allow an automated toll process where the vehicles
can proceed without stopping to pay at the
tollbooths. Theses system consist of three basic
parts: the automatic vehicle classification based on
sensors that count the number of axles, the automatic
vehicle identification which uses RFID tags, and the
violation enforcement where cameras are used to
identify evaders.
The distance between the overhead antenna in
the ETC facility and the tag of the vehicle is around
a few meters and, thus the operating frequencies for
these applications are usually UHF or microwave
(Europe EN 300 440). .
For instance EZ-Pass on the east coast of the
United States, Fast-Track on the east coast and
SunPass in Florida, use active UHF RFID tags for
vehicle identification. As mentioned, the batteries of
these active tags need to be replaced after one or two
years. Although these active tags are not power
constrained and probable secure cryptographic
solutions could be implemented, some researches
have proved that these tags provide little or not
security (Green, 2008).
Other uses of RFID tags in relation to the
vehicles but not so much to the traffic is the use of
cards to pay in gas stations and as vehicle anti-theft
systems (immobilizer). These cards work usually in
HF and provides high standard of security. However,
there have also been famous cases of attacks; e.g. the
security of the DST (Digital Signature Transponder)
manufactured by Texas Instrument, with key lengths
of only 40 bits, and used by millions of customers
was defeated by performing reverse engineering and
key cracking (Bono, 2005).
3 RFID IN FUTURE VANETS
RFID technology can be easily integrated in
vehicular networks as it provides a low cost solution
for V2I communications. The RFID applications
currently in use employ this type of communication.
European Union is working in RFID tracking
systems to issue automated tickets for minor traffic
violations (Asset, 2010), as an application of the
Electronic License Plate. Other proposals describe
automatic payment systems of parking-fess, or
traffic-light priority systems for easing traffic
congestion and reducing road accidents (Lee, 2009),
but all of them with the same architecture: tag on
vehicles and reader on the road.
Since RFID technology deals with identification
and authentication, it represents a further step in the
information collection systems. This way, RFID
constitutes an alternative mechanism for I2V
(infrastructure to vehicle) communication with
important advantages.
Low cost of this technology allows the system to
disseminate a huge number of tags to complement
traditional traffic signalling. The information
obtained from RFID tags can be considered as local
meaning information due to the reading coverage
limitations of this technology. The infrastructure
gains a real advantage since a new non-attending
signalling system can be deployed. This signalling
system will always work under extreme conditions
such us VANET loss connection or bad weather
conditions (reduced visibility). Safety-related
applications, such us collision avoidance,
cooperative driving, traffic optimization, lane-
changing assistance or road conditions warnings,
may be implemented.
RFID signalling may be implemented as a
complementary support of the existing technologies.
In this way, the information collected from different
means can be analysed to obtain trusted and more
accurate information. Other I2V applications, such
as collision avoiding system in urban intersections or
wrong way detection system, may be implemented
by means of RFID technology.
Some constraints exist when we try to implement
this technology: mainly, the speed of vehicles.
Several initiatives including tag on vehicle
architectures have been previously published with
different objectives in mind (Lee, 2009), (Penttila,
2004), (Chon, 2004). The experimental results state
the maximum speed at 100 Km/h, with a high error
rate in readings.
Although these results allow the utilisation of
this architecture in reduced speed areas, such as
urban roads, much more research must be applied.
The most important constraint is the reading range
and the total reading time which includes activation
time and transmission time.
However, none of these proposals have taken in
mind security requirements to allow a secure and
trusted utilisation of the system. In the next section,
we analyse these proposals from a cryptographic
point of view.
4 SECURITY REQUIREMENTS
The main problems about security in RFID reside in
privacy and authentication (Juels, 2006). Privacy
must be applied to avoid physical tracking attacks,
where a forge reader can interrogate a legal tag
without the knowledge of its owner. Authentication
SECRYPT 2010 - International Conference on Security and Cryptography
296