33 research outputs found
Providing VANET Security Through Active Position Detection
Our main contribution is a novel approach to enhancing position security in VANET. We achieve local and global position security by using the on-board radar to detect neighboring vehicles and to confirm their announced coordinates. We compute cosine similarity among data collected by radar and neighbors\u27 reports to filter the forged data from the truthful data. Based on filtered data, we create a history of vehicle movement. By checking the history and computing similarity, we can prevent a large number of Sybil attacks and some combinations of Sybil and position-based attacks
An Information Theoretic Location Verification System for Wireless Networks
As location-based applications become ubiquitous in emerging wireless
networks, Location Verification Systems (LVS) are of growing importance. In
this paper we propose, for the first time, a rigorous information-theoretic
framework for an LVS. The theoretical framework we develop illustrates how the
threshold used in the detection of a spoofed location can be optimized in terms
of the mutual information between the input and output data of the LVS. In
order to verify the legitimacy of our analytical framework we have carried out
detailed numerical simulations. Our simulations mimic the practical scenario
where a system deployed using our framework must make a binary Yes/No
"malicious decision" to each snapshot of the signal strength values obtained by
base stations. The comparison between simulation and analysis shows excellent
agreement. Our optimized LVS framework provides a defence against location
spoofing attacks in emerging wireless networks such as those envisioned for
Intelligent Transport Systems, where verification of location information is of
paramount importance
A Distributed and Privacy-Aware Speed Advisory System for Optimising Conventional and Electric Vehicles Networks
One of the key ideas to make Intelligent Transportation Systems (ITS) work
effectively is to deploy advanced communication and cooperative control
technologies among the vehicles and road infrastructures. In this spirit, we
propose a consensus-based distributed speed advisory system that optimally
determines a recommended common speed for a given area in order that the group
emissions, or group battery consumptions, are minimised. Our algorithms achieve
this in a privacy-aware manner; namely, individual vehicles do not reveal
in-vehicle information to other vehicles or to infrastructure. A mobility
simulator is used to illustrate the efficacy of the algorithm, and
hardware-in-the-loop tests involving a real vehicle are given to illustrate
user acceptability and ease of the deployment.Comment: This is a journal paper based on the conference paper "Highway speed
limits, optimised consensus, and intelligent speed advisory systems"
presented at the 3rd International Conference on Connected Vehicles and Expo
(ICCVE 2014) in November 2014. This is the revised version of the paper
recently submitted to the IEEE Transactions on Intelligent Transportation
Systems for publicatio
Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance
Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network
Autonomous vehicles: A study of implementation and security
Autonomous vehicles have been invented to increase the safety of transportation users. These vehicles can sense their environment and make decisions without any external aid to produce an optimal route to reach a destination. Even though the idea sounds futuristic and if implemented successfully, many current issues related to transportation will be solved, care needs to be taken before implementing the solution. This paper will look at the pros and cons of implementation of autonomous vehicles. The vehicles depend highly on the sensors present on the vehicles and any tampering or manipulation of the data generated and transmitted by these can have disastrous consequences, as human lives are at stake here. Various attacks against the different type of sensors on-board an autonomous vehicle are covered