Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1998412.1998440acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Efficient and secure threshold-based event validation for VANETs

Published: 14 June 2011 Publication History

Abstract

Determining whether the number of vehicles reporting an event is above a threshold is an important mechanism for VANETs, because many applications rely on a threshold number of notifications to reach agreement among vehicles, to determine the validity of an event, or to prevent the abuse of emergency alarms. We present the first efficient and secure threshold-based event validation protocol for VANETs. Quite counter-intuitively, we found that the z-smallest approach [3] offers the best tradeoff between security and efficiency since other approaches perform better for probabilistic counting. Analysis and simulation shows that our protocol provides > 99% accuracy despite the presence of attackers, collection and distribution of alerts in less than 1 second, and negligible impact on network performance.

References

[1]
Alon, N., Matias, Y., and Szegedy, M. The space complexity of approximating the frequency moments. Journal of Computer and System Sciences 58, 1 (1999), 137--147.
[2]
Bai, F., Krishnan, H., Sadekar, V., Holland, G., and Elbatt, T. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE AutoNet (2006).
[3]
Bar-Yossef, Z., Jayram, T. S., Kumar, R., Sivakumar, D., and Trevisan, L. Counting distinct elements in a data stream. In Proceedings of RANDOM (2002).
[4]
Bloom, B. H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 7 (1970), 422--426.
[5]
Chan, H., Perrig, A., and Song, D. X. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of ACM CCS (2006).
[6]
Chiang, J. T., and Hu, Y.-C. dynamic jamming mitigation for wireless broadcast networks. In Proceedings of IEEE INFOCOM (2008).
[7]
Dietzel, S., Schoch, E., Konings, B., Weber, M., and Kargl, F. Resilient secure aggregation for vehicular networks. IEEE Network: The Magazine of Global Internetworking 24 (2010), 26--31.
[8]
Douceur, J. R. The sybil attack. In Proceedings of International Workshop on Peer-to-Peer Systems (2002).
[9]
Flajolet, P., and Martin, G. N. Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences 31, 2 (1985), 182--209.
[10]
Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of NDSS (2011).
[11]
Frikken, K. B., and Joseph A. Dougherty, I. An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of ACM WiSec (2008).
[12]
Garofalakis, M. N., Hellerstein, J. M., and Maniatis, P. Proof sketches: Verifiable in-network aggregation. In Proceedings of IEEE ICDE (2007).
[13]
Golle, P., Greene, D., and Staddon, J. Detecting and correcting malicious data in vanets. In Proceedings of ACM VANET (2004).
[14]
IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Standards, 2006.
[15]
Jiang, D., Chen, Q., and Delgrossi, L. Optimal data rate selection for vehicle safety communications. In Proceedings of ACM VANET (2008).
[16]
Kim, T. H.-J., Studer, A., Zhang, X., Dubey, R., Perrig, A., Bai, F., Bellur, B., and Iyer, A. Vanet alert endorsement using multi-source filters. In Proceedings of ACM VANET (2010).
[17]
Korkmaz, G., Ekici, E., Özgüner, F., and Ozguner, U. Urban multi-hop broadcast protocol for inter-vehicle communication systems. In Proceedings of ACM VANET (2004).
[18]
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., and Savage, S. Experimental security analysis of a modern automobile. In Proceedings of IEEE Symposium on Security and Privacy (2010).
[19]
Kuhn, M. G. Probabilistic counting of large digital signature collections. In Proceedings of USENIX Security Symposium (2000).
[20]
Lochert, C., Scheuermann, B., and Mauve, M. Probabilistic aggregation for data dissemination in vanets. In Proceedings of ACM VANET (2007).
[21]
Moore, T., Clulow, J., Papadimitratos, P., Anderson, R., and pierre Hubaux, J. Fast exclusion of errant devices from vehicular networks. In Proceedings of IEEE SECON (2008).
[22]
Nath, S., Gibbons, P. B., Seshan, S., and Anderson, Z. R. Synopsis diffusion for robust aggregation in sensor networks. ACM Transactions on Sensor Networks 4, 2 (2008).
[23]
Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S., and Sheu, J.-P. The broadcast storm problem in a mobile ad hoc network. In Proceedings of ACM MobiCom (1999).
[24]
Papadimitratos, P., Gligor, V., and Hubaux, J.-P. Securing Vehicular Communications - Assumptions, Requirements, and Principles. In Proceedings of Workshop on Embedded Security in Cars (2006).
[25]
Parno, B., and Perrig, A. Challenges in securing vehicular networks. In Proceedings of ACM HotNets (2005).
[26]
Przydatek, B., Song, D. X., and Perrig, A. SIA: secure information aggregation in sensor networks. In Proceedings of ACM SenSys (2003).
[27]
Raya, M., Aziz, A., and Hubaux, J.-P. Efficient secure aggregation in vanets. In Proceedings of ACM VANET (2006).
[28]
Raya, M., and Hubaux, J.-P. Securing vehicular ad hoc networks. Journal of Computer Security 15 (2007), 39--68.
[29]
Raya, M., Papadimitratos, P., Gligor, V. D., and pierre Hubaux, J. On data centric trust establishment in ephemeral ad hoc networks. In Proceedings of IEEE INFOCOM (2008).
[30]
Ristanovic, N., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.-P., and Leboudec, J.-Y. Adaptive message authentication for vehicular networks. In Proceedings of ACM VANET (2009).
[31]
Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., and Seskar, I. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of USENIX Security Symposium (2010).
[32]
Stojmenovic, I., Seddigh, M., and Zunic, J. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Transactions on Parallel and Distributed Systems 13, 1 (2002), 14--25.
[33]
Studer, A., Shi, E., Bai, F., and Perrig, A. TACKing together efficient authentication, revocation, and privacy in vanets. In Proceedings of IEEE SECON (2009).
[34]
Wisitpongphan, N., Bai, F., Mudalige, P., and Tonguz, O. On the routing problem in disconnected vehicular ad-hoc networks. In Proceedings of IEEE INFOCOM (2007).
[35]
Wisitpongphan, N., Tonguz, O. K., Parikh, J. S., Mudalige, P., Bai, F., and Sadekar, V. Broadcast storm mitigation techniques in vehicular ad hoc networks. Wireless Communications, IEEE 14, 6 (2007), 84--94.
[36]
Yang, Y., Wang, X., Zhu, S., and Cao, G. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of ACM MobiHoc (2006).
[37]
Zhang, C., Lu, R., Lin, X., Ho, P.-H., and Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of IEEE INFOCOM (2008).

Cited By

View all
  • (2020)Securing Vehicle-to-Everything (V2X) Communication PlatformsIEEE Transactions on Intelligent Vehicles10.1109/TIV.2020.29874305:4(693-713)Online publication date: Dec-2020
  • (2019)Design of a Misbehavior Detection System for Objects Based Shared Perception V2X Applications2019 IEEE Intelligent Transportation Systems Conference (ITSC)10.1109/ITSC.2019.8917066(1165-1172)Online publication date: Oct-2019
  • (2019)Survey on Misbehavior Detection in Cooperative Intelligent Transportation SystemsIEEE Communications Surveys & Tutorials10.1109/COMST.2018.287308821:1(779-811)Online publication date: Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '11: Proceedings of the fourth ACM conference on Wireless network security
June 2011
186 pages
ISBN:9781450306928
DOI:10.1145/1998412
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. VANETs
  2. threshold-based event validation

Qualifiers

  • Research-article

Conference

WISEC'11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Securing Vehicle-to-Everything (V2X) Communication PlatformsIEEE Transactions on Intelligent Vehicles10.1109/TIV.2020.29874305:4(693-713)Online publication date: Dec-2020
  • (2019)Design of a Misbehavior Detection System for Objects Based Shared Perception V2X Applications2019 IEEE Intelligent Transportation Systems Conference (ITSC)10.1109/ITSC.2019.8917066(1165-1172)Online publication date: Oct-2019
  • (2019)Survey on Misbehavior Detection in Cooperative Intelligent Transportation SystemsIEEE Communications Surveys & Tutorials10.1109/COMST.2018.287308821:1(779-811)Online publication date: Sep-2020
  • (2019)Detecting Location Spoofing using ADAS sensors in VANETs2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC.2019.8651763(1-4)Online publication date: Jan-2019
  • (2019)Blockchain-based Traffic Event Validation and Trust Verification for VANETsIEEE Access10.1109/ACCESS.2019.2903202(1-1)Online publication date: 2019
  • (2019)Machine Learning Based Approach to Detect Position Falsification Attack in VANETsSecurity and Privacy10.1007/978-981-13-7561-3_13(166-178)Online publication date: 30-Apr-2019
  • (2019)RSU Beacon Aided Trust Management System for Location Privacy-Enhanced VANETsFrontier Computing10.1007/978-981-13-3648-5_245(1913-1924)Online publication date: 19-May-2019
  • (2019)Distributed Quality of Information-Aware Decision-Making in Vehicular NetworksSmart Cities, Green Technologies and Intelligent Transport Systems10.1007/978-3-030-26633-2_15(304-327)Online publication date: 27-Jul-2019
  • (2019)Misbehavior Detection in C-ITS Using Deep Learning ApproachIntelligent Systems Design and Applications10.1007/978-3-030-16657-1_60(641-652)Online publication date: 12-Apr-2019
  • (2018)Feasibility Study of Misbehavior Detection Mechanisms in Cooperative Intelligent Transport Systems (C-ITS)2018 IEEE 87th Vehicular Technology Conference (VTC Spring)10.1109/VTCSpring.2018.8417867(1-5)Online publication date: Jun-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media