Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2307888.2307902acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Central misbehavior evaluation for VANETs based on mobility data plausibility

Published: 25 June 2012 Publication History

Abstract

Trustworthy communication in vehicular ad-hoc networks is essential to provide functional and reliable traffic safety and efficiency applications. A Sybil attacker that is simulating "ghost vehicles" on the road, by sending messages with faked position statements, must be detected and excluded permanently from the network. Based on misbehavior detection systems, running on vehicles and roadside units, a central evaluation scheme is proposed that aims to identify and exclude attackers from the network. The proposed algorithms of the central scheme are using trust and reputation information provided in misbehavior reports in order to guarantee long-term functionality of the network. A main aspect, the scalability, is given as misbehavior reports are created only if an incident is detected in the VANET. Therefore, the load of the proposed central system is not related to the total number of network nodes. A simulation study is conducted to show the effective and reliable detection of attacker nodes, assuming a majority of benign misbehavior reporters. Extensive simulations show that a few benign nodes (at least three witnesses) are enough to significantly decrease the fake node reputation and thus identify the cause of misbehavior. In case of colluding attackers, simulations show that if 37% of neighbor nodes cooperate, then an attack could be obfuscated.

References

[1]
C. Basnayake, G. Lachapelle, and J. Bancroft. Relative positioning for vehicle-to-vehicle communication-enabled vehicle safety applications. In ITS World Congress. ITS America, October 2011.
[2]
G. Bella, G. Costantino, and S. Riccobene. Managing reputation over manets. In Information Assurance and Security (ISIAS), September 2008.
[3]
N. Bißmeyer, J. Petit, D. Estor, M. Sall, J. P. Stotz, M. Feiri, R. Moalla, and S. Dietzel. PRESERVE d1.2 v2x security architecture. Deliverable, PRESERVE consortium, November 2011.
[4]
N. Bißmeyer, C. Stresing, and K. Bayarou. Intrusion detection in vanets through verification of vehicle movement data. In IEEE Vehicular Networking Conference (VNC), December 2010.
[5]
Z. Cao, J. Kong, U. Lee, M. Gerla, and Z. Chen. Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks. In INFOCOM Workshops 2008. IEEE, April 2008.
[6]
C. Chen, X. Wang, W. Han, and B. Zang. A robust detection of the sybil attack in urban vanets. In Distributed Computing Systems Workshops, 2009. ICDCS Workshops '09, pages 270--276, June 2009.
[7]
G. D. Crescenzo, Y. Ling, S. Pietrowicz, and T. Zhang. Non-interactive malicious behavior detection in vehicular networks. In IEEE Vehicular Networking Conference (VNC), December 2010.
[8]
P. Ebinger and N. Bißmeyer. Terec: Trust evaluation and reputation exchange for cooperative intrusion detection in manets. In Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, CNSR '09, pages 378--385, May 2009.
[9]
ETSI - European Telecommunications Standards Institute. Intelligent transport systems (ITS); vehicular communications; basic set of applications; part 2: Specification of cooperative awareness basic service. Technical Standard TS 102 637-2, ETSI, April 2010.
[10]
M. Ghosh, A. Varghese, A. Kherani, and A. Gupta. Distributed misbehavior detection in vanets. In Wireless Communications and Networking Conference (WCNC). IEEE, April 2009.
[11]
IEEE Computer Society. IEEE standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part II: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. Technical report, IEEE Std 802.11p, 2010.
[12]
IEEE Computer Society. Draft standard for wireless access in vehicular environments - security services for applications and management messages. Technical Report 1609.2 - 2011 (D9), Institute of Electrical and Electronics Engineers, May 2011.
[13]
A. Jaeger, N. Bißmeyer, H. Stübing, and S. A. Huss. A novel framework for efficient mobility data verification in vehicular ad-hoc networks. International Journal of ITS Research, ITS Japan, 9(3), September 2011.
[14]
C. Laurendeau and M. Barbeau. Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks. EURASIP J. Wirel. Commun. Netw., 2009:2:1--2:13, February 2009.
[15]
T. Leinmüller, R. K. Schmidt, E. Schoch, A. Held, and G. Schäfer. Modeling roadside attacker behavior in vanets. In GLOBECOM Workshops, 2008 IEEE, pages 1--10, December 2008.
[16]
T. Leinmüller, E. Schoch, and F. Kargl. Position verficiation approaches for vehicular ad hoc networks. Wireless Communications, IEEE, 13(5):16--21, October 2006.
[17]
F. G. Mármol and G. M. Pérez. Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 35(3):934--941, May 2012. Special Issue on Trusted Computing and Communications.
[18]
M. Obst, R. Schubert, and N. Mattern. Gnss-based relative localization for urban transport applications within the covel project. In ITS World Congress, Orlando, USA, October 2011. ITS America.
[19]
B. Ostermaier, F. Dötzer, and M. Strassberger. Enhancing the security of local dangerwarnings in vanets - a simulative analysis of voting schemes. In Availability, Reliability and Security (ARES), pages 422--431, April 2007.
[20]
J. Petit, M. Feiri, and F. Kargl. Spoofed data detection in vanets using dynamic thresholds. In IEEE Vehicular Networking Conference (VNC), November 2011.
[21]
M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux. Eviction of misbehaving and faulty nodes in vehicular networks. Selected Areas in Communications, IEEE Journal, 25(8):1557--1568, October 2007.
[22]
Z. Ren, W. Li, Q. Yang, S. Wu, and L. Chen. Location security in geographic ad hoc routing for vanets. In Ultra Modern Telecommunications Workshops (ICUMT), pages 1--6, October 2009.
[23]
S. Ries. Certain trust: a trust model for users and agents. In Proceedings of the 2007 ACM symposium on Applied computing, SAC '07, pages 1599--1604, March 2007.
[24]
R. K. Robert K. Schmidt, T. Leinmüller, E. Schoch, A. Held, and G. Schäfer. Vehicle behavior analysis to enhance security in vanets. In Proceedings of the 4th IEEE Vehicle-to-Vehicle Communications Workshop (V2VCOM), June 2008.
[25]
SAE International™. Surface vehicle standard - dedicated short range communications (DSRC) message set dictionary. Technical report, SAE J2735, November 2009.
[26]
R. Schmidt, T. Leinmüller, and A. Held. Defending against roadside attackers. In 16th World Congress on Intelligent Transport Systems, Stockholm, Sweden, September 2009.
[27]
C. Weiß. Safe and intelligent mobility test field germany; deliverable d21.5; specification of IT security solution. Technical report, Fraunhofer-Institut SIT, Darmstadt, Germany, October 2009.
[28]
B. Xiao, B. Yu, and C. Gao. Detection and localization of sybil nodes in vanets. In Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, DIWANS '06, pages 1--8, New York, NY, USA, September 2006. ACM.
[29]
J. Zhang. A survey on trust management for vanets. In Advanced Information Networking and Applications (AINA), pages 105--112, March 2011.

Cited By

View all
  • (2025)Secure Reputation-Based Authentication With Malicious Detection in VANETsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.339955022:1(359-372)Online publication date: Jan-2025
  • (2024)VANET: A Machine Learning ApproachVehicular Networks - Principles, Enabling Technologies and Modern Applications10.5772/intechopen.109349Online publication date: 29-May-2024
  • (2024)Position Falsification Detection Approach Using Travel Distance-Based FeatureTransport and Telecommunication Journal10.2478/ttj-2024-002025:3(278-288)Online publication date: 26-Jun-2024
  • Show More Cited By

Index Terms

  1. Central misbehavior evaluation for VANETs based on mobility data plausibility

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    VANET '12: Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
    June 2012
    158 pages
    ISBN:9781450313179
    DOI:10.1145/2307888
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 June 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. c2c
    2. c2x
    3. confidence
    4. ids
    5. misbehavior
    6. reputation
    7. trust
    8. v2v
    9. v2x
    10. vanet

    Qualifiers

    • Research-article

    Conference

    MobiSys'12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 26 of 64 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)20
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Secure Reputation-Based Authentication With Malicious Detection in VANETsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.339955022:1(359-372)Online publication date: Jan-2025
    • (2024)VANET: A Machine Learning ApproachVehicular Networks - Principles, Enabling Technologies and Modern Applications10.5772/intechopen.109349Online publication date: 29-May-2024
    • (2024)Position Falsification Detection Approach Using Travel Distance-Based FeatureTransport and Telecommunication Journal10.2478/ttj-2024-002025:3(278-288)Online publication date: 26-Jun-2024
    • (2024)Detection of Position Falsification Attacks in VANETs Using Ensemble Learning2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)10.1109/AIIoT58432.2024.10574595(1-6)Online publication date: 3-May-2024
    • (2024)Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANETIEEE Access10.1109/ACCESS.2024.345336812(124414-124427)Online publication date: 2024
    • (2023)A Double-Layer Blockchain Based Trust Management Model for Secure Internet of VehiclesSensors10.3390/s2310469923:10(4699)Online publication date: 12-May-2023
    • (2023)A bayesian-based distributed trust management scheme for connected vehicles’ securityPeer-to-Peer Networking and Applications10.1007/s12083-023-01515-816:5(2290-2306)Online publication date: 22-Jul-2023
    • (2022)SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANETProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3543788(1-10)Online publication date: 23-Aug-2022
    • (2022)Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position PaperIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.316551323:10(18273-18287)Online publication date: Oct-2022
    • (2022)Location-Based Schemes for Mitigating Cyber Threats on Connected and Automated Vehicles: A Survey and Design FrameworkIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2020.303875523:4(2919-2937)Online publication date: Apr-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media