scispace - formally typeset
Open AccessJournal ArticleDOI

Position verification approaches for vehicular ad hoc networks

TLDR
This work proposes detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons and successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.
Abstract
Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs, these so-called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security. In this work, we first analyze the problems that may arise from falsified position data. Then, in order to lessen these problems, we propose detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons. In contrast to other position verification approaches, our solution does not rely on special hardware or dedicated infrastructure. Evaluation based on simulations shows that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating

read more

Citations
More filters
Journal ArticleDOI

Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions

TL;DR: The basic characteristics of vehicular networks are introduced, an overview of applications and associated requirements, along with challenges and their proposed solutions are provided, and the current and past major ITS programs and projects in the USA, Japan and Europe are provided.
Journal ArticleDOI

Secure vehicular communication systems: design and architecture

TL;DR: This work addresses the problem of security and protection of private user information within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution that can be quickly adopted and deployed.
Journal ArticleDOI

Inter-vehicle communication systems: a survey

TL;DR: This article presents several major classes of applications and the types of services they require from an underlying network and analyzes existing networking protocols in a bottom-up fashion, from the physical to the transport layers, as well as security aspects related to IVC systems.
Journal ArticleDOI

Pseudonym Schemes in Vehicular Networks: A Survey

TL;DR: This survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication, and compares the different approaches, gives an overview of the current state of standardization, and identifies open research challenges.
Journal ArticleDOI

An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks

TL;DR: This paper proposes a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality.
References
More filters
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Book ChapterDOI

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Journal ArticleDOI

The security and privacy of smart vehicles

TL;DR: Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology, but this evolution has deep implications for security and privacy, which the research community has overlooked so far.
Proceedings ArticleDOI

Secure verification of location claims

TL;DR: The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks, and it is believed that it is well suited for use in small, cheap, mobile devices.
Book ChapterDOI

Advanced detection of selfish or malicious nodes in ad hoc networks

TL;DR: This paper presents simulation results that show the negative effects which selfish nodes cause in MANET and presents new detection mechanisms, called activity-based overhearing, iterative probing, and unambiguous probing, that are highly effective and can reliably detect a multitude of selfish behaviors.