scispace - formally typeset
Proceedings ArticleDOI

Detecting and correcting malicious data in VANETs

TLDR
A general approach to evaluating the validity of VANET data, where a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present and accepts the data as dictated by the highest scoring explanations.
Abstract
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data traffic. At the same time, the easy access to information afforded by VANETs potentially enables the difficult security goal of data validation. We propose a general approach to evaluating the validity of VANET data. In our approach a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present. Explanations that are consistent with the node's model of the VANET are scored and the node accepts the data as dictated by the highest scoring explanations. Our techniques for generating and scoring explanations rely on two assumptions: 1) nodes can tell "at least some" other nodes apart from one another and 2) a parsimony argument accurately reflects adversarial behavior in a VANET. We justify both assumptions and demonstrate our approach on specific VANETs.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Securing vehicular ad hoc networks

TL;DR: This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made.
Journal ArticleDOI

Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions

TL;DR: The basic characteristics of vehicular networks are introduced, an overview of applications and associated requirements, along with challenges and their proposed solutions are provided, and the current and past major ITS programs and projects in the USA, Japan and Europe are provided.
Proceedings ArticleDOI

The security of vehicular ad hoc networks

TL;DR: A set of security protocols are provided, it is shown that they protect privacy and the robustness of these protocols are analyzed, and a quantitative assessment of the proposed solution is carried out.
Journal ArticleDOI

A survey on vehicular cloud computing

TL;DR: A taxonomy for vehicular cloud is presented in which special attention has been devoted to the extensive applications, cloud formations, key management, inter cloud communication systems, and broad aspects of privacy and security issues, which found that VCC is a technologically feasible and economically viable technological shifting paradigm for converging intelligent vehicular networks towards autonomous traffic, vehicle control and perception systems.
Proceedings ArticleDOI

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications

TL;DR: An efficient conditional privacy preservation protocol in vehicular ad hoc networks (VANETs) is introduced to address the issue on anonymous authentication for safety messages with authority traceability and can provide fast anonymous authentication and privacy tracking while minimizing the required storage for short-time anonymous keys.
References
More filters
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Proceedings ArticleDOI

Packet leashes: a defense against wormhole attacks in wireless networks

TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Proceedings ArticleDOI

The Sybil attack in sensor networks: analysis & defenses

TL;DR: It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.