Trustworthy Vehicular Communication Employing Multidimensional Diversification for Moving-target Defense
Keywords:Security, Diversity, Moving target defense, Vehicle to Vehicle (V2V) communication
Enabling trustworthy Vehicle to Vehicle (V2V) communication given the wireless medium and the highly dynamic nature of the vehicular environment is a hard challenge. Eavesdropping and signal jamming in such highly dynamic environment is a real problem. This paper proposes a nature inspired multidimensional Moving-Target Defense (MTD) that employs real time spatiotemporal diversity to obfuscate wireless signals against attacker reach. In space: the mechanism manipulates the wireless transmission pattern and configuration to confuse eavesdroppers. In Time: we manipulate the transmission payload, by intentionally injecting some fake data into the real transmission. Further, the mechanism changes the data transmission granularity over time from fine to coarse grained data chunks. As a case study, we assumed the direct transmission model across dynamic multi-paths relayed communication via vehicles traveling on a multi-lane road. The system is evaluated based on a complete analysis of the system model and comprehensive simulated scenarios. Results showed the effectiveness of the presented approach with an increased confusion factor, a massive reduction in the intercept probability and clear increase in the channel secrecy.
Alotaibi, E. R., and Hamdi, K. A. (2016). Secrecy outage probability analysis for cooperative communication with relay selection under non-identical distribution. In 2016 IEEE Wireless Communications and Networking Conference (WCNC), 1–6. IEEE.
Laneman, J. N., Tse, D. N., and Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information theory, 50(12), 3062–3080.
Cheng, L., Stancil, D. D., and Bai, F. (2013). A roadside scattering model for the vehicle-to-vehicle communication channel. IEEE Journal on Selected Areas in Communications, 31(9), 449–459.
Maxemchuk, N. F., Tientrakool, P., and Willke, T. L. (2009). The role of communications in cyber-physical vehicle applications. In Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange, 139–161. IGI Global.
Boban, M., Barros, J., and Tonguz, O. K. (2014). Geometry-based vehicle-to-vehicle channel modeling for large-scale simulation. IEEE Transactions on Vehicular Technology, 63(9), 4146–4164.
Bette, H. M., Habel, L., Emig, T., and Schreckenberg, M. (2017). Mechanisms of jamming in the Nagel-Schreckenberg model for traffic flow. Physical Review E, 95(1), 012311.
Makowiec, D., and Miklaszewski, W. (2006). Nagel-Schreckenberg model of traffic–study of diversity of car rules. In International Conference on Computational Science, 256–263. Springer, Berlin, Heidelberg.
Leung-Yan-Cheong, S., and Hellman, M. (1978). The Gaussian wire-tap channel. IEEE transactions on information theory, 24(4), 451–456.
Ghourab, E. M., Azab, M., Feteiha, M. F., and El-Sayed, H. (2018). A Novel Approach to Enhance the Physical Layer Channel Security of Wireless Cooperative Vehicular Communication Using Decode-and-Forward Best Relaying Selection. Wireless Communications and Mobile Computing, 2018.
Singh, C., Kaur, R., & Kaur, M. Review of security enhancement techniques for Wireless Sensor Network.
Feteiha, M. F., Uysal, M., and Ahmad, A. R. (2011). Cooperative inter-vehicular communications in highway traffic. In 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE), 000460–000465. IEEE.
Ochiai, H., Mitran, P., and Tarokh, V. (2004). Design and analysis of collaborative diversity protocols for wireless sensor networks. In 2004 IEEE 60th Vehicular technology conference, 2004. VTC2004-Fall. 7, 4645–4649. IEEE.
Ma, X., and Giannakis, G. B. (2003). Maximum-diversity transmissions over doubly selective wireless channels. IEEE Transactions on Information Theory, 49(7), 1832–1840.
Cui, S., Goldsmith, A. J., and Bahai, A. (2005). Energy-constrained modulation optimization. IEEE transactions on wireless communications, 4(5), 2349–2360.
Patel, C. S., Stuber, G. L., and Pratt, T. G. (2006). Statistical properties of amplify and forward relay fading channels. IEEE Transactions on Vehicular Technology, 55(1), 1–9.
Akki, A. S., and Haber, F. (1986). A statistical model of mobile-to-mobile land communication channel. IEEE transactions on vehicular technology, 35(1), 2–7.
Khisti, A., and Wornell, G. W. (2010). Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Transactions on Information Theory, 56(7), 3088–3104.
Wyner, A. D. (1975). The wire-tap channel. Bell system technical journal, 54(8), 1355–1387.
Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review, 5(1), 3–55.
Ghourab, E. M., Samir, E., Azab, M., and Eltoweissy, M. (2018). Diversity-Based Moving-Target Defense for Secure Wireless Vehicular Communications. In 2018 IEEE Security and Privacy Workshops (SPW), 287–292. IEEE.