Non-Interactive Detection of Malicious Vehicular Network Data

Authors

  • Giovanni Di Crescenzo Telcordia Technologies, Piscataway, NJ, USA
  • Yibei Ling Telcordia Technologies, Piscataway, NJ, USA
  • Tao Zhang Telcordia Technologies, Piscataway, NJ, USA
  • Stan Pietrowicz Telcordia Technologies, Piscataway, NJ, USA

DOI:

https://doi.org/10.13052/jcsm2245-1439.118

Keywords:

vehicular networks, security, malicious data detection, voting protocols

Abstract

Vehicular networks might be deployed in the near future, and as a consequence a potentially large number of exciting applications are expected to enhance the human driving experience. Unless the security of such applications is guaranteed, however, such enhancements may be accompanied by similarly powerful and yet undesired consequences in malicious behaviour. While current research in the vehicular networks security area has recognized conventional security and cryptographic threats, detailed modeling and analysis of threats that are specific to vehicle traffic are rarely considered in the literature. In this paper we lay ground for a comprehensive investigation of “traffic-related” threats to vehicular networks. We study the problem of modeling traffic-related attacks in these networks and present automatic and efficient (i.e., no human intervention and no expensive cryptographic protocols) yet general solutions to prevent or tolerate a number of these attacks. Specifically, we propose techniques based on the capability of implementing simple and non-interactive voting algorithms that use the mere participations of vehicles to the network and, while doing that, attempt to maximize use of already exchanged and relevant network data. We validate our techniques by providing analysis results based on both simulated and real-life mobility data in typical urban environments. Previous work required interactive protocols to implement voting or consensus techniques, and implicitly left open the question we solve in this paper.

Downloads

Download data is not yet available.

Author Biographies

Giovanni Di Crescenzo, Telcordia Technologies, Piscataway, NJ, USA

Giovanni Di Crescenzo is a senior scientist at Telcordia Technologies with 15+ year research experience. He received a Ph.D. from University of California San Diego, USA (with a thesis on cryptography) and a Ph.D. from the University of Naples, Italy (with a thesis on zero-knowledge proofs). His main research activity has been in various areas of Mathematics and Computer Science, including Cryptography, Computer/Network/Information Security, Computational Complexity, Algorithms, and Statistics, where he has produced 100+ scientific publications in major, refereed conferences and journals, including 1 book, 2 book chapters, 3 proceedings of conferences orworkshops for which he was a technical program chair.
He was awarded more than 15 among prizes and patents, including recognitions as best paper co-author and as a person of extraordinary ability in the field of science. He regularly gives invited talks and referees papers for the major conferences and journals in his areas of expertise, and has been involved in several research projects funded by government agencies (including DARPA, ARL, ARDA, NSA, DOT, IARPA). He also frequently consults for commercial institutions in the area of cryptography, security, telecommunication, telematics and intellectual property.

Yibei Ling, Telcordia Technologies, Piscataway, NJ, USA

Yibei Ling (M’00–SM’06) received the B.S. degree in electrical engineering from Zhejiang University, Hangzhou, China, in 1982, the M.S. degree in statistics from Shanghai Medical University (currently Fuda University), Shanghai, China, in 1988, and the Ph.D. degree in computer science from Florida State University at Miami, Miami, in 1995. He is a Senior Research Scientist with the Applied Research Laboratories, Telcordia Technologies (formerly Bellcore), Piscataway, NJ. His research interests include distributed computing, query optimization in database management system, scheduling, biological moduling, checkpointing, system performance/evaluation, fault localization/self-healing in mobile adhoc networks, and power-aware routing in mobile adhoc networks. He is the Architect, as well as the Developer, of the voice subsystem of Telcordia Notification System. He is a key team member of the Telcordia led DARPA Adaptive Cognitive-Enhanced Radio Team Project, in which he is responsible for designing/implementing the distributed positioning subsystem using GPS and ultrawideband technologies. He is an Invited Reviewer for Mathematical Reviews. Dr. Ling has published several papers in the IEEE TRANSACTIONS ON COMPUTERS, the IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, the IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, and the IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, and he is involved in prestigious conferences such as the Special Interest Group on Management of Data, the International Conference on Data Engineering, the International Conference on Distributed Computing Systems, and Principles of Distributed Computing. He served as a TPC member for QShine in 2005, 2006, and 2007 and for the Computer and Network Security Symposium of the IEEE International Wireless Communication and Mobile Computing Conference in 2006.

Tao Zhang, Telcordia Technologies, Piscataway, NJ, USA

Tao Zhang received his Ph.D. from the University of Massachusetts at Amherst, U.S., in 1993. He is Chief Scientist and Director of Wireless and Vehicular Networks at Telcordia Technologies, where he directs research and advanced development in vehicular networks and next-generation wireless systems. Dr. Zhang is a Fellow of the IEEE. He holds 26 U.S. patents, coauthored the book “IP-Based Next Generation Wireless Networks” published by John Wiley & Sons in 2004 and the book “Vehicle Safety Communications: Protocols, Security, and Privacy” to be published by John Wiley & Sons in early 2012. He is Vice Chair of the IEEE ComSoc Technical Committee on Vehicular Networks and Telematics Applications and a member of the IEEE ComSoc Ad-Hoc Committee on Cloud Communications & Networking. He is serving, or has served, on editorial boards or as a guest editor for several international journals including the IEEE TVT, IEEE JSAC, IEEE ComSoc Technology News, and the Journal of Wireless Networks. He serves on the Industry Adversary Boards for several research institutes and programs. He has been an Adjunct Professor at Stevens Institute of Technology in New Jersey, the Polytechnic University of New York, and the National Tsing Hua University in Taiwan. He was an Assistant Professor at the Beijing Jiaotong University (then Northern Jiaotong University) in Beijing, China, from 1987 to 1989.

Stan Pietrowicz, Telcordia Technologies, Piscataway, NJ, USA

Stan Pietrowicz is a Senior Principal Security Consultant in the cyber security practice of Applied Communication Sciences. With over 20 years of combined experience in the Communications, Intelligent Transportation, and Smart Energy sectors, Stan is responsible for business development, project management, technical delivery and research. Working for Bellcore/Telcordia and now Applied Communication Sciences 1990, Stan’s present focus is Smart Grid security and operations where he pioneered the security assessment of Advanced Meter Infrastructures and received the Telcordia’s first CEO Award for Innovation in 2011. Stan also participates in security research for Intelligent Transportation Systems and vehicle communications. Stan received his MSEE from Rutgers University and BEEE from Stevens Institute of Technology.

References

http://ivc.ep.ch/

http://en.wikipedia.org/wiki/Vehicle-infrastructure-integration

X. Lin and R. Lu, A bibliography on secure vehicular communications, http://bbcr.uwaterloo.ca/∼rxlu/sevecombib.htm

Z. Cao, J. Kong, U. Lee, M. Gerla and Z. Chen, Proof-of-relevance: Filtering False data via authentic consensus in vehicle ad-hoc networks, in Proc. of IEEE InfocomWorkshops, 2008.

J. Choi, M. Jakobsson and S. Wetzel, Balancing auditability and privacy in vehicular networks, in Proc. of 1st ACM Workshop on Quality of Service and Security in Wireless and Mobile Networks, 2005.

G. Di Crescenzo and T. Zhang, Efficient CRL search in vehicular network PKIs, in Proc. of the 6th ACM CCS Workshop on Digital Identity Management, 2010.

G. Di Crescenzo, S. Pietrowicz and T. Zhang, Anonymity notions for public-key infrastructure in vehicular networks, in Proc. of Mobile Ad-Hoc Networks Sensors and Systems (MASS 07 Workshops), 2007.

P. Golle, D. Greene and J. Staddon, Detecting and correcting malicious data in vanets, in Proc. of ACM VANET Workshop, 2004.

J. P. Hubaux, S. Capkun and J. Luo, The security and privacy of smart vehicles, in IEEE Security & Privacy, 2(3): 2004.

F. Kargl et al. Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges. CoRR, abs/0912.5393, 2009.

X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho and X. S. Shen. Security in vehicular ad hoc networks. IEEE Communications Magazine, 2008.

B. Ostermaier, F. Dotzer and M. Strassberger, Enhancing the security of local danger warnings in vanets—a simulative analysis of voting schemes, in Proc. of IEEE Conference on Availability, Reliability and Security (ARES’07), 2007.

J. Petit and Z. Mammeri, Impact of message authentication on braking distance in vehicular networks, in Proc. of 5th ERST2 Workshop, 2010.

M. Raya, P. Papadimitratos, I. Aad, D. Jungels and J.P. Hubaux, Eviction of misbehaving and faulty nodes in vehicular networks, in IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Networks, 2007.

Y. Kondareddy, G. Di Crescenzo and P. Agrawal, Analysis of Certificate Revocation List Distribution Protocols for Vehicular Networks. GLOBECOM 2010: 1-5.

http://sourceforge.net/apps/mediawiki/sumo/index.php?title=Main_Page

M. Gerla and L. Kleinrock, Vehicular networks and the future of the mobile internet, in Computer Networks (2011), doi:10.1016/j.comnet.2010.10.015.

G. Di Crescenzo,Y. Ling, S. Pietrowicz and T. Zhang, Non-interactive malicious behavior detection in vehicular networks, in Proc. of 2nd IEEE Vehicular Networking Conference (VNC 10), Dec. 2010.

http://bhl.calccit.org/

Downloads

Published

2012-01-17

How to Cite

1.
Di Crescenzo G, Ling Y, Zhang T, Pietrowicz S. Non-Interactive Detection of Malicious Vehicular Network Data. JCSANDM [Internet]. 2012 Jan. 17 [cited 2024 Aug. 25];1(1):117-41. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6077

Issue

Section

Articles