Trustworthy Vehicular Communication Employing Multidimensional Diversification for Moving-target Defense

Authors

  • Esraa M. Ghourab Electrical Engineering Department, Alexandria University, Alexandria 21544, Egypt
  • Effat Samir Electrical Engineering Department, Alexandria University, Alexandria 21544, Egypt
  • Mohamed Azab Computer and Information Sciences Department, Virginia Military Institute, Lexington, VA, USA and Informatics Research Institute, City of Scientific Research and Technological Applications, Alexandria, Egypt
  • Mohamed Eltoweissy Informatics Research Institute, City of Scientific Research and Technological Applications, Alexandria, Egypt

DOI:

https://doi.org/10.13052/2245-1439.821

Keywords:

Security, Diversity, Moving target defense, Vehicle to Vehicle (V2V) communication

Abstract

Enabling trustworthy Vehicle to Vehicle (V2V) communication given the wireless medium and the highly dynamic nature of the vehicular environment is a hard challenge. Eavesdropping and signal jamming in such highly dynamic environment is a real problem. This paper proposes a nature inspired multidimensional Moving-Target Defense (MTD) that employs real time spatiotemporal diversity to obfuscate wireless signals against attacker reach. In space: the mechanism manipulates the wireless transmission pattern and configuration to confuse eavesdroppers. In Time: we manipulate the transmission payload, by intentionally injecting some fake data into the real transmission. Further, the mechanism changes the data transmission granularity over time from fine to coarse grained data chunks. As a case study, we assumed the direct transmission model across dynamic multi-paths relayed communication via vehicles traveling on a multi-lane road. The system is evaluated based on a complete analysis of the system model and comprehensive simulated scenarios. Results showed the effectiveness of the presented approach with an increased confusion factor, a massive reduction in the intercept probability and clear increase in the channel secrecy.

 

Downloads

Download data is not yet available.

Author Biographies

Esraa M. Ghourab, Electrical Engineering Department, Alexandria University, Alexandria 21544, Egypt

Esraa M. Ghourab is one of the founders and a researcher at the IoT Cyber Security Lab, SmartCI, Faculty of Engineering, Alexandria University, Egypt. She worked with the lab team members towards a set of innovative research and business-oriented projects related to Cyber Security, Smart IoT systems, Software Defined Secure wireless communication.

She supervised young researchers working on their 1st papers. Esraa received her M.Sc in Communication Engineering, in 2018 and B.S in Electrical Communication Engineering Major with, GPA 3.85 in 2014, from Alexandria University. Currently, her research interests cross cuts the areas of Vehicular Wireless Communication, Trustworthy wireless signals, and Moving-target Defense for secure wireless data exchange.

Effat Samir, Electrical Engineering Department, Alexandria University, Alexandria 21544, Egypt

Effat Samir is a Research assistant at Faculty of Engineering, Alexandria University, Egypt. Effat received her Bsc. and M.Sc. in Communication and Electronics Engineering in 2013 and 2017 from Faculty of engineering, Alexandria University. She has worked in multiple research projects focusing on both physical and application layers. She has 2 book chapters among various publications in archival journals and conference proceedings. During her master studies she developed an interest in the IT physical layer; specially Nanotechnology field with a major interest in Nano-sensors fabrication, characterization, and calibration. Further, her recent crosscuts are oriented more in the IT application layer. She developed a huge research interests lie in the area of Vehicular Ad-Hoc Networks, Internet of Things (IoT), and Machine learning techniques.

Mohamed Azab, Computer and Information Sciences Department, Virginia Military Institute, Lexington, VA, USA and Informatics Research Institute, City of Scientific Research and Technological Applications, Alexandria, Egypt

Mohamed Azab is an assistant professor at The CIS, Virginia Military Institute. He is also affiliated with The City of Scientific Research and Technological Applications, The SmartCI Research Center, VT-MENA, (Virginia Tech- Middle East and North Africa), College of Engineering Alexandria University, Alexandria, Egypt.

Mohamed received his Ph.D. in Computer Engineering in 2013 from The Bradley Department of Electrical and Computer Engineering at Virginia Tech, Blacksburg, USA.

He has multiple provisional patents, book chapters among various publications in archival journals and respected conference proceedings.

His research interests lie in the area of cyber security and trustworthy engineering ranging from theory to design to implementation. His recent research crosscuts the areas Software Defined Networking (SDN) architectures and protocols, high performance and cloud computing, ubiquitous Internet of Things (IoT), and Cyber-Physical systems (CPS).

Mohamed is the founder of the Cyber Security and IoT lab. Hosting Mohamed’s Ph.D. and Masters students research activities.

Mohamed acted as a keynote speaker in multiple prestigious conferences. He served on multiple conference and workshop program and steering committees.

Mohamed Eltoweissy, Informatics Research Institute, City of Scientific Research and Technological Applications, Alexandria, Egypt

Mohamed Eltoweissy is Department Head and Professor of Computer and Information Sciences at Virginia Military Institute. He is also a Professor affiliated with The Bradley Department of Electrical and Computer Engineering at Virginia Tech.

Eltoweissy served as Chief Scientist for Secure Cyber Systems at Pacific Northwest National Laboratory. He also served on the faculty of James Madison University.

Eltoweissy co-founded several start-up companies including Video Semantics and Teradata Science.

Eltoweissy’s current interests crosscut the areas of network security and resilience, cooperative autonomic systems, and networking architecture and protocols.

Eltoweissy has over 175 publications in archival journals and respected books and conference proceedings and an extensive funding record. He also served on the editorial board of IEEE Transactions on Computers (the flagship and oldest Transactions of the IEEE Computer Society) as well as other reputable journals.

In addition, Eltoweissy is active as an invited speaker at both the national and international levels. Eltoweissy received several awards and recognition for research, education, service, and entrepreneurship, including best paper awards, top placements at Cyber Security competitions, and a nomination for the Virginia SCHEV Outstanding Faculty Awards, the highest honor for faculty in Virginia. Eltoweissy is a senior member of IEEE and ACM.

References

Alotaibi, E. R., and Hamdi, K. A. (2016). Secrecy outage probability analysis for cooperative communication with relay selection under non-identical distribution. In 2016 IEEE Wireless Communications and Networking Conference (WCNC), 1–6. IEEE.

Laneman, J. N., Tse, D. N., and Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information theory, 50(12), 3062–3080.

Cheng, L., Stancil, D. D., and Bai, F. (2013). A roadside scattering model for the vehicle-to-vehicle communication channel. IEEE Journal on Selected Areas in Communications, 31(9), 449–459.

Maxemchuk, N. F., Tientrakool, P., and Willke, T. L. (2009). The role of communications in cyber-physical vehicle applications. In Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange, 139–161. IGI Global.

Boban, M., Barros, J., and Tonguz, O. K. (2014). Geometry-based vehicle-to-vehicle channel modeling for large-scale simulation. IEEE Transactions on Vehicular Technology, 63(9), 4146–4164.

Bette, H. M., Habel, L., Emig, T., and Schreckenberg, M. (2017). Mechanisms of jamming in the Nagel-Schreckenberg model for traffic flow. Physical Review E, 95(1), 012311.

Makowiec, D., and Miklaszewski, W. (2006). Nagel-Schreckenberg model of traffic–study of diversity of car rules. In International Conference on Computational Science, 256–263. Springer, Berlin, Heidelberg.

Leung-Yan-Cheong, S., and Hellman, M. (1978). The Gaussian wire-tap channel. IEEE transactions on information theory, 24(4), 451–456.

Ghourab, E. M., Azab, M., Feteiha, M. F., and El-Sayed, H. (2018). A Novel Approach to Enhance the Physical Layer Channel Security of Wireless Cooperative Vehicular Communication Using Decode-and-Forward Best Relaying Selection. Wireless Communications and Mobile Computing, 2018.

Singh, C., Kaur, R., & Kaur, M. Review of security enhancement techniques for Wireless Sensor Network.

Feteiha, M. F., Uysal, M., and Ahmad, A. R. (2011). Cooperative inter-vehicular communications in highway traffic. In 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE), 000460–000465. IEEE.

Ochiai, H., Mitran, P., and Tarokh, V. (2004). Design and analysis of collaborative diversity protocols for wireless sensor networks. In 2004 IEEE 60th Vehicular technology conference, 2004. VTC2004-Fall. 7, 4645–4649. IEEE.

Ma, X., and Giannakis, G. B. (2003). Maximum-diversity transmissions over doubly selective wireless channels. IEEE Transactions on Information Theory, 49(7), 1832–1840.

Cui, S., Goldsmith, A. J., and Bahai, A. (2005). Energy-constrained modulation optimization. IEEE transactions on wireless communications, 4(5), 2349–2360.

Patel, C. S., Stuber, G. L., and Pratt, T. G. (2006). Statistical properties of amplify and forward relay fading channels. IEEE Transactions on Vehicular Technology, 55(1), 1–9.

Akki, A. S., and Haber, F. (1986). A statistical model of mobile-to-mobile land communication channel. IEEE transactions on vehicular technology, 35(1), 2–7.

Khisti, A., and Wornell, G. W. (2010). Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Transactions on Information Theory, 56(7), 3088–3104.

Wyner, A. D. (1975). The wire-tap channel. Bell system technical journal, 54(8), 1355–1387.

Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review, 5(1), 3–55.

Ghourab, E. M., Samir, E., Azab, M., and Eltoweissy, M. (2018). Diversity-Based Moving-Target Defense for Secure Wireless Vehicular Communications. In 2018 IEEE Security and Privacy Workshops (SPW), 287–292. IEEE.

Downloads

Published

2018-09-30

How to Cite

1.
Ghourab EM, Samir E, Azab M, Eltoweissy M. Trustworthy Vehicular Communication Employing Multidimensional Diversification for Moving-target Defense. JCSANDM [Internet]. 2018 Sep. 30 [cited 2024 Mar. 28];8(2):133-64. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5333

Issue

Section

Articles