is argued where and how functions related to node connectivity and data transport could be implemented. Discussing pros and cons of ICF and PCF, we define a modular information-based architecture with a hybrid approach for dissemination of safety information where: i) information forwarding responsibilities reside in the application protocol layer(s) and exploit the applications' capability of information modification, aggregation, and invalidation, ii) packet forwarding functionalities are implemented in the network protocol layer to rapidly disseminate information of very high priority (safety-of-life), and iii) low-cost nodes incapable of processing safety-related information, can be used to increase network connectivity.},
keywords = {V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Aijaz, A.; Bochow, B.; Dötzer, F.; Festag, A.; Gerlach, M.; Leinmüller, T.; Schäfer, M.
Attacks on Inter Vehicle Communication Systems – an Analysis Proceedings Article
In: International Workshop on Intelligent Transportation (WIT), pp. 189–194, Hamburg, Germany, 2006.
Abstract | Links | BibTeX | Tags: security, V2X communication
@inproceedings{Aijaz:WIT:2006,
title = {Attacks on Inter Vehicle Communication Systems – an Analysis},
author = {A. Aijaz and B. Bochow and F. Dötzer and A. Festag and M. Gerlach and T. Leinmüller and M. Schäfer},
url = {https://festag-net.de/wp-content/uploads/2006_Aijaz_WIT.pdf},
year = {2006},
date = {2006-03-14},
urldate = {2006-03-14},
booktitle = {International Workshop on Intelligent Transportation (WIT)},
pages = {189–194},
address = {Hamburg, Germany},
abstract = {Inter-vehicle communication systems are a new paradigm of networking. Largely related to mobile ad hoc networks and their distributed, self-organizing structure, they also introduce new threats. In order to assess these threats we introduce a model of attacks on an inter-vehicle communication system in this paper. This model is used to refine the system model of the NoW communication system and to find potential weaknesses during the specification phase of the NoW communication system. Our work shows that there are several interesting new challenges requiring novel solutions, some of which are outlined at the end of this paper. Although this is still work in progress, it is the foundation for analysis and assessment of future work. As one of the main results of this paper, we identified several difficult to detect attacks on the hard- and software, and on the sensor input. We further point out system requirements to thwart such attacks.},
keywords = {security, V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Baldessari, R.; Festag, A.; Matos, A.; Santos, J.; Aguiar, R.
Flexible Connectivity Management in Vehicular Communication Networks Proceedings Article
In: International Workshop on Intelligent Transportation (WIT), pp. 211–216, Hamburg, Germany, 2006.
Abstract | Links | BibTeX | Tags: V2X communication
@inproceedings{Baldessari:WIT:2006,
title = {Flexible Connectivity Management in Vehicular Communication Networks},
author = {R. Baldessari and A. Festag and A. Matos and J. Santos and R. Aguiar},
url = {https://festag-net.de/wp-content/uploads/2006_Baldessari_WIT.pdf},
year = {2006},
date = {2006-03-14},
urldate = {2006-03-14},
booktitle = {International Workshop on Intelligent Transportation (WIT)},
pages = {211–216},
address = {Hamburg, Germany},
abstract = {Vehicular communication, providing vehicle-to-vehicle and vehicle-to-roadside communication, can considerably improve traffic safety and comfort of driving and traveling. For communication in vehicular ad hoc networks, position-based routing has emerged as a promising candidate. For Internet access, Mobile IPv6 is a widely accepted solution to provide session continuity and reachability to the Internet for mobile nodes. While integrated solutions for usage of Mobile IPv6 in (non-vehicular) mobile ad hoc networks exist, we propose a solution that, built upon on a Mobile IPv6 proxy-based architecture, selects the optimal communication mode (direct in-vehicle, vehicle-to-vehicle, and vehicle-to-roadside communication) and provides dynamic switching between vehicle-to-vehicle and vehicle-to-roadside communication mode during a communication session in case that more than one communication mode is simultaneously available.},
keywords = {V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Festag, A.
Wifi für Autos Journal Article
In: Funkschau, no. 13, pp. 45-46, 2005.
Links | BibTeX | Tags: V2X communication
@article{Festag:Funkschau:2005,
title = {Wifi für Autos},
author = {A. Festag},
url = {https://festag-net.de/wp-content/uploads/2005_Festag_Funkschau.pdf},
year = {2005},
date = {2005-07-01},
urldate = {2005-07-01},
journal = {Funkschau},
number = {13},
pages = {45-46},
keywords = {V2X communication},
pubstate = {published},
tppubtype = {article}
}
Füßler, H.; Möske, M.; Hartenstein, H.; Franz, W.; Festag, A.; Wagner, C.
A Position-Based Router: Design, Implementation and Measurements Book Section
In: Franz, W.; Hartenstein, H.; Mauve, M. (Ed.): Inter-Vehicle Communication Based on Ad Hoc Networking Principles, The FleetNet Project, pp. 145-173, Universitätsverlag Karlsruhe, Karlsruhe, 2005, ISBN: 3-937300-88-0.
Links | BibTeX | Tags: V2X communication
@incollection{Fuessler:FleetNet:2005,
title = {A Position-Based Router: Design, Implementation and Measurements},
author = {H. Füßler and M. Möske and H. Hartenstein and W. Franz and A. Festag and C. Wagner},
editor = {W. Franz and H. Hartenstein and M. Mauve},
url = {https://d-nb.info/978097661/34},
isbn = {3-937300-88-0},
year = {2005},
date = {2005-06-01},
urldate = {2005-06-01},
booktitle = {Inter-Vehicle Communication Based on Ad Hoc Networking Principles, The FleetNet Project},
pages = {145-173},
publisher = {Universitätsverlag Karlsruhe},
address = {Karlsruhe},
keywords = {V2X communication},
pubstate = {published},
tppubtype = {incollection}
}
Füßler, H.; Torrent-Moreno, M.; Transier, M.; Festag, A.; Hartenstein, H.
Thoughts on a Protocol Architecture for Vehicular Ad-hoc Networks Proceedings Article
In: International Workshop on Intelligent Transportation (WIT), Hamburg, Germany, 2005.
Abstract | Links | BibTeX | Tags: V2X communication
@inproceedings{Fuessler:WIT:2005,
title = {Thoughts on a Protocol Architecture for Vehicular Ad-hoc Networks},
author = {H. Füßler and M. Torrent-Moreno and M. Transier and A. Festag and H. Hartenstein},
url = {https://festag-net.de/wp-content/uploads/2005_Fuessler_WIT.pdf},
year = {2005},
date = {2005-03-01},
urldate = {2005-03-01},
booktitle = {International Workshop on Intelligent Transportation (WIT)},
address = {Hamburg, Germany},
abstract = {In comparison to other communication networks, Vehicular Ad-hoc Networks (VANETs) have unique requirements with respect to applications, types of communication, self-organization and other issues. In order to meet these requirements, the structuring of functionalities into protocols and their interaction must be re-thought. The traditional approach of decomposition of functionality into protocol layers (layered approach) and a protocol design specifically tailored to the needs of VANETs (un-layered approach) leads to two extreme and opposed manifestations of a potential VANET protocol architecture. From these two extreme approaches we derive a stack-based VANET protocol architecture that combines the strengths of both. Among the key features of this protocol architecture are VANET-specific protocol layers, a staircase approach for interaction among layers, and the use of an information connector for the exchange of cross-layer information using the publisher/subscriber pattern. This protocol architecture provides a clear modular structure with flexibility for protocol interaction and information exchange at a reasonable complexity.},
keywords = {V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Festag, A.; Füßler, H.; Hartenstein, H.; Sarma, A.; Schmitz, R.
FleetNet: Bringing Car-to-Car Communication into the Real World Proceedings Article
In: ITS World Congress and Exhibition, Nagoya, Japan, 2004.
Abstract | Links | BibTeX | Tags: V2X communication
@inproceedings{Festag:ITSWC:2004,
title = {FleetNet: Bringing Car-to-Car Communication into the Real World},
author = {A. Festag and H. Füßler and H. Hartenstein and A. Sarma and R. Schmitz},
url = {https://festag-net.de/wp-content/uploads/2004_Festag_ITSWC.pdf},
year = {2004},
date = {2004-10-18},
urldate = {2004-10-18},
booktitle = {ITS World Congress and Exhibition},
address = {Nagoya, Japan},
abstract = {Car-to-car communication by means of wireless technology shows a strong potential to enhance both safety and comfort of road users. The necessity to reach cars beyond the transmission range of the own radio creates the challenge to find algorithms to efficiently forward packets. In these so-called vehicular ad hoc networks, position information has been identified as a crucial component that alleviates some of the limitations of existing topology-based protocols. Thus, we see the use of positional information at the core of a car-to-car communication system that provides advanced applications for active safety, distributed floating car data, as well as user communication and information. A major thrust to leverage a car-to-car communication platform was provided by the FleetNet project, partly funded by the German Ministry of Education and Research BMBF and led by Daimler Chrysler AG. Based on ad-hoc networking principles and the availability of position information, the project developed suitable communication concepts. In addition to simulation studies, a prototype communication and application system was implemented and deployed, embedding safety and convenience applications. With car-based real world field trials successfully conducted, first results and experiences look promising.},
keywords = {V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}
Festag, A.; Girao, J.; Melia, T.; Westhoff, D.
On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols Proceedings Article
In: vonKnop, J.; Haverkamp, W.; Jessen, E. (Ed.): DFN-Arbeitstagung über Kommunikationsnetze, pp. 61-76, Gesellschaft für Informatik e.V., Düsseldorf, Germany, 2004.
Abstract | Links | BibTeX | Tags: security, V2X communication
@inproceedings{Festag:DFNArbeitstagung:2004,
title = {On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols},
author = {A. Festag and J. Girao and T. Melia and D. Westhoff},
editor = {J. vonKnop and W. Haverkamp and E. Jessen},
url = {https://festag-net.de/wp-content/uploads/2004_Festag_DFNArbeitstagung.pdf},
year = {2004},
date = {2004-06-01},
urldate = {2004-06-01},
booktitle = {DFN-Arbeitstagung über Kommunikationsnetze},
pages = {61-76},
publisher = {Gesellschaft für Informatik e.V.},
address = {Düsseldorf, Germany},
abstract = {Recently, a number of approaches proposing various security aspects for routing protocols in mobile ad hoc networks have been proposed. In this work we do not introduce another proposal aiming at security in the context of ad hoc networks. Instead, we argue from a generalized view and answer the question: what security objectives are in principle achievable and what security features are not achievable at all, even when using unacceptable heavy weighted security features. Our contribution in this work is to derive from the available security mechanisms and from a reasonable ad hoc network specific attacker model a set of theoretically achievable security objectives. In particular we will also denote the majority of non practically achievable security objectives.},
keywords = {security, V2X communication},
pubstate = {published},
tppubtype = {inproceedings}
}