Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elmar Schoch is active.

Publication


Featured researches published by Elmar Schoch.


IEEE Communications Magazine | 2008

Communication patterns in VANETs

Elmar Schoch; Frank Kargl; Matthias Weber; T. Leinmuller

Vehicular networks are a very promising technology to increase traffic safety and efficiency, and to enable numerous other applications in the domain of vehicular communication. Proposed applications for VANETs have very diverse properties and often require nonstandard communication protocols. Moreover, the dynamics of the network due to vehicle movement further complicates the design of an appropriate comprehensive communication system. In this article we collect and categorize envisioned applications from various sources and classify the unique network characteristics of vehicular networks. Based on this analysis, we propose five distinct communication patterns that form the basis of almost all VANET applications. Both the analysis and the communication patterns shall deepen the understanding of VANETs and simplify further development of VANET communication systems.


IEEE Communications Magazine | 2008

Secure vehicular communication systems: implementation, performance, and research challenges

Frank Kargl; Panagiotis Papadimitratos; Levente Buttyán; Michael Müter; Elmar Schoch; Björn Wiedersheim; Ta Vinh Thong; Giorgio Calandriello; Albert Held; Antonio Kung; Jean-Pierre Hubaux

Vehicular communication systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently. In order to show the feasibility of secure VC, certain implementations are required. we discuss the design of a VC security system that has emerged as a result of the European SeVe-Com project. In this second article we discuss various issues related to the implementation and deployment aspects of secure VC systems. Moreover, we provide an outlook on open security research issues that will arise as VC systems develop from todays simple prototypes to full-fledged systems.


IEEE Network | 2010

Exploration of adaptive beaconing for efficient intervehicle safety communication

Robert Karl Schmidt; Tim Leinmüller; Elmar Schoch; Frank Kargl; Günter Schäfer

In the future intervehicle communication will make driving safer, easier, and more comfortable. As a cornerstone of the system, vehicles need to be aware of other vehicles in the vicinity. This cooperative awareness is achieved by beaconing, the exchange of periodic single-hop broadcast messages that include data on the status of a vehicle. While the concept of beaconing has been developed in the first phase of research on VANETs, recent studies have revealed limitations with respect to network performance. Obviously, the frequency of beacon messages directly translates into accuracy of cooperative awareness and thus traffic safety. There is an indisputable trade-off between required bandwidth and achieved accuracy. In this work we analyze this trade-off from different perspectives considering the consequences for safety applications. As a solution to the problem of overloading the channel, we propose to control the offered load by adjusting the beacon frequency dynamically to the current traffic situation while maintaining appropriate accuracy. To find an optimal adaptation, we elaborate on several options that arise when determining the beacon frequency. As a result, we propose situation-adaptive beaconing. It depends on the vehicles own movement and the movement of surrounding vehicles, macroscopic aspects like the current vehicle density, or microscopic aspects.


IEEE Wireless Communications | 2006

POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS

Tim Leinmüller; Elmar Schoch; Frank Kargl

Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs, these so-called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security. In this work, we first analyze the problems that may arise from falsified position data. Then, in order to lessen these problems, we propose detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons. In contrast to other position verification approaches, our solution does not rely on special hardware or dedicated infrastructure. Evaluation based on simulations shows that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating


ad hoc networks | 2005

Abiding geocast: time--stable geocast for ad hoc networks

Christian Maihöfer; Tim Leinmüller; Elmar Schoch

Abiding geocast is a time stable geocast delivered to all nodes that are inside a destination region within a certain period of time. Services like position--based advertising, position--based publish--and--subscribe, and many other location--based services profit from abiding geocast. For vehicular ad hoc networks, abiding geocast allows realization of information and safety applications like virtual warning signs. Similar to real traffic or warning signs, they are attached to a certain geographical position or area. When a vehicle enters such an area, the virtual warning sign is displayed for the driver.This paper discusses the design space, the semantics, and three reasonable approaches for abiding geocast in an ad hoc network. The first one is a server solution to store the messages. The second approach stores the messages at an elected node inside the geocast destination region that temporarily acts as a server. The last one complements the exchange of neighbor information necessary for many unicast routing protocols with abiding geocast information.We compare the proposed protocols with a probabilistic network load and delivery success ratio analysis. The results show that the approaches with local message storage cause less network load. However, we also observed that in some cases the delivery success ratio of the approaches with local message storage is lower.


security of ad hoc and sensor networks | 2006

Impact of pseudonym changes on geographic routing in VANETs

Elmar Schoch; Frank Kargl; Tim Leinmüller; Stefan Schlott; Panagiotis Papadimitratos

Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and privacy are crucial factors for successful deployment. In a scenario, where each vehicle would have a unique identifier, eavesdroppers could easily accumulate location profiles. As a solution approach, several authors suggest using changeable pseudonyms as temporary vehicle identifiers. If a vehicle changes its pseudonym from time to time, long-term tracking can be avoided. However, as we show in this paper, changing identifiers has detrimental effects on routing efficiency and increases packet loss. So, designers of VANET systems need to aim for a balance between privacy protection on the one and performance on the other hand. The results of this paper provide advise on how to achieve this balance.


wireless network security | 2010

On the efficiency of secure beaconing in VANETs

Elmar Schoch; Frank Kargl

Direct inter-vehicle communication enables numerous safety applications like intersection collision warning. Beacons - periodic one-hop link-layer broadcast messages containing, e.g., location, heading, and speed - are the basis for many such applications. For security, current work often requires all messages to be signed and to carry a certificate to ensure integrity and authenticity. However, high beacon frequency of 1 - 10 Hz and dense traffic situations lead to significant communication and computational overhead. In this paper, we propose several mechanisms to significantly reduce this overhead while maintaining a comparable level of security. The general idea is to omit signatures, certificates, or certificate verification in situations where they are not necessarily required. This creates a security-performance trade-off that we analyze in detail. The results show that significant savings can be achieved with only small impact on security.


IEEE Network | 2010

Resilient secure aggregation for vehicular networks

Stefan Dietzel; Elmar Schoch; Bastian Könings; Michael Weber; Frank Kargl

Innovative ways to use ad hoc networking between vehicles are an active research topic and numerous proposals have been made for applications that make use of it. Due to the bandwidth-limited wireless communication medium, scalability is one crucial factor for the success of these future protocols. Data aggregation is one solution to accomplish such scalability. The goal of aggregation is to semantically combine information and only disseminate this combined information in larger regions. However, the integrity of aggregated information cannot be easily verified anymore. Thus, attacks are possible resulting in lower user acceptance of applications using aggregation or, even worse, in accidents due to false information crafted by a malicious user. Therefore, it is necessary to design novel mechanisms to protect aggregation techniques. However, high vehicle mobility, as well as tight bandwidth constraints, pose strong requirements on the efficiency of such mechanisms. We present new security mechanisms for semantic data aggregation that are suitable for use in vehicular ad hoc networks. Resilience against both malicious users of the system and wrong information due to faulty sensors are taken into consideration. The presented mechanisms are evaluated with respect to their bandwidth overhead and their effectiveness against possible attacks.


international workshop on vehicular inter-networking | 2008

Secure and efficient beaconing for vehicular networks

Frank Kargl; Elmar Schoch; Björn Wiedersheim; Tim Leinmüller

The basis for many VANET applications are periodic beacons carrying information like location, heading and speed. In order to secure beaconing, messages should be signed and carry a certificate to attest valid network participants. In order to reduce the significant communication and computational overhead created by this, we propose to skip signatures or certificates in certain situations.


global communications conference | 2008

Modeling Roadside Attacker Behavior in VANETs

Tim Leinmüller; Robert Karl Schmidt; Elmar Schoch; Albert Held; Günter Schäfer

Communication using VANETs is commonly seen as the next milestone for improving traffic safety. Vehicles will be enabled to exchange any kind of information that helps to detect and mitigate dangerous situations. Security research in the past years has shown that VANETs are endangered by a plethora of severe security risk. Subject of this work is the modeling of attackers that target active safety applications in VANETs. Through a risk analysis, this work identifies assets, threats and potential attacks in inter-vehicle communication. The risk analysis shows that the most serious threat arises from a quasi-stationary (road-side) attacker that distributed forged warning messages. This attacker is discussed more deeply. We show the degrees of freedom that are available for position forging and find thereby two attacks that demand attention: single position forging having low effort compared to sophisticated movement path forging having a potentially high influence on road traffic safety.

Collaboration


Dive into the Elmar Schoch's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Levente Buttyán

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge