DocumentCode :
1765768
Title :
Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols
Author :
Dietzel, Stefan ; Petit, Jonathan ; Heijenk, Geert ; Kargl, Frank
Author_Institution :
Inst. of Distrib. Syst., Ulm Univ., Ulm, Germany
Volume :
62
Issue :
4
fYear :
2013
fDate :
41395
Firstpage :
1505
Lastpage :
1518
Abstract :
Vehicular networks (VANETs) are a growing research area with a large number of use cases. Foreseen applications include safety applications, traffic efficiency enhancements, and infotainment services. To make future deployment successful, it is imperative that all applications are matched with proper security mechanisms. Current proposals mostly focus on entity authorization by establishing a public key infrastructure. Such proactive security efficiently excludes nonauthorized entities from the network. However, in the face of insider attackers possessing valid key material, we need to consider data-centric methods to complement entity-centric trust. A promising approach for consistency checks, particularly in multihop scenarios, is to exploit redundant information dissemination. If information is received from both honest and malicious vehicles, chances are that attacks can be detected. In this paper, we propose three graph-based metrics to gauge the redundancy of dissemination protocols. We apply our metrics to a baseline protocol, a geocast protocol, and an aggregation protocol using extensive simulations. In addition, we point out open issues and applications of the metrics, such as colluding attackers and eviction of attacker nodes based on detected attacks. Results show that Advanced Adaptive Geocast behaves almost optimally from a routing efficiency point of view but fails to offer sufficient redundancy for data consistency mechanisms in many scenarios. The simulated aggregation protocol shows sufficient redundancy to facilitate data consistency checking.
Keywords :
data integrity; graph theory; information dissemination; protocols; public key cryptography; telecommunication security; vehicular ad hoc networks; VANET multihop data dissemination protocols; aggregation protocol; attacker node eviction; colluding attackers; consistency checks; data consistency checking; data-centric methods; entity authorization; entity-centric trust; geocast protocol; graph-based metrics; honest vehicles; infotainment services; insider attack detection; malicious vehicles; public key infrastructure; redundant information dissemination; safety applications; security mechanisms; traffic efficiency enhancements; vehicular networks; Bandwidth; Measurement; Protocols; Redundancy; Safety; Sensors; Vehicles; Data consistency; graph theory; protocol analysis; vehicular networks (VANETs);
fLanguage :
English
Journal_Title :
Vehicular Technology, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9545
Type :
jour
DOI :
10.1109/TVT.2012.2236117
Filename :
6392305
Link To Document :
بازگشت