Abstract
The past decade has witnessed a growing interest in VANET (Vehicular Ad Hoc NETwork) and its myriad potential applications. Nevertheless, despite the surge in VANET research, security and privacy issues have been the root cause of impeded momentum in VANET deployment. In this paper we focus on misbehavior and Sybil attacks from VANET standpoint. With intrusion capabilities in hand, malicious users in VANET can inject false information and launch Sybil attack. Sybil attack refers to pretending one physical node to be many and in worst case almost all kinds of attacks can be launched in the presence of Sybil attack. Misbehavior in VANET can be categorized as a sub-effect of Sybil attack where a malicious vehicular node(s) spoof legitimate identities. There are two main strategies for avoiding misbehavior in VANET; Entity-centric strategies that focus on the revocation of misbehaving nodes by revocation authorities. On the other hand, Data-centric approach mainly focuses on the soundness of information rather than the source of information. We cover both strategies where decision on which strategy to be used, is taken on the basis of traffic situation. In a dense traffic regime, we propose SADS (Sybil Attack Detection Scheme) whereas in sparse traffic regime, we propose LMDS (Location-Based Misbehavior Detection Scheme). Our proposed schemes leverage position verification of the immediate source of warning message. Furthermore, we guarantee security and privacy (conditional anonymity) for both beacons and warning messages.
This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2012-H0301-12-4004) supervised by the NIPA (National IT Industry Promotion Agency).
This research was supported by Basic Science Research Program through the NRF (National Research Foundation of Korea) funded by the Ministry of Education, Science and Technology (2012009152).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jung, C.D., Sur, C., Park, Y., Rhee, K.-H.: A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 35–45. Springer, Heidelberg (2009)
Raya, M.H., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. J. Computer Security 15, 30 (2007)
Leinmuller, T., Schoch, E., Maihofer, C.: Security requirements and solution concepts in vehicular ad hoc networks. In: Fourth Annual Conference on Wireless on Demand Network Systems and Services, WONS 2007, pp. 84–91 (2007)
Dötzer, F.: Privacy Issues in Vehicular Ad Hoc Networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)
Antolino Rivas, D., Barcel-Ordinas, J.M., Guerrero Zapata, M., Morillo-Pozo, J.D.: Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications 34, 1942–1955 (2011)
Rongxing, L., Xiaodong, L., Haojin, Z., Pin-Han, H., Xuemin, S.: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In: INFOCOM 2008. The 27th Conference on Computer Communications, pp. 1229–1237. IEEE (2008)
Jinyuan, S., Chi, Z., Yanchao, Z., Yuguang, F.: An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. IEEE Transactions on Parallel and Distributed Systems 21, 1227–1239 (2010)
Lei, Z., Qianhong, W., Solanas, A., Domingo-Ferrer, J.: A Scalable Robust Authentication Protocol for Secure Vehicular Communications. IEEE Transactions on Vehicular Technology 59, 1606–1617 (2010)
Plößl, K., Federrath, H.: A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards and Interfaces 30, 390–397 (2008)
DSRC (Dedicated Short-Range Communication) Home, http://www.leearmstrong.com/Dsrc/DSRCHomeset.html
Schmidt, R.K., Leinmuller, T., Schoch, E., Held, A., Schafer, G.: Vehicle Behavior Analysis to Enhance Security in VANETs. In: Fourth Workshop on Vehicle to Vehicle Communications, V2VCOM 2008 (2008)
Yipin, S., Ronxing, L., Xiaodong, L., Xuemin, S., Jinshu, S.: A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications. In: 2010 IEEE International Conference onCommunications (ICC), pp. 1–6 (2010)
Studer, A., Shi, E., Fan, B., Perrig, A.: TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, pp. 1–9 (2009)
Daza, V., Domingo-Ferrer, J., Sebe, F., Viejo, A.: Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology 58, 1876–1886 (2009)
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28. ACM, Montreal (2007)
Yixin, J., Minghui, S., Xuemin, S., Chuang, L.: A robust signature scheme for vehicular networks using Binary Authentication Tree. IEEE Transactions on Wireless Communications 8, 1974–1983 (2009)
Wasef, A., Yixin, J., Xuemin, S.: DCS: An Efficient Distributed-Certificate- Service Scheme for Vehicular Networks. IEEE Transactions on Vehicular Technology 59, 533–549 (2010)
Scheuer, F., Posse, K., Federrath, H.: Preventing Profile Generation in Vehicular Networks. In: IEEE International Conference on Wireless and Mobile Computing Networking and Communications, WIMOB 2008, pp. 520–525 (2008)
Hussain, R., Kim, S., Oh, H.: Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 268–280. Springer, Heidelberg (2009)
Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE Journal on Selected Areas in Communications 25, 1557–1568 (2007)
Tong, Z., Choudhury, R.R., Peng, N., Chakrabarty, K.: P 2 DAP: Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 29, 582–594 (2011)
Raya, M., Manshaei, M.H., Felegyhazi, M., Hubaux, J.-P.: Revocation games in ephemeral networks. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 199–210. ACM, Alexandria (2008)
Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Networks 8, 778–790 (2010)
Sun, J., Fang, Y.: Defense against misbehavior in anonymous vehicular ad hoc networks. Ad Hoc Networks 7, 1515–1525 (2009)
Ruj, S., Cavenaghi, M.A., Zhen, H., Nayak, A., Stojmenovic, I.: On Data- Centric Misbehavior Detection in VANETs. In: 2011 Vehicular Technology Conference (VTC Fall), pp. 1–5. IEEE (2011)
Kamat, P., Baliga, A., Trappe, W.: Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Security and Communication Networks 1, 233–244 (2008)
Chenxi, Z., Rongxing, L., Xiaodong, L., Pin-Han, H., Xuemin, S.: An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. In: The 27th Conference on Computer Communications, INFOCOM 2008, pp. 246–250. IEEE (2008)
Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004)
Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)
Wasef, A., Yixin, J., Xuemin, S.: ECMV: Efficient Certificate Management Scheme for Vehicular Networks. In: Global Telecommunications Conference, IEEE GLOBECOM 2008, pp. 1–5. IEEE (2008)
Douceur, J.R.: The Sybil Attack. In: International Workship on Peer to Peer Systems, pp. 251–260 (2002)
Martucci, L.A., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-certified Sybil-free pseudonyms. In: Proceedings of the First ACM Conference on Wireless Network Security, pp. 154–159. ACM, Alexandria (2008)
Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29–37. ACM, Philadelphia (2004)
Moore, T., Raya, M., Clulow, J., Papadimitratos, P., Anderson, R., Hubaux, J.P.: Fast Exclusion of Errant Devices from Vehicular Networks. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2008, pp. 135–143 (2008)
Ibrahim, K., Weigle, M.C.: CASCADE: Cluster-Based Accurate Syntactic Compression of Aggregated Data in VANETs. In: GLOBECOM Workshops, pp. 1–10. IEEE (2008)
Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Computer Communications 31, 2883–2897 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hussain, R., Kim, S., Oh, H. (2012). Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice. In: Lee, D.H., Yung, M. (eds) Information Security Applications. WISA 2012. Lecture Notes in Computer Science, vol 7690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35416-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-35416-8_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35415-1
Online ISBN: 978-3-642-35416-8
eBook Packages: Computer ScienceComputer Science (R0)