Position verification approaches for vehicular ad hoc networks
TLDR
This work proposes detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons and successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.Abstract:
Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs, these so-called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security. In this work, we first analyze the problems that may arise from falsified position data. Then, in order to lessen these problems, we propose detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons. In contrast to other position verification approaches, our solution does not rely on special hardware or dedicated infrastructure. Evaluation based on simulations shows that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheatingread more
Citations
More filters
Journal ArticleDOI
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
Georgios Karagiannis,Onur Altintas,Eylem Ekici,Geert Heijenk,Boangoat Jarupan,K. Lin,Tim Weil +6 more
TL;DR: The basic characteristics of vehicular networks are introduced, an overview of applications and associated requirements, along with challenges and their proposed solutions are provided, and the current and past major ITS programs and projects in the USA, Japan and Europe are provided.
Journal ArticleDOI
Secure vehicular communication systems: design and architecture
Panos Papadimitratos,Levente Buttyán,Tamás Holczer,Elmar Schoch,Julien Freudiger,Maxim Raya,Zhendong Ma,Frank Kargl,Antonio Kung,Jean-Pierre Hubaux +9 more
TL;DR: This work addresses the problem of security and protection of private user information within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution that can be quickly adopted and deployed.
Journal ArticleDOI
Inter-vehicle communication systems: a survey
Mihail L. Sichitiu,Maria Kihl +1 more
TL;DR: This article presents several major classes of applications and the types of services they require from an underlying network and analyzes existing networking protocols in a bottom-up fashion, from the physical to the transport layers, as well as security aspects related to IVC systems.
Journal ArticleDOI
Pseudonym Schemes in Vehicular Networks: A Survey
TL;DR: This survey covers pseudonym schemes based on public key and identity-based cryptography, group signatures and symmetric authentication, and compares the different approaches, gives an overview of the current state of standardization, and identifies open research challenges.
Journal ArticleDOI
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
TL;DR: This paper proposes a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality.
References
More filters
Proceedings ArticleDOI
Mitigating routing misbehavior in mobile ad hoc networks
TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Book ChapterDOI
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Pietro Michiardi,Refik Molva +1 more
TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Journal ArticleDOI
The security and privacy of smart vehicles
TL;DR: Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology, but this evolution has deep implications for security and privacy, which the research community has overlooked so far.
Proceedings ArticleDOI
Secure verification of location claims
TL;DR: The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks, and it is believed that it is well suited for use in small, cheap, mobile devices.
Book ChapterDOI
Advanced detection of selfish or malicious nodes in ad hoc networks
TL;DR: This paper presents simulation results that show the negative effects which selfish nodes cause in MANET and presents new detection mechanisms, called activity-based overhearing, iterative probing, and unambiguous probing, that are highly effective and can reliably detect a multitude of selfish behaviors.