skip to main content
10.1145/1161064.1161075acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Improved security in geographic ad hoc routing through autonomous position verification

Published:29 September 2006Publication History

ABSTRACT

Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security.In order to lessen this problem, we propose a detection mechanism that is capable of recognizing nodes cheating about their position in beacons (periodic position dissemination in most single-path geographic routing protocols, e.g. GPSR). Unlike other proposals described in the literature, our detection does not rely on additional hardware or special nodes, which contradicts the ad hoc approach. Instead, this mechanism uses a number of different independent sensors to quickly give an estimation of the trustworthiness of other nodes' position claims without using dedicated infrastructure or specialized hardware.The simulative evaluation proves that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.

References

  1. Blazevic, L., Giordano, S., and Boudec, J. L. Self organized terminode routing. Technical Report DSC/2000/040, Swiss Federal Institute of Technology, 2000.Google ScholarGoogle Scholar
  2. C2C-CC. Car2Car Communication Consortium. http://www.car-to-car.org/.Google ScholarGoogle Scholar
  3. CarTalk 2000. CarTalk 2000. http://www.cartalk2000.net, 2004.Google ScholarGoogle Scholar
  4. Couto, D. S. J. D., and Morris, R. Location proxies and intermediate node forwarding for practical geographic forwarding. Tech. Rep. MIT-LCS-TR-824, MIT Laboratory for Computer Science, June 2001.Google ScholarGoogle Scholar
  5. Franz, W., Wagner, C., Maihöfer, C., and Hartenstein, H. FleetNet: Platform for Inter-Vehicle Communications. In Procedings of 1st International Workshop on Intelligent Transportatin (WIT'04) (Hamburg, Germany, Mar. 2004).Google ScholarGoogle Scholar
  6. Giordano, S., Stojmenovic, I., and Blazevie, L. Position based routing algorithms for ad hoc networks: a taxonomy. IEEE Communications Magazine 40, 7 (July 2001), 128--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hou, T.-C., and Li, V. Transmission Range Control in Multihop Packet Radio Networks. IEEE Transactions on Communications 34, 1 (Jan. 1986), 38--44.Google ScholarGoogle Scholar
  8. Hu, Y.-C., Perrig, A., and Johnson, D. B. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the ACM Workshop on Wireless security (WISE) (San Diego, CA, USA, 2003), pp. 30--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hubaux, J.-P., Čapkun, S., and Luo, J. The Security and Privacy of Smart Vehicles. IEEE Security and Privacy 4, 3 (2004), 49--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kargl, F., Klenk, A., Schlott, S., and Weber, M. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004) (Sept. 2004), Springer Verlag, pp. 152--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Karp, B., and Kung, H. Greedy Perimeter Stateless Routing for Wireless Networks. In Proceedings of the Sixth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000) (Boston, USA, Aug. 2000), pp. 243--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ko, Y., and Vaidya, N. Location-aided routing (LAR) in mobile ad hoc networks. In Proceedings of the Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 1998) (1998), pp. 66--75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Leinmüller, T., and Schoch, E. Greedy routing in highway scenarios: The impact of position faking nodes. In Proceedings of Workshop On Intelligent Transportation (WIT 2006) (Mar. 2006).Google ScholarGoogle Scholar
  14. Leinmüller, T., Schoch, E., Kargl, F., and Maihöfer, C. Influence of Falsified Position Data on Geographic Ad-Hoc Routing. In Proceedings of the second European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2005) (July 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Maihöfer, C., Eberhardt, R., and Schoch, E. CGGC: Cached Greedy Geocast. In Proceedings of 2nd Intl. Conference Wired/Wireless Internet Communications (WWIC 2004) (Frankfurt (Oder), Germany, Feb. 2004), vol. 2957 of Lecture Notes in Computer Science, Springer Verlag.Google ScholarGoogle ScholarCross RefCross Ref
  16. Marti, S., Giuli, T. J., Lai, K., and Baker, M. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (2000), pp. 255--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mauve, M., Widmer, J., and Hartenstein, H. A Survey on Position-Based Routing in Mobile Ad-Hoc Networks. IEEE Network 1, 6 (Dec. 2001), 30--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Michiardi, P., and Molva, R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security (Deventer, The Netherlands, The Netherlands, 2002), Kluwer, B.V., pp. 107--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Newsome, J., Shi, R., Song, D., and Perrig, A. The Sybil Attack in Sensor Networks: Analysis and Defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004) (Apr. 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Saha, A. K., and Johnson, D. B. Modeling mobility for vehicular ad-hoc networks. In Proceedings of the first ACM workshop on Vehicular ad hoc networks (VANET '04) (2004), ACM Press, pp. 91--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sastry, N., Shankar, U., and Wagner, D. Secure verification of location claims. In Proceedings of the 2003 ACM workshop on Wireless security (WiSe'03) (2003), ACM Press, pp. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Takagi, H., and Kleinrock, L. Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Transactions on Communications 32, 3 (Mar. 1984), 246--257.Google ScholarGoogle ScholarCross RefCross Ref
  23. Čapkun, S., Buttyán, L., and Hubaux, J.-P. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 2003) (2003), ACM Press, pp. 21--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Vora, A., and Nesterenko, M. Secure location verification using radio broadcast. In Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS 2004) (2004), Springer Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. VSCC. US Vehicle Safety Communication Consortium. http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm.Google ScholarGoogle Scholar

Index Terms

  1. Improved security in geographic ad hoc routing through autonomous position verification

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        VANET '06: Proceedings of the 3rd international workshop on Vehicular ad hoc networks
        September 2006
        112 pages
        ISBN:1595935401
        DOI:10.1145/1161064

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 September 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate26of64submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader