Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ICCPS.2018.00013acmconferencesArticle/Chapter ViewAbstractPublication PagesiccpsConference Proceedingsconference-collections
research-article

Sybil attack resilient traffic networks: a physics-based trust propagation approach

Published: 11 April 2018 Publication History

Abstract

We study a crowdsourcing aided road traffic estimation setup, where a fraction of users (vehicles) are malicious, and report wrong sensory information, or even worse, report the presence of Sybil (ghost) vehicles that do not physically exist. The motivation for such attacks lies in the possibility of creating a "virtual" congestion that can influence routing algorithms, leading to "actual" congestion and chaos. We propose a Sybil attack-resilient traffic estimation and routing algorithm that is resilient against such attacks. In particular, our algorithm leverages noisy information from legacy sensing infrastructure, along with the dynamics and proximity graph of vehicles inferred from crowdsourced data. Furthermore, the scalability of our algorithm is based on efficient Boolean Satisfiability (SAT) solvers. We validated our algorithm using real traffic data from the Italian city of Bologna. Our algorithm led to a significant reduction in average travel time in the presence of Sybil attacks, including cases where the travel time was reduced from about an hour to a few minutes.

References

[1]
Waze, "Waze: Free community-based gps, maps and traffic navigation app," 2017. {Online}. Available: https://www.waze.com/
[2]
N. Stern, "Waze's Drive Towards Successful Public Partnerships," Data-Smart City Solutions, Tech. Rep., Feb. 2016. {Online}. Available: http://datasmart.ash.harvard.edu/news/article/wazes-drive-towards-successful-public-partnerships-786
[3]
Research and Markets, "Semi-Autonomous and Autonomous Vehicles Market by Technology, Components, Powertrain and Region - Global Forecast 2021--2030," Research and Markets, Tech. Rep., May 2017. {Online}. Available: https://www.researchandmarkets.com/research/3jw44d/semiautonomous
[4]
I. Efrati, "Waze under attack: Israeli students fake traffic jam on popular map app," Mar. 2014. {Online}. Available: https://www.haaretz.com/israel-news/.premium-1.581732
[5]
M. B. Sinai, N. Partush, S. Yadid, and E. Yahav, "Exploiting social navigation," arXiv preprint, 2014. {Online}. Available: https://arxiv.org/abs/1410.0151
[6]
G. Wang, B. Wang, T. Wang, A. Nika, H. Zheng, and B. Y. Zhao, "Defending against sybil devices in crowdsourced mapping services," in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), Jun. 2016, pp. 179--191.
[7]
J. R. Douceur, "The sybil attack," in Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), January 2002, pp. 251--260. {Online}. Available: https://www.microsoft.com/en-us/research/publication/the-sybil-attack/
[8]
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection of fake accounts in large scale social online services," in Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), San Jose, CA, 2012, pp. 197--210.
[9]
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, "An analysis of social network-based sybil defenses," ACM SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 363--374, 2010.
[10]
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "Sybil-guard: defending against sybil attacks via social networks," ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 267--278, 2006.
[11]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A near-optimal social network defense against sybil attacks," in Proceedings of the IEEE Symposium on Security and Privacy, 2008, pp. 3--17.
[12]
G. Danezis and P. Mittal, "Sybilinfer: Detecting sybil nodes using social networks," in Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, 2009, pp. 1--15.
[13]
S. Saroiu and A. Wolman, "Enabling new mobile applications with location proofs," in Proceedings of the 10th ACM workshop on Mobile Computing Systems and Applications (HotMobile), 2009, p. 3.
[14]
W. Luo and U. Hengartner, "Proving your location without giving up your privacy," in Proceedings of the 11th ACM Workshop on Mobile Computing Systems and Applications (HotMobile), 2010, pp. 7--12.
[15]
J. Brassil, P. K. Manadhata, and R. Netravali, "Traffic signature-based mobile device location authentication," IEEE Transactions on Mobile Computing, vol. 13, no. 9, pp. 2156--2169, 2014.
[16]
S. Gil, S. Kumar, M. Mazumder, D. Katabi, and D. Rus, "Guaranteeing spoof-resilient multi-robot networks," Autonomous Robots, vol. 41, no. 6, pp. 1383--1400, 2017.
[17]
F. Pasqualetti, F. Dorfler, and F. Bullo, "Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems," IEEE Control Systems, vol. 35, no. 1, pp. 110--127, 2015.
[18]
H. Fawzi, P. Tabuada, and S. Diggavi, "Secure estimation and control for cyber-physical systems under adversarial attacks," IEEE Transactions on Automatic Control, vol. 59, no. 6, pp. 1454--1467, June 2014.
[19]
M. Pajic, J. Weimer, N. Bezzo, P. Tabuada, O. Sokolsky, I. Lee, and G. Pappas, "Robustness of attack-resilient state estimators," in Proceeding of the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), Apr. 2014, pp. 163--174.
[20]
Y. Mo, J. Hespanha, and B. Sinopoli, "Resilient detection in the presence of integrity attacks," IEEE Transactions on Signal Processing, vol. 62, no. 1, pp. 31--43, Jan 2014.
[21]
Y. Shoukry, P. Nuzzo, A. Puggelli, A. L. Sangiovanni-Vincentelli, S. A. Seshia, and P. Tabuada, "Secure state estimation for cyber-physical systems under sensor attacks: A satisfiability modulo theory approach," IEEE Transactions on Automatic Control, vol. 62, no. 10, pp. 4917--4932, 2017.
[22]
S. Mishra, N. Karamchandani, P. Tabuada, and S. Diggavi, "Secure state estimation and control using multiple (insecure) observers," in Proceedings of IEEE Conference on Decision and Control (CDC), Dec. 2014, pp. 1620--1625.
[23]
S. Mishra, Y. Shoukry, N. Karamchandani, S. N. Diggavi, and P. Tabuada, "Secure state estimation against sensor attacks in the presence of noise," IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 49--59, March 2017.
[24]
L. Bedogni, M. Gramaglia, A. Vesco, M. Fiore, J. Haerri, and F. Ferrero, "The bologna ringway dataset," 2015. {Online}. Available: http://www.cs.unibo.it/projects/bolognaringway/
[25]
Y. Wang and M. Papageorgiou, "Real-time freeway traffic state estimation based on extended kalman filter: a general approach," Transportation Research Part B: Methodological, vol. 39, no. 2, pp. 141--167, 2005.
[26]
J. Reilly, S. Martin, M. Payer, and A. M. Bayen, "Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security," Transportation Research Part B: Methodological, vol. 91, pp. 366--382, 2016.
[27]
Y. Shoukry, P. D. Martin, P. Tabuada, and M. B. Srivastava, "Non-invasive spoofing attacks for anti-lock braking systems," in Workshop on Cryptographic Hardware and Embedded Systems, ser. G. Bertoni and J.-S. Coron (Eds.): CHES 2013, LNCS 8086. International Association for Cryptologic Research, 2013, pp. 55--72.
[28]
Y. Shoukry and P. Tabuada, "Event-triggered state observers for sparse sensor noise/attacks," IEEE Transactions on Automatic Control, vol. 61, no. 8, pp. 2079--2091, 2016.
[29]
Microsoft Azure website, "Announcing the Coco framework for enterprise blockchain networks." {Online}: https://azure.microsoft.com/en-us/blog/announcing-microsoft-s-coco-framework-for-enterprise-blockchain-networks/, 2017.
[30]
A. Jøsang, S. Marsh, and S. Pope, "Exploring different types of trust propagation," in Proceedings of the International Conference on Trust Management (iTrust), vol. 3986, 2006, pp. 179--192.
[31]
R. Sailer, X. Zhang, T. Jaeger, and L. Van Doorn, "Design and implementation of a tcg-based integrity measurement architecture." in Proceedings of USENIX Security Symposium, vol. 13, 2004, pp. 223--238.
[32]
M. Jamali and M. Ester, "A matrix factorization technique with trust propagation for recommendation in social networks," in Proceedings of the fourth ACM conference on Recommender systems, 2010, pp. 135--142.
[33]
L. Wu, Y. Zhang, and F. Wang, "A new provably secure authentication and key agreement protocol for SIP using ECC," Computer Standards & Interfaces, vol. 31, no. 2, pp. 286--291, 2009.
[34]
T. Seo, A. M. Bayen, T. Kusakabe, and Y. Asakura, "Traffic state estimation on highway: A comprehensive survey," Annual Reviews in Control, vol. 43, pp. 128--151, 2017.
[35]
Y. Wang, M. Papageorgiou, and A. Messmer, "Real-time freeway traffic state estimation based on extended kalman filter: A case study," Transportation Science, vol. 41, no. 2, pp. 167--181, 2007.
[36]
Y. Shoukry, S. Mishra, Z. Luo, and S. Diggavi, "Sybil attack resilient traffic networks: A physics-based trust propagation approach," arXiv preprint, 2018.
[37]
L. Bieker, D. Krajzewicz, A. Morra, C. Michelacci, and F. Cartolano, "Traffic simulation for all: a real world traffic scenario from the city of bologna," in Modeling Mobility with Open Data. Springer, 2015, pp. 47--60.
[38]
L. Bedogni, M. Gramaglia, A. Vesco, M. Fiore, J. Haerri, and F. Ferrero, "The bologna ringway dataset: improving road network conversion in SUMO and validating urban mobility via navigation services," IEEE Transactions on Vehicular Technology, vol. 64, no. 12, pp. 5464--5476, 2015.
[39]
D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker, "Recent development and applications of SUMO - Simulation of Urban MObility," International Journal On Advances in Systems and Measurements, vol. 5, no. 3&4, 2012.

Cited By

View all
  • (2023)Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot AccusationsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598795(1430-1438)Online publication date: 30-May-2023
  • (2022)On the Cybersecurity of Traffic Signal Control System With Connected VehiclesIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.314944923:9(16267-16279)Online publication date: 1-Sep-2022
  • (2019)Masquerade Attack Detection Through Observation Planning for Multi-Robot SystemsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332078(2262-2264)Online publication date: 8-May-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCPS '18: Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems
April 2018
369 pages
ISBN:9781538653012

Sponsors

Publisher

IEEE Press

Publication History

Published: 11 April 2018

Check for updates

Author Tags

  1. resilient routing
  2. secure smart transportation systems
  3. sybil attacks

Qualifiers

  • Research-article

Conference

ICCPS '18
Sponsor:

Acceptance Rates

Overall Acceptance Rate 25 of 91 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot AccusationsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598795(1430-1438)Online publication date: 30-May-2023
  • (2022)On the Cybersecurity of Traffic Signal Control System With Connected VehiclesIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.314944923:9(16267-16279)Online publication date: 1-Sep-2022
  • (2019)Masquerade Attack Detection Through Observation Planning for Multi-Robot SystemsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332078(2262-2264)Online publication date: 8-May-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media