Skip to main content

Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7690))

Abstract

The past decade has witnessed a growing interest in VANET (Vehicular Ad Hoc NETwork) and its myriad potential applications. Nevertheless, despite the surge in VANET research, security and privacy issues have been the root cause of impeded momentum in VANET deployment. In this paper we focus on misbehavior and Sybil attacks from VANET standpoint. With intrusion capabilities in hand, malicious users in VANET can inject false information and launch Sybil attack. Sybil attack refers to pretending one physical node to be many and in worst case almost all kinds of attacks can be launched in the presence of Sybil attack. Misbehavior in VANET can be categorized as a sub-effect of Sybil attack where a malicious vehicular node(s) spoof legitimate identities. There are two main strategies for avoiding misbehavior in VANET; Entity-centric strategies that focus on the revocation of misbehaving nodes by revocation authorities. On the other hand, Data-centric approach mainly focuses on the soundness of information rather than the source of information. We cover both strategies where decision on which strategy to be used, is taken on the basis of traffic situation. In a dense traffic regime, we propose SADS (Sybil Attack Detection Scheme) whereas in sparse traffic regime, we propose LMDS (Location-Based Misbehavior Detection Scheme). Our proposed schemes leverage position verification of the immediate source of warning message. Furthermore, we guarantee security and privacy (conditional anonymity) for both beacons and warning messages.

This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2012-H0301-12-4004) supervised by the NIPA (National IT Industry Promotion Agency).

This research was supported by Basic Science Research Program through the NRF (National Research Foundation of Korea) funded by the Ministry of Education, Science and Technology (2012009152).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jung, C.D., Sur, C., Park, Y., Rhee, K.-H.: A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 35–45. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Raya, M.H., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. J. Computer Security 15, 30 (2007)

    Google Scholar 

  3. Leinmuller, T., Schoch, E., Maihofer, C.: Security requirements and solution concepts in vehicular ad hoc networks. In: Fourth Annual Conference on Wireless on Demand Network Systems and Services, WONS 2007, pp. 84–91 (2007)

    Google Scholar 

  4. Dötzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Antolino Rivas, D., Barcel-Ordinas, J.M., Guerrero Zapata, M., Morillo-Pozo, J.D.: Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications 34, 1942–1955 (2011)

    Article  Google Scholar 

  6. Rongxing, L., Xiaodong, L., Haojin, Z., Pin-Han, H., Xuemin, S.: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In: INFOCOM 2008. The 27th Conference on Computer Communications, pp. 1229–1237. IEEE (2008)

    Google Scholar 

  7. Jinyuan, S., Chi, Z., Yanchao, Z., Yuguang, F.: An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. IEEE Transactions on Parallel and Distributed Systems 21, 1227–1239 (2010)

    Article  Google Scholar 

  8. Lei, Z., Qianhong, W., Solanas, A., Domingo-Ferrer, J.: A Scalable Robust Authentication Protocol for Secure Vehicular Communications. IEEE Transactions on Vehicular Technology 59, 1606–1617 (2010)

    Article  Google Scholar 

  9. Plößl, K., Federrath, H.: A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards and Interfaces 30, 390–397 (2008)

    Article  Google Scholar 

  10. DSRC (Dedicated Short-Range Communication) Home, http://www.leearmstrong.com/Dsrc/DSRCHomeset.html

  11. Schmidt, R.K., Leinmuller, T., Schoch, E., Held, A., Schafer, G.: Vehicle Behavior Analysis to Enhance Security in VANETs. In: Fourth Workshop on Vehicle to Vehicle Communications, V2VCOM 2008 (2008)

    Google Scholar 

  12. Yipin, S., Ronxing, L., Xiaodong, L., Xuemin, S., Jinshu, S.: A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications. In: 2010 IEEE International Conference onCommunications (ICC), pp. 1–6 (2010)

    Google Scholar 

  13. Studer, A., Shi, E., Fan, B., Perrig, A.: TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, pp. 1–9 (2009)

    Google Scholar 

  14. Daza, V., Domingo-Ferrer, J., Sebe, F., Viejo, A.: Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology 58, 1876–1886 (2009)

    Article  Google Scholar 

  15. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28. ACM, Montreal (2007)

    Chapter  Google Scholar 

  16. Yixin, J., Minghui, S., Xuemin, S., Chuang, L.: A robust signature scheme for vehicular networks using Binary Authentication Tree. IEEE Transactions on Wireless Communications 8, 1974–1983 (2009)

    Article  Google Scholar 

  17. Wasef, A., Yixin, J., Xuemin, S.: DCS: An Efficient Distributed-Certificate- Service Scheme for Vehicular Networks. IEEE Transactions on Vehicular Technology 59, 533–549 (2010)

    Article  Google Scholar 

  18. Scheuer, F., Posse, K., Federrath, H.: Preventing Profile Generation in Vehicular Networks. In: IEEE International Conference on Wireless and Mobile Computing Networking and Communications, WIMOB 2008, pp. 520–525 (2008)

    Google Scholar 

  19. Hussain, R., Kim, S., Oh, H.: Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 268–280. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE Journal on Selected Areas in Communications 25, 1557–1568 (2007)

    Article  Google Scholar 

  21. Tong, Z., Choudhury, R.R., Peng, N., Chakrabarty, K.: P 2 DAP: Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 29, 582–594 (2011)

    Article  Google Scholar 

  22. Raya, M., Manshaei, M.H., Felegyhazi, M., Hubaux, J.-P.: Revocation games in ephemeral networks. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 199–210. ACM, Alexandria (2008)

    Chapter  Google Scholar 

  23. Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Networks 8, 778–790 (2010)

    Article  Google Scholar 

  24. Sun, J., Fang, Y.: Defense against misbehavior in anonymous vehicular ad hoc networks. Ad Hoc Networks 7, 1515–1525 (2009)

    Article  Google Scholar 

  25. Ruj, S., Cavenaghi, M.A., Zhen, H., Nayak, A., Stojmenovic, I.: On Data- Centric Misbehavior Detection in VANETs. In: 2011 Vehicular Technology Conference (VTC Fall), pp. 1–5. IEEE (2011)

    Google Scholar 

  26. Kamat, P., Baliga, A., Trappe, W.: Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Security and Communication Networks 1, 233–244 (2008)

    Article  Google Scholar 

  27. Chenxi, Z., Rongxing, L., Xiaodong, L., Pin-Han, H., Xuemin, S.: An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. In: The 27th Conference on Computer Communications, INFOCOM 2008, pp. 246–250. IEEE (2008)

    Google Scholar 

  28. Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004)

    Google Scholar 

  29. Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

  30. Wasef, A., Yixin, J., Xuemin, S.: ECMV: Efficient Certificate Management Scheme for Vehicular Networks. In: Global Telecommunications Conference, IEEE GLOBECOM 2008, pp. 1–5. IEEE (2008)

    Google Scholar 

  31. Douceur, J.R.: The Sybil Attack. In: International Workship on Peer to Peer Systems, pp. 251–260 (2002)

    Google Scholar 

  32. Martucci, L.A., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-certified Sybil-free pseudonyms. In: Proceedings of the First ACM Conference on Wireless Network Security, pp. 154–159. ACM, Alexandria (2008)

    Chapter  Google Scholar 

  33. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29–37. ACM, Philadelphia (2004)

    Chapter  Google Scholar 

  34. Moore, T., Raya, M., Clulow, J., Papadimitratos, P., Anderson, R., Hubaux, J.P.: Fast Exclusion of Errant Devices from Vehicular Networks. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, pp. 135–143 (2008)

    Google Scholar 

  35. Ibrahim, K., Weigle, M.C.: CASCADE: Cluster-Based Accurate Syntactic Compression of Aggregated Data in VANETs. In: GLOBECOM Workshops, pp. 1–10. IEEE (2008)

    Google Scholar 

  36. Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Computer Communications 31, 2883–2897 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hussain, R., Kim, S., Oh, H. (2012). Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice. In: Lee, D.H., Yung, M. (eds) Information Security Applications. WISA 2012. Lecture Notes in Computer Science, vol 7690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35416-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35416-8_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35415-1

  • Online ISBN: 978-3-642-35416-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics