Vous êtes sur la page 1sur 5

Abstract compilation of Misbehavior Detection in VANET Vehicle Behavior Analysis to Enhance Security in VANETs Robert K.

Schmidtx, Tim Leinmullerx, Elmar Schoch, Albert Held and Gunter Schaferz Vehicular Ad-Hoc Networks (VANET) will help to improve traffic safety and efficiency. By exchanging information between each other, vehicles can warn drivers or even prepare for a dangerous situation, i.e. engage pre-crash functionalities like airbag preloading. The decision how to react on information received from other vehicles always has to be made locally. For the security of the system, i.e. to prevent misuse or distortion, each vehicle must be able to evaluate its surrounding independently. In this paper, we propose a framework for behavior analysis of other vehicles in the vicinity to approach this problem. By combining the output of multiple behavior analysis modules, each vehicle is assigned a trustworthiness value which may be additionally exchanged among all vehicles, building up reputation. Based on this information, vehicles are classified into trustworthy, untrustworthy or neutral. Applications, for example, may then take this trust rating into consideration in order to react appropriately on incoming information. A Defense Technique against Misbehavior in Vanets Based on Threshold Authentication Jinyuan Sun and Yuguang Fang Misbehavior is expected to occur frequently in VANETs due to the large user base. Defense against misbehavior under different system requirements are critical to mitigate the impact of misbehaving users on the system. This paper proposes a new misbehavior defense scheme based on threshold authentication which renders automatic revocation (i.e., using short-lived credentials) a feasible credential revocation technique without CRLs, which significantly reduces the communication cost and gives chances to unintentional or occasional misbehavior that should be tolerated. Threshold Anonymous Announcement in VANETs Liqun Chen Member, Siaw-Lynn Ng, and Guilin Wang Vehicular ad hoc networks (VANETs) allow wireless communications between vehicles without the aid of a central server. Reliable exchanges of information about road and traffic conditions allow a safer and more comfortable travelling environment. However, such profusion of information may allow unscrupulous parties to violate user privacy. On the other hand, a degree of auditability is desired for law enforcement and maintenance purposes. In this paper we propose a Threshold Anonymous Announcement service using direct anonymous attestation and one-time anonymous authentication to simultaneously achieve the seemingly contradictory goals of reliability, privacy and auditability. VANET Alert Endorsement Using Multi-Source Filters Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer We propose a security model for Vehicular Ad-hoc Networks (VANETs) to distinguish spurious messages from legitimate messages. In this paper, we explore the information available in a VANET environment to enable vehicles to filter out malicious messages which are transmitted by a minority of misbehaving vehicles. More specifically, we introduce a message filtering model that leverages multiple complementary sources of information to construct a multi-source detection model such that drivers are only alerted after some fraction of sources agree. Our Page | 1

filtering model is based on two main components: a threshold curve and a Certainty of Event (CoE) curve. A threshold curve implies the importance of an event to a driver according to the relative position, and a CoE curve represents the confidence level of the received messages. An alert is triggered when the event certainty surpasses a threshold. We analyze our model and provide some initial simulation results to demonstrate the benefits. Distributed Misbehavior Detection in VANETs Mainak Ghosh, Anitha Varghese, Arzad A. Kherani and Arobinda Gupta In any vehicular adhoc network, there is always a possibility of incorrect messages being transmitted either due to faulty sensors and/or intentional malicious activities. Detecting and evicting sources of such misbehavior is an important problem. We observe that the performance of misbehavior detection schemes will depend on the application under consideration and the mobility dynamics of the detecting vehicle. Further, the underlying tradeoff in any such detection algorithm is the balance between False Positives and False Negatives; one would like to detect as many misbehaviors as possible, while at the same time ensuring that the genuine vehicles are not wrongly accused. In this work we propose and analyze (via simulations) the performance of a Misbehavior Detection Scheme (MDS) for Post Crash Notification (PCN) application. We observe that the performance of this proposed scheme is not very sensitive to the exact dynamics of the vehicle on small scales, so that slight error in estimating the dynamics of the detecting vehicle does not degrade the performance of the MDS. Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs Bisheng Liu, YiPing Zhong, ShiYong Zhang Privacy is one of the most important security requirements of VANETs. To avoid being tracked, the idea of pseudonym changes is introduced, which leads to a problem that a malicious vehicle can easily create a new identity without being punished. In this paper, we present a probabilistic method to isolate malicious vehicles with the existence of pseudonym in VANETs. The main idea is to use Bloom filters to record both dishonest and trusted nodes, periodically broadcast these feedbacks and thereby receivers can update their own credits. In our scheme, we assume each car has a tamper-proof device (TPD) carrying out secure operations, such as signing and credit updating. Honest majority is also assumed. A mathematical model is presented to securely evaluate the credit of a node itself with the help of TPD. The credit will then be attached to each important message as a proof of the reliability of the message. We also discuss the potential attacks. Defense against misbehavior in anonymous vehicular ad hoc networks Jinyuan Sun and Yuguang Fang Vehicular ad hoc network (VANET) can offer various services and benefits to VANET users and thus deserves deployment effort. Misusing such network could cause destructive consequences. It is therefore necessary to discourage misbehavior and defend VANET systems against it, in order to ensure correct and smooth operations of the network. In this paper, we review the techniques for handling misbehavior in VANETs, particularly where anonymous communications are desired to conserve user privacy since it adds more complexity to the defense against misbehavior. A new scheme is proposed to punish misbehaving users and can be employed in both inter-vehicle and vehicle-to-infrastructure anonymous communications. Our scheme leverages some threshold authentication technique that dynamically revokes a users Page | 2

credential, while providing the flexibility of whether to reveal the users identity and tolerating unintentional misbehavior such as hardware malfunctioning. Removal of misbehaving insiders in anonymous VANETs Xuejun Zhuo, Jianguo Hao, Duo Liu, Yiqi Dai Vehicular Ad hoc NETworks (VANETs), which provide vehicles with an easy access to exchange the up-to-date traffic status and various kinds of data, have become a promising application of mobile ad-hoc networks. In the life-critical VANETs, security issues are considered as a focal topic. One challenging problem among these issues is the insider misbehavior since it bypasses the traditional security mechanisms such as authentication. The existing works focusing on this problem do not take the privacy issue into account. Their presented solutions are paralyzed in the anonymous VANETs, where the drivers' real identity is protected. In this paper, we propose SLEP and PRP, two novel protocols to efficiently remove the misbehaving insiders from the anonymous VANETs. Through analysis and extensive simulations, we demonstrate that these two protocols can achieve high reaction speed and accuracy for both the local eviction and the permanent revocation to the misbehaving vehicles, at an acceptable cost. Intrusion Detection in VANETs through verification of Vehicle Movement Data Norbert Bibmeyer, Christian Stresing, Kpatch M. Bayarou Many Intrusion Detection approaches for VANETs are proposed. However, not moving fake vehicles and vehicles with a plausible mobility model are not considered in other approaches. In this paper, we propose an innovative signature based intrusion detection method that verifies vehicle movement data by applying a plausibility model. With our approach a single fake vehicle can be identified based on the plausibility model even if it simulates an autonomously valid movement. The results from the intrusion detection can be used to detect on the one hand road side attackers simulating faked traffic congestions and on the other hand attackers that try to deny real congestions by inserting moving vehicles into the network. Filtering false data via authentic consensus in vehicle ad hoc networks Zhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jianbin Hu Emerging applications in vehicle ad hoc networks (VANETs) not only open tremendous business opportunities and navigation benefits, they also pose formidable research challenges in security provisioning. A critical security threat to VANETs is false data injection, that is, an attacker disseminates false information to disrupt the behaviour of the other drivers. Informationdriven operations of vehicular networks make false data injection a very effective attack. As the first line of defence, this paper presents the notion of proof-of-relevance (PoR), which consists in proving that the event reporter is authentically relevant to the event it has reported. The PoR is accomplished by collecting authentic consensus on the event from witness vehicles in a cooperative way. Event reports from attackers who fail to provide this PoR are disregarded, making the network immune to bogus data. A formal security analysis is present to show that our scheme is provable secure. Performance evaluation demonstrates the effectiveness and efficiency of the proposed scheme.

Page | 3

Misbehavior detection scheme with integrated root cause detection in VANET Mainak Ghosh, Anitha Varghese, Arobinda Gupta, Arzad A. Kherani, Skanda Muthaiah Securing communication using broadcast authentication schemes (BAS) in V2V does not always guarantee exchange of correct and/or accurate information. Misbehavior Detection Schemes (MDS) are aimed at detecting the exchange of such information. In this paper, we propose a MDS for Post Crash Notification (PCN) application based on root-cause analysis that is capable of detecting different types of misbehaviors possible, for example, a false crash alert raised in the absence of a crash and a crash alert raised with incorrect positional information. Application of Secondary Information for Misbehavior Detection in VANETs Ashish Vulimiri, Arobinda Gupta, Pramit Roy, Skanda N. Muthaiah, and Arzad A. Kherani Safety applications designed for Vehicular Ad Hoc Networks (VANETs) can be compromised by participating vehicles transmitting false or inaccurate information. Mechanisms that detect and report such misbehaving nodes leading to node eviction or termination of such messages is an important problem in VANETs. In this paper, we investigate the possibility of using correlated information or alerts, called secondary alerts, generated in response to another alert, called as the primary alert to verify the truth or falsity of the primary alert received by a vehicle. We first propose a framework to model how such correlated secondary information observed from more than one source can be integrated to generate a degree of belief for the primary alert. We then show an instantiation of the model proposed for the specific case of Post-Crash Notification as the primary alert received and Slow/Stopped Vehicle Advisory as the secondary alerts possibly generated in response to the primary alert. Finally, we present the design and evaluation of a misbehavior detection scheme (MDS) for PCN application using such correlated information to illustrate that such information can be used efficiently for MDS design. Data-centric Misbehavior Detection in VANETs Sushmita Ruj, Marcos Antonio Cavenaghi, Zhen Huang, Amiya Nayak, Ivan Stojmenovic Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is very important problem with wide range of implications including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. Because of this (\emph{rational behavior}), it is more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can independently decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alert with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. Instead of revoking all the secret credentials of misbehaving nodes, as done in most schemes, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes.

Page | 4

Proving Reliability of Anonymous Information in VANETs Gina Kounga, Thomas Walter, and Sven Lachmund Advances in wireless communications allow setting up communication links between vehicles for the exchange of information between them. Such vehicular ad hoc networks (VANETs) are important to enhance traffic safety since critical environmental conditions, such as road or traffic conditions, can be rapidly exchanged between vehicles in VANETs. However, to be useful for the driver, the information must be reliable, i.e., with great probability, the received information indeed reflects the actual situation. One approach to this is to regard information as reliable if it is confirmed by various sources. To achieve this, messages received must be distinguishable. This may become a threat against the privacy of drivers since by observing messages, vehicles may be traced. In this paper, we address the mentioned problems. We base the reliability of information on the number of different sources that confirmed specific information, and that number must be greater than a given threshold. We address the nontraceability by letting vehicles change their identity frequently. Our approach scales with respect to storage on the vehicle, as well as management of identities at a certification authority.

Page | 5

Vous aimerez peut-être aussi