15 research outputs found

    Secure and robust multi-constrained QoS aware routing algorithm for VANETs

    Get PDF
    Secure QoS routing algorithms are a fundamental part of wireless networks that aim to provide services with QoS and security guarantees. In Vehicular Ad hoc Networks (VANETs), vehicles perform routing functions, and at the same time act as end-systems thus routing control messages are transmitted unprotected over wireless channels. The QoS of the entire network could be degraded by an attack on the routing process, and manipulation of the routing control messages. In this paper, we propose a novel secure and reliable multi-constrained QoS aware routing algorithm for VANETs. We employ the Ant Colony Optimisation (ACO) technique to compute feasible routes in VANETs subject to multiple QoS constraints determined by the data traffic type. Moreover, we extend the VANET-oriented Evolving Graph (VoEG) model to perform plausibility checks on the exchanged routing control messages among vehicles. Simulation results show that the QoS can be guaranteed while applying security mechanisms to ensure a reliable and robust routing service

    A Trust Evaluation Framework in Vehicular Ad-Hoc Networks

    Get PDF
    Vehicular Ad-Hoc Networks (VANET) is a novel cutting-edge technology which provides connectivity to millions of vehicles around the world. It is the future of Intelligent Transportation System (ITS) and plays a significant role in the success of emerging smart cities and Internet of Things (IoT). VANET provides a unique platform for vehicles to intelligently exchange critical information, such as collision avoidance or steep-curve warnings. It is, therefore, paramount that this information remains reliable and authentic, i.e., originated from a legitimate and trusted vehicle. Due to sensitive nature of the messages in VANET, a secure, attack-free and trusted network is imperative for the propagation of reliable, accurate and authentic information. In case of VANET, ensuring such network is extremely difficult due to its large-scale and open nature, making it susceptible to diverse range of attacks including man-in-the-middle (MITM), replay, jamming and eavesdropping. Trust establishment among vehicles can increase network security by identifying dishonest vehicles and revoking messages with malicious content. For this purpose, several trust models (TMs) have been proposed but, currently, there is no effective way to compare how they would behave in practice under adversary conditions. Further, the proposed TMs are mostly context-dependent. Due to randomly distributed and highly mobile vehicles, context changes very frequently in VANET. Ideally the TMs should perform in every context of VANET. Therefore, it is important to have a common framework for the validation and evaluation of TMs. In this thesis, we proposed a novel Trust Evaluation And Management (TEAM) framework, which serves as a unique paradigm for the design, management and evaluation of TMs in various contexts and in presence of malicious vehicles. Our framework incorporates an asset-based threat model and ISO-based risk assessment for the identification of attacks against critical risks. TEAM has been built using VEINS, an open source simulation environment which incorporates SUMO traffic simulator and OMNET++ discrete event simulator. The framework created has been tested with the implementation of three types of TM (data-oriented, entity-oriented and hybrid) under four different contexts of VANET based on the mobility of both honest and malicious vehicles. Results indicate that TEAM is effective to simulate a wide range of TMs, where the efficiency is evaluated against different Quality of Service (QoS) and security-related criteria. Such framework may be instrumental for planning smart cities and for car manufacturers.University of Derb

    Intensional Cyberforensics

    Get PDF
    This work focuses on the application of intensional logic to cyberforensic analysis and its benefits and difficulties are compared with the finite-state-automata approach. This work extends the use of the intensional programming paradigm to the modeling and implementation of a cyberforensics investigation process with backtracing of event reconstruction, in which evidence is modeled by multidimensional hierarchical contexts, and proofs or disproofs of claims are undertaken in an eductive manner of evaluation. This approach is a practical, context-aware improvement over the finite state automata (FSA) approach we have seen in previous work. As a base implementation language model, we use in this approach a new dialect of the Lucid programming language, called Forensic Lucid, and we focus on defining hierarchical contexts based on intensional logic for the distributed evaluation of cyberforensic expressions. We also augment the work with credibility factors surrounding digital evidence and witness accounts, which have not been previously modeled. The Forensic Lucid programming language, used for this intensional cyberforensic analysis, formally presented through its syntax and operational semantics. In large part, the language is based on its predecessor and codecessor Lucid dialects, such as GIPL, Indexical Lucid, Lucx, Objective Lucid, and JOOIP bound by the underlying intensional programming paradigm.Comment: 412 pages, 94 figures, 18 tables, 19 algorithms and listings; PhD thesis; v2 corrects some typos and refs; also available on Spectrum at http://spectrum.library.concordia.ca/977460

    Relevanzbasierte Nachrichtenselektion für die serientaugliche Integration von Fahrzeug-zu-Fahrzeug-Kommunikation

    Get PDF
    Die Fahrzeug-zu-Fahrzeug-Kommunikation ermöglicht neue Anwendungen durch den direkten Austausch von Informationen zwischen Fahrzeugen. In den vergangenen Jahrzehnten wurde dazu intensiv geforscht und eine standardisierte Technologie auf der Grundlage von WLAN geschaffen. Die Fahrzeuge erfassen damit andere Verkehrsteilnehmer in ihrem Umfeld, auch über Sichthindernisse hinweg. Bei der Umsetzung von Seriensystemen stehen die Fahrzeughersteller vor der Herausforderung, dass unter Umständen höhere Raten an Nachrichten empfangen werden als von den Fahrzeugsystemen verarbeitet werden können. Diese Arbeit betrachtet diese Problemstellung erstmals umfänglich und schlägt eine Lösung vor, um auch in Überlastsituationen die Funktionalität sicherheitsrelevanter Anwendungen zu gewährleisten. Zunächst werden die auftretenden Nachrichtenraten anhand einer gekoppelten Verkehrs-, Kommunikations- und Anwendungssimulation quantifiziert. Es bestätigt sich, dass auch unter alltäglichen Bedingungen Überlast auftreten kann. Daher wird vorgeschlagen, die Verarbeitung empfangener Nachrichten um zwei Module zu ergänzen, eine Relevanzschätzung und einen Selektionsmechanismus. Die Relevanzschätzung hat die Aufgabe, jede Nachricht nach ihrer Relevanz zu bewerten und mit einem Relevanzwert zu versehen. Je früher sich der Sender und Empfänger einer Nachricht begegnen, desto höher wird die Relevanz bewertet. Der Selektionsmechanismus wählt auf Basis dieser Relevanzwerte die jeweils relevanteste Nachricht zur Weiterverarbeitung aus und verwirft bei Überlast weniger relevante Nachrichten. Sowohl die Relevanzschätzung als auch der Selektionsmechanismus sollten möglichst effizient implementierbar sein. Die Evaluation beider Module zeigt auf, dass die vorgeschlagenen Konzepte für einen Serieneinsatz geeignet sind und die Entwicklung stabiler Gesamtfahrzeugsysteme ermöglichen
    corecore