skip to main content
10.1145/1860058.1860067acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

VANET alert endorsement using multi-source filters

Published:24 September 2010Publication History

ABSTRACT

We propose a security model for Vehicular Ad-hoc Networks (VANETs) to distinguish spurious messages from legitimate messages. In this paper, we explore the information available in a VANET environment to enable vehicles to filter out malicious messages which are transmitted by a minority of misbehaving vehicles. More specifically, we introduce a message filtering model that leverages multiple complementary sources of information to construct a multi-source detection model such that drivers are only alerted after some fraction of sources agree. Our filtering model is based on two main components: a threshold curve and a Certainty of Event (CoE) curve. A threshold curve implies the importance of an event to a driver according to the relative position, and a CoE curve represents the confidence level of the received messages. An alert is triggered when the event certainty surpasses a threshold. We analyze our model and provide some initial simulation results to demonstrate the benefits.

References

  1. }}F. Bai, T. Elbatt, G. Hollan, H. Krishnan, and V. Sadekar. Towards Characterizing and Classifying Communication-based Automotive Applications from a Wireless Networking Perspective. In IEEE AutoNet, 2006.Google ScholarGoogle Scholar
  2. }}F. Bai and B. Krishnamachari. Spatio-temporal Variations of Vehicle Traffic in VANETs: Facts and Implications. In ACM VANET, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}Cambridge Systematics, Inc. Crashes vs. Congestion: What's the cost to society? http://www.aaanewsroom.net/Assets/Files/20083591910.CrashesVsCongestionFullReport2.28.08.pdf.Google ScholarGoogle Scholar
  4. }}K. Chang and K. Chon. A Car-Following Model Applied Reaction Times Distribution and Perceptual Threshold. Journal of the Eastern Asia Society for Transportation Studies, 6:1888--1903, 2005.Google ScholarGoogle Scholar
  5. }}L. Eschenauer, V. D. Gligor, and J. Baras. On Trust Establishment in Mobile Ad-Hoc Networks. In Proceedings of the Security Protocols Workshop, 2002.Google ScholarGoogle Scholar
  6. }}M. Ghosh, A. Varghese, A. Gupta, and A. A. Kherani. Distributed misbehavior detection in VANETs. In WCNC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah. Detecting Misbehaviors in VANET With Integrated Root-Cause Analysis. Ad Hoc Networks, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}P. Golle, D. Greene, and J. Staddon. Detecting and Correcting Malicious Data in VANETs. In ACM VANET, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}Y.-C. Hu and K. P. Laberteaux. Strong VANET Security on a Budget. In ESCAR, 2006.Google ScholarGoogle Scholar
  10. }}IBM. IBM 4764 PCI-X cryptographic coprocessor. http://www-03.ibm.com/security/cryptocards/pcixcc/order4764.shtml.Google ScholarGoogle Scholar
  11. }}IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Standards, 2006.Google ScholarGoogle Scholar
  12. }}National Highway Traffic Safety Administration (NHTSA). Fatality Analysis Reporting System. http://www-fars.nhtsa.dot.gov/.Google ScholarGoogle Scholar
  13. }}M. Raya and J.-P. Hubaux. The security of vehicular ad hoc networks. In ACM SASN, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}M. Raya, P. P. Papadimitratos, V. Gligor, and J.-P. Hubaux. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In IEEE Infocom, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  15. }}R. K. Schmidt, T. Leinmuller, E. Schoch, A. Held, and G. Schafer. Vehicle Behavior Analysis to Enhance Security in VANETs. In V2VCOM, 2008.Google ScholarGoogle Scholar
  16. }}A. Studer, F. Bai, B. Bellur, and A. Perrig. Flexible, Extensible, and Efficient VANET Authentication. In ESCAR, 2008.Google ScholarGoogle Scholar
  17. }}A. Studer, M. Luk, and A. Perrig. Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs. In SecureComm, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  18. }}A. Studer, E. Shi, F. Bai, and A. Perrig. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. In IEEE SECON, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}Texas Transportation Institute. Urban Mobility Report. http://mobility.tamu.edu/ums/report/.Google ScholarGoogle Scholar
  20. }}G. Theodorakopoulos and J. S. Baras. On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks. IEEE Journal on Selected Areas in Communications, 24(2):318--328, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}Y. Zang, L. Stibor, H.-J. Reumerman, and H. Chen. Wireless Local Danger Warning Using Inter-vehicle Communications in Highway Scenarios. In 14th European Wireless Conference, 2008.Google ScholarGoogle Scholar

Index Terms

  1. VANET alert endorsement using multi-source filters

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        VANET '10: Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking
        September 2010
        106 pages
        ISBN:9781450301459
        DOI:10.1145/1860058

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate26of64submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader