ABSTRACT
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination of commercial advertisements via car-to-car communication. However, due to non-cooperative behavior of selfish nodes or even malicious ones in the real-world scenario, such vehicular advertisement system cannot be realized unless proper incentives and security mechanisms are taken into consideration. This paper presents Signature-Seeking Drive (SSD), a secure incentive framework for commercial ad dissemination in VANETs. Unlike currently proposed incentive systems, SSD does not rely on tamper-proof hardware or game theoretic approaches, but leverages a PKI (Public Key Infrastructure) to provide secure incentives for cooperative nodes. With a set of ad dissemination designs proposed, we demonstrate that our SSD is robust in both incentive and security perspectives.
- N. Ben Salem, L. Buttyan, J.-P. Hubaux and M. Jakobsson. A Charging and Rewarding Scheme for Packet Forwarding. ACM MobiHoc, 2003. Google ScholarDigital Library
- S. Buchegger and J.-Y. L. Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad hoc Networks. Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002. Google ScholarDigital Library
- S. Buchegger and J.-Y. L. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes -- Fairness in Dynamic Ad--hoc Networks. ACM MobiHoc, 2002. Google ScholarDigital Library
- L. Buttyan and J. P. Hubaux. Enforcing Service Availability in Mobile Ad-hoc WANs. ACM MobiHoc, 2000. Google ScholarDigital Library
- L. Buttyan and J. P. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM Journal for Mobile Networks (MONET), 2002. Google ScholarDigital Library
- S. Čapkun, L. Buttyan, and J.-P. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-Hop Wireless Networks. ACM Workshop SASN, 2003. Google ScholarDigital Library
- S. Čapkun and J.-P. Hubaux. Secure Positioning of Wireless Devices with Application to Sensor Networks. IEEE INFOCOM, 2005.Google ScholarCross Ref
- J. Y. Choi, M. Jakobsson, and S. Wetzel. Balancing Auditability and Privacy in Vehicular Networks. ACM Workshop Q2SWinet, 2005. Google ScholarDigital Library
- D. D. Clark. The Design Philosophy of the DARPA Internet Protocols. ACM SIGCOMM Computer Communication Review, vol. 25 issue 1, 1995. Google ScholarDigital Library
- J. Deng, R. Han, and S. Mishra. Defending against Path-based DoS Attacks in Wireless Sensor Networks. ACM Workshop SASN, 2005. Google ScholarDigital Library
- 5.9 GHz Dedicated Short Range Communications (DSRC). http://grouper.ieee.org/groups/scc32/dsrc/index.html.Google Scholar
- D. Eastlake and P. Jones. US Secure Hash Algorithm 1 (SHA1). RFC 3174, September 2001. Google ScholarDigital Library
- M. Felegyhazi, J.-P. Hubaux, and L. Buttyan. Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. IEEE Transactions on Mobile Computing (TMC), 2006. Google ScholarDigital Library
- W.R. Heinzelman, J. Kulik, and H. Balakrishnan. Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. ACM MobiCom, 1999. Google ScholarDigital Library
- G. Horn and B. Preneel. Authentication and Payment in Future Mobile Systems., Journal of Computer Security, vol.8, pp.183--207, 2000. Google ScholarDigital Library
- R. Housley, W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure: Certificate and CRL Profile. RFC 3280, April 2002. Google ScholarDigital Library
- E. Huang, J. Crowcroft, and I. Wassell. Rethinking Incentives for Mobile Ad Hoc Networks. ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, 2004. Google ScholarDigital Library
- J.-P. Hubaux, S. Capkun, and J. Luo. The Security and Privacy of Smart Vehicles. IEEE Security & Privacy Magazine, pp. 49--55, 2004. Google ScholarDigital Library
- C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. ACM MobiCom, 2000. Google ScholarDigital Library
- M. Jakobsson, J.P. Hubaux, and L. Buttyan. A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. Financial Crypto, 2003.Google ScholarCross Ref
- I. Khalil, S. Bagchi, and N. B. Shroff. LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. DSN, 2005. Google ScholarDigital Library
- J. Kangasharju and A. Heinemann. Incentives for Electronic Coupon Systems. ACM Workshop MobiShare, 2006. Google ScholarDigital Library
- J.-Y. Lee and R.A. Scholtz. Ranging in a Dense Multipath Environment Using a UWB Radio Link. IEEE Journal of Selected Areas in Communications, 2002. Google ScholarDigital Library
- U. Lee, J.-S. Park, E. Amir, and M. Gerla. FleaNet: A Virtual Market Place on Vehicular Networks. V2VCOM, 2006.Google Scholar
- Y. Liu and Y. R. Yang. Reputation Propagation and Agreement in Mobile Ad-hoc Networks. IEEE WCNC, 2003.Google Scholar
- J. Luo and J.-P. Hubaux. A Survey of Research in Inter-Vehicle Communications. Securing Current and Future Automotive IT Applications, pp 111--122, Springer-Verlag, 2005.Google Scholar
- S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. ACM MobiCom, 2000. Google ScholarDigital Library
- S. McCanne and S. Floyd. ns Network Simulator. http://www.isi.edu/nsnam/ns/Google Scholar
- J.M. McCune, E. Shi, A. Perrig, and M.K. Reiter. Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. IEEE Security & Privacy, 2005. Google ScholarDigital Library
- A. Nandan, S. Das, B. Zhou, G. Pau, and M. Gerla. AdTorrent: Digital Billboards for Vehicular Networks. V2VCOM, 2005.Google Scholar
- V. Naumov, R. Baumann, and T Gross. An Evaluation of Inter-Vehicle Ad Hoc Networks Based on Realistic Vehicular Traces. ACM MobiHoc, 2006. Google ScholarDigital Library
- B. Parno and A. Perrig. Challenges in Securing Vehicular Networks. HotNets-IV, 2005.Google Scholar
- C. Passmann, C. Brenzel, and R. Meschenmoser.Wireless Vehicle to Vehicle Warning System. SAE 2000 World Congress, 2002.Google Scholar
- M. Raya and J.-P. Hubaux. The security of Vehicular Ad Hoc Networks. ACM Workshop SASN, 2005. Google ScholarDigital Library
- M. Raya, D. Jungels, P. Papadimitratos, I. Aad, and J.-P. Hubaux. Certificate Revocation in Vehicular Networks. Technical Report LCA-Report-2006-006, 2006.Google Scholar
- D. Reichardt, M. Miglietta, L. Moretti, P. Morsink, and W. Schulz. CarTALK 2000 -- Safe and Comfortable Driving Based upon Inter-Vehicle-Communication. IEEE Intelligent Vehicle Symposium, 2002.Google Scholar
- M. Reed, P. Syverson, and D. Goldschlag. Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 1998. Google ScholarDigital Library
- A. K. Saha and D. B. Johnson. Modeling Mobility for Vehicular Ad Hoc Networks. ACM Workshop VANET, 2004. Google ScholarDigital Library
- U.S. Census Bureau. 2005 Second Edition TIGER/Line Files. http://www.census.gov/geo/www/tiger/tiger2005se/tgr2005se.htmlGoogle Scholar
- H. Vogt, F. C. Gartner, and H. Pagnia. Supporting Fair Exchange in Mobile Environments. ACM Mobile Networks Journal (MONET), 2003. Google ScholarDigital Library
- Q. Xu, T. Mark, J. Ko, and R. Sengupta. Vehicle-to-Vehicle Safety Messaging in DSRC. ACM Workshop VANET, 2004. Google ScholarDigital Library
- H.-Y.Wei and R. D. Gitlin. Incentive Mechanism Design for Selfish Hybrid Wireless Relay Networks. ACM Mobile Networks Journal (MONET), 2005. Google ScholarDigital Library
- A. Wood and J. Stankovic. Denial of Service in Sensor Networks. IEEE Computer, vol.35, 54--62, Oct. 2002. Google ScholarDigital Library
- X. Yang, J. Liu, F. Zhao, and N. Vaidya. A Vehicle-to-Vehicle Communication Protocol for Cooperative Collision Warning. MobiQuitous, 2004.Google Scholar
- J. Yin, T. ElBatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty. Performance Evaluation of Safety Applications over DSRC Vehicular Ad hoc Networks. ACM Workshop VANET, 2004. Google ScholarDigital Library
- A. Zanella, E. Fasolo, C. F. Chiasserini, M. Meo, M. Franceschinis, and M. A. Spirito. Inter-Vehicular Communication Networks: a Survey. 2nd Internal NEWCOM Workshop, 2006.Google Scholar
- M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian. Security Issues in a Future Vehicular Network. EuroWireless, 2002.Google Scholar
- S. Zhong, J. Chen, and Y. R. Yang. Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. IEEE INFOCOM, 2003.Google Scholar
Index Terms
- Secure incentives for commercial ad dissemination in vehicular networks
Recommendations
Credit-Based Incentives in Vehicular Ad Hoc Networks
SOSE '14: Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System EngineeringGiven the resource consumption of transmitting data packets in Vehicular Ad Hoc Network (VANET), selfish nodes might refuse to transmit messages to others just for maximizing their own profits. Therefore, the communication performance within the whole ...
Rethinking incentives for mobile ad hoc networks
PINS '04: Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systemsWithout sufficient nodes cooperating to provide relaying functions, a mobile ad hoc network cannot function properly. Consequently various proposals have been made which provide incentives for individual users of an ad hoc mobile network to cooperate ...
A secure incentive protocol for mobile ad hoc networks
The proper functioning of mobile ad hoc networks depends on the hypothesis that each individual node is ready to forward packets for others. This common assumption, however, might be undermined by the existence of selfish users who are reluctant to act ...
Comments