Non-Interactive Detection of Malicious Vehicular Network Data
DOI:
https://doi.org/10.13052/jcsm2245-1439.118Keywords:
vehicular networks, security, malicious data detection, voting protocolsAbstract
Vehicular networks might be deployed in the near future, and as a consequence a potentially large number of exciting applications are expected to enhance the human driving experience. Unless the security of such applications is guaranteed, however, such enhancements may be accompanied by similarly powerful and yet undesired consequences in malicious behaviour. While current research in the vehicular networks security area has recognized conventional security and cryptographic threats, detailed modeling and analysis of threats that are specific to vehicle traffic are rarely considered in the literature. In this paper we lay ground for a comprehensive investigation of “traffic-related” threats to vehicular networks. We study the problem of modeling traffic-related attacks in these networks and present automatic and efficient (i.e., no human intervention and no expensive cryptographic protocols) yet general solutions to prevent or tolerate a number of these attacks. Specifically, we propose techniques based on the capability of implementing simple and non-interactive voting algorithms that use the mere participations of vehicles to the network and, while doing that, attempt to maximize use of already exchanged and relevant network data. We validate our techniques by providing analysis results based on both simulated and real-life mobility data in typical urban environments. Previous work required interactive protocols to implement voting or consensus techniques, and implicitly left open the question we solve in this paper.
Downloads
References
http://en.wikipedia.org/wiki/Vehicle-infrastructure-integration
X. Lin and R. Lu, A bibliography on secure vehicular communications, http://bbcr.uwaterloo.ca/∼rxlu/sevecombib.htm
Z. Cao, J. Kong, U. Lee, M. Gerla and Z. Chen, Proof-of-relevance: Filtering False data via authentic consensus in vehicle ad-hoc networks, in Proc. of IEEE InfocomWorkshops, 2008.
J. Choi, M. Jakobsson and S. Wetzel, Balancing auditability and privacy in vehicular networks, in Proc. of 1st ACM Workshop on Quality of Service and Security in Wireless and Mobile Networks, 2005.
G. Di Crescenzo and T. Zhang, Efficient CRL search in vehicular network PKIs, in Proc. of the 6th ACM CCS Workshop on Digital Identity Management, 2010.
G. Di Crescenzo, S. Pietrowicz and T. Zhang, Anonymity notions for public-key infrastructure in vehicular networks, in Proc. of Mobile Ad-Hoc Networks Sensors and Systems (MASS 07 Workshops), 2007.
P. Golle, D. Greene and J. Staddon, Detecting and correcting malicious data in vanets, in Proc. of ACM VANET Workshop, 2004.
J. P. Hubaux, S. Capkun and J. Luo, The security and privacy of smart vehicles, in IEEE Security & Privacy, 2(3): 2004.
F. Kargl et al. Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges. CoRR, abs/0912.5393, 2009.
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho and X. S. Shen. Security in vehicular ad hoc networks. IEEE Communications Magazine, 2008.
B. Ostermaier, F. Dotzer and M. Strassberger, Enhancing the security of local danger warnings in vanets—a simulative analysis of voting schemes, in Proc. of IEEE Conference on Availability, Reliability and Security (ARES’07), 2007.
J. Petit and Z. Mammeri, Impact of message authentication on braking distance in vehicular networks, in Proc. of 5th ERST2 Workshop, 2010.
M. Raya, P. Papadimitratos, I. Aad, D. Jungels and J.P. Hubaux, Eviction of misbehaving and faulty nodes in vehicular networks, in IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Networks, 2007.
Y. Kondareddy, G. Di Crescenzo and P. Agrawal, Analysis of Certificate Revocation List Distribution Protocols for Vehicular Networks. GLOBECOM 2010: 1-5.
http://sourceforge.net/apps/mediawiki/sumo/index.php?title=Main_Page
M. Gerla and L. Kleinrock, Vehicular networks and the future of the mobile internet, in Computer Networks (2011), doi:10.1016/j.comnet.2010.10.015.
G. Di Crescenzo,Y. Ling, S. Pietrowicz and T. Zhang, Non-interactive malicious behavior detection in vehicular networks, in Proc. of 2nd IEEE Vehicular Networking Conference (VNC 10), Dec. 2010.