1,399 research outputs found

    Data-centric Misbehavior Detection in VANETs

    Full text link
    Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is very important problem with wide range of implications including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. Because of this (\emph{rational behavior}), it is more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can independently decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alert with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. Instead of revoking all the secret credentials of misbehaving nodes, as done in most schemes, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes.Comment: 12 page

    Overview of security issues in Vehicular ad-hoc networks

    Get PDF
    Vehicular ad-hoc networks (VANETs) are a promising communication scenario. Several new applications are envisioned, which will improve traffic management and safety. Nevertheless, those applications have stringent security requirements, as they affect road traffic safety. Moreover, VANETs face several security threats. As VANETs present some unique features (e.g. high mobility of nodes, geographic extension, etc.) traditional security mechanisms are not always suitable. Because of that, a plethora of research contributions have been presented so far. This chapter aims to describe and analyze the most representative VANET security developments

    Wireless vehicular communications for automatic incident detection and recovery

    Get PDF
    Incident detection is the process by which an incident is brought to the attention of traffic operators in order to design and activate a response plan. To minimize the detection time is crucial to mitigate the incident severity for victims as well to reduce the risk of secondary crashes. Automated incident information dissemination and traffic conditions is useful to alert in-route drivers to decide alternative routes on unexpected traffic congestion and may be also used for the incident recovery process, namely to optimize the response plan including the “nearest” rescue teams, thereby shortening their response times. Wireless vehicular communications, notably the emergent IEEE 802.11p protocol, is the enabling technology providing timely, dependable and secure properties that are essential for the devised target application. However, there are still some open issues with vehicular communications that require further research efforts. This paper presents an overview of the state of the art in wireless vehicular communications and describes the field operational tests proposed within the scope of the upcoming FP7 project ICSI - Intelligent Cooperative Sensing for Improved traffic efficiency

    Heterogeneous Dynamic Spectrum Access in Cognitive Radio enabled Vehicular Networks Using Network Softwarization

    Get PDF
    Dynamic spectrum access (DSA) in cognitive radio networks (CRNs) is regarded as an emerging technology to solve the spectrum scarcity problem created by static spectrum allocation. In DSA, unlicensed users access idle channels opportunistically, without creating any harmful interference to licensed users. This method will also help to incorporate billions of wireless devices for different applications such as Internet-of-Things, cyber-physical systems, smart grids, etc. Vehicular networks for intelligent transportation cyber-physical systems is emerging concept to improve transportation security and reliability. IEEE 802.11p standard comprising of 7 channels is dedicated for vehicular communications. These channels could be highly congested and may not be able to provide reliable communications in urban areas. Thus, vehicular networks are expected to utilize heterogeneous wireless channels for reliable communications. In this thesis, real-time opportunistic spectrum access in cloud based cognitive radio network (ROAR) architecture is used for energy efficiency and dynamic spectrum access in vehicular networks where geolocation of vehicles is used to find idle channels. Furthermore, a three step mechanism to detect geolocation falsification attacks is presented. Performance is evaluated using simulation results

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Get PDF
    An announcement scheme is a system that facilitates vehicles to broadcast road-related information in vehicular ad hoc networks (VANETs) in order to improve road safety and efficiency. Here, the authors propose a new cryptographic primitive for public updating of reputation score based on the Boneh–Boyen–Shacham short group signature scheme. This allows private reputation score retrieval without a secure channel. Using this, the authors devise a privacy-aware announcement scheme using reputation systems which is reliable, auditable, and robust

    Witness-based evidence generation in Vehicular Ad-Hoc Networks

    Get PDF
    7th Conference Embebedd Security in Cars: ESCAR 2009, Düsseldorf, Germany, Nov. 24-25, 2009Vehicular ad-hoc networks (VANETs) are a novel communication scenario. They allow vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. New services are envisioned through these networks affecting road traffic safety. Current proposals are based on sharing each vehicle´s perceptions about their own environment. Nevertheless, it is also possible for a vehicle to know the status of their neighbours in a given moment. Thus, a vehicle can obtain from their neighbours their perceptions about its status. Neighbours then become witnesses. Sometimes it is necessary to prove a vehicle´s behavior in a given moment (e.g. accident dispute, speeding fines, etc.). As own sensors can be tampered with, having testimonies from witnesses can contribute to have a reliable source of information. In this work a protocol to obtain such testimonies and generate digital evidences is proposed. A security analysis is performed to verify the accomplishment of evidence generation requirements.Publicad

    Emergency message dissemination schemes based on congestion avoidance in VANET and vehicular FoG computing

    Get PDF
    With the rapid growth in connected vehicles, FoG-assisted vehicular ad hoc network (VANET) is an emerging and novel field of research. For information sharing, a number of messages are exchanged in various applications, including traffic monitoring and area-specific live weather and social aspects monitoring. It is quite challenging where vehicles' speed, direction, and density of neighbors on the move are not consistent. In this scenario, congestion avoidance is also quite challenging to avoid communication loss during busy hours or in emergency cases. This paper presents emergency message dissemination schemes that are based on congestion avoidance scenario in VANET and vehicular FoG computing. In the similar vein, FoG-assisted VANET architecture is explored that can efficiently manage the message congestion scenarios. We present a taxonomy of schemes that address message congestion avoidance. Next, we have included a discussion about comparison of congestion avoidance schemes to highlight the strengths and weaknesses. We have also identified that FoG servers help to reduce the accessibility delays and congestion as compared to directly approaching cloud for all requests in linkage with big data repositories. For the dependable applicability of FoG in VANET, we have identified a number of open research challenges. © 2013 IEEE
    corecore