skip to main content
10.1145/3288599.3288616acmconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspections

Published: 04 January 2019 Publication History

Abstract

For many Intelligent Transportation System (ITS) applications, periodic transmission of beacon messages by a source vehicle is paramount for providing the unhindered service and to maintain its accuracy. A malicious source vehicle could deny beacon messages of a target ITS application and intelligently cover-up this denial with signal loss faced due to wireless channel error and surrounding environment obstacles. In this context, we propose a lightweight technique to detect a beacon denial attacker using Auto-Correlation Function (ACF). This technique possesses higher detection accuracy in comparison to fixed threshold scheme which depends upon the number of beacon messages denied by the source vehicle. Furthermore, we propose a random vehicle inspection scheme for inspecting randomly chosen set of vehicles for beacon denial attack. In addition to reducing computational overhead, the advantage of this scheme is that an attacker with knowledge about detection algorithm cannot decide the time and place of inspection. Simulation results confirm the accurate and lightweight nature of the proposed technique.

References

[1]
Fan Bai, Hariharan Krishnan, Tamer Elbatt, and Gavin Holland. 2012. Towards characterising and classifying communication-based automotive applications from a wireless networking perspective. International Journal of Vehicle Autonomous Systems 10 (2012), 165--197. Issue 3.
[2]
Jeremy J Blum, Andrew Neiswender, and Azim Eskandarian. 2008. Denial of service attacks on inter-vehicle communication networks. In Proceedings of 11th International IEEE Conference on Intelligent Transportation Systems. IEEE, 797--802.
[3]
Eduardo M Carboni and Vania Bogorny. 2015. Inferring Drivers Behavior through Trajectory Analysis. In Intelligent Systems'2014. Vol. 322. Springer, Cham, 837--848.
[4]
Ci Chen, Dejing Zhang, Pablo Samuel Castro, Ning Li, Lifeng Sun, Sinan Li, and Zhen Wang. 2013. iBOAT: Isolation-based online anomalous trajectory detection. IEEE Transactions on Intelligent Transportation Systems 14 (2013), 806--818. Issue 2.
[5]
Penglin Dai, Kai Liu, Qingfeng Zhuge, Edwin H-M Sha, Victor Chung Sing Lee, and Sang Hyuk Son. 2016. Quality-of-experience-oriented autonomous intersection control in vehicular networks. IEEE Transactions on Intelligent Transportation Systems 17 (2016), 1956--1967. Issue 7.
[6]
Neema Davis, Harry Raymond Joseph, Gaurav Raina, and Krishna Jagannathan. 2017. Congestion costs incurred on Indian Roads: A case study for New Delhi. (2017). arXiv:arXiv:1708.08984 https://arxiv.org/abs/1708.08984v1
[7]
Lino Figueiredo, Isabel Jesus, JA Tenreiro Machado, Jose Rui Ferreira, and JL Martins De Carvalho. 2001. Towards the development of intelligent transportation systems. In Proceedings of ITSC 2001 IEEE Intelligent Transportation Systems Proceedings. IEEE, 1206--1211.
[8]
Xianyi Gao, Bernhard Firner, Shridatt Sugrim, Victor Kaiser-Pendergrast, Yulong Yang, and Janne Lindqvist. 2014. Elastic pathing: Your speed is enough to track you. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, New York, NY, USA, 975--986.
[9]
Pedro Gomes, Fausto Vieira, and Michel Ferreira. 2013. Sustainable highways with shadow tolls based on VANET advertising. In Proceeding of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications. ACM, New York, NY, USA, 71--76.
[10]
Dai J, Teng J, Bai X, Shen Z, and Xuan D. 2010. Mobile phone based drunk driving detection. In Proceedings of 4th International Conference on Pervasive Computing Technologies for Healthcare. IEEE, 1--8.
[11]
Paul Kompfner, Zeljko Jeftic, Mariana Andrade, and Peter Christ. 2010. Cooperative Vehicle Infrastructure Systems. Retrieved October 23, 2018 from https://trimis.ec.europa.eu/project/cooperative-vehicle-infrastructure-systems
[12]
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, et al. 2010. Experimental security analysis of a modern automobile. In Proceedings of IEEE Symposium on Security and Privacy. IEEE, 447--462.
[13]
Zicheng Liao, Yizhou Yu, and Baoquan Chen. 2010. Anomaly detection in GPS data based on visual analytics. In Proceedings of IEEE Symposium on Visual Analytics Science and Technology. IEEE, 51--58.
[14]
Siyuan Liu, Lionel M Ni, and Ram Krishnan. 2014. Fraud detection from taxis' driving behaviors. IEEE Transactions on Vehicular Technology 63 (2014), 464--472. Issue 1.
[15]
Vicente Milanes, Jorge Villagra, Jorge Godoy, Javier Simo, Joshué Pérez, and Enrique Onieva. 2012. An intelligent V2I-based traffic management system. IEEE Transactions on Intelligent Transportation Systems 13 (2012), 49--58. Issue 1.
[16]
Yasser L Morgan. 2010. Notes on DSRC & WAVE standards suite: Its architecture, design, and characteristics. IEEE Communications Surveys & Tutorials 12 (2010), 504--518. Issue 4.
[17]
World Health organization. 2009. Global Health Risks: Mortality and burden of disease attributable to selected major risks. Retrieved October 23, 2018 from https://www.who.int/healthinfo/global_burden_disease/GlobalHealthRisks_report_full.pdf
[18]
World Health Organization. 2015. Global status report on road safety. Retrieved October 23, 2018 from http://apps.who.int/iris/bitstream/10665/189242/1/9789241565066_eng.pdf?ua=1
[19]
Panos Papadimitratos, Arnaud De La Fortelle, Knut Evenssen, Roberto Brignolo, and Stefano Cosenza. 2009. Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation. IEEE Communications Magazine 47 (2009), 84--95. Issue 11.
[20]
Otilia Popescu, Sarwar Sha-Mohammad, Hussein Abdel-Wahab, Dimitrie C Popescu, and Samy El-Tawab. 2017. Automatic incident detection in intelligent transportation systems using aggregation of traffic parameters collected through V2I communications. IEEE Intelligent Transportation Systems Magazine 9 (2017), 64--75. Issue 2.
[21]
Elmar Schoch, Frank Kargl, and Michael Weber. 2008. Communication patterns in VANETs. IEEE Communications Magazine 46 (2008), 119--125. Issue 11.
[22]
ETSI Technical Committee Intelligent Transport System. 2009. ETSI TR 102 638 V1.1.1. Technical Report. Sophia Antipolis Cedex, France.
[23]
Roberto A Uzcátegui, Antonio Jose De Sucre, and Guillermo Acosta-Marum. 2009. Wave: A tutorial. IEEE Communications Magazine 47 (2009), 126--133. Issue 5.
[24]
Omar Abdel Wahab, Hadi Otrok, and Azzam Mourad. 2014. A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Computer Communications 41 (2014), 43--54.
[25]
Johan Wahlström, Isaac Skog, and Peter Händel. 2015. Detection of dangerous cornering in GNSS-data-driven insurance telematics. IEEE Transactions on Intelligent Transportation Systems 16 (2015), 3073--3083. Issue 6.
[26]
Masashi Yamamoto, Kenji Fujita, Koji Ohnishi, Masatada Seto, and Kunihiro Kamata. 2008. Development of vehicle-infrastructure cooperative systems using infrared beacon and DSRC: Hiroshima DSSS field operational test. Retrieved October 23, 2018 from https://trid.trb.org/view/900320
[27]
Xuanxia Yao, Xinlei Zhang, Huansheng Ning, and Pengjian Li. 2017. Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Networks 55 (2017), 107--118.
[28]
Daqing Zhang, Nan Li, Zhi-Hua Zhou, Chao Chen, Lin Sun, and Shijian Li. 2011. iBAT: detecting anomalous taxi trajectories from GPS traces. In Proceedings of the 13th international conference on Ubiquitous computing. ACM, New York, NY, USA, 99--108.
[29]
Mingming Zhang, Chao Chen, Tianyu Wo, Tao Xie, Md Zakirul Alam Bhuiyan, and Xuelian Lin. 2017. SafeDrive: Online Driving Anomaly Detection From Large-Scale Vehicle Data. IEEE Transactions on Industrial Informatics 13 (2017), 2087--2096. Issue 4.

Cited By

View all
  • (2022)Security in V2I Communications: A Systematic Literature ReviewSensors10.3390/s2223912322:23(9123)Online publication date: 24-Nov-2022
  • (2022)Beacon Non-Transmission attack and its detection in intelligent transportation systemsInternet of Things10.1016/j.iot.2022.10060220(100602)Online publication date: Nov-2022
  • (2019)Veins based studies for vehicular ad hoc networks2019 International Artificial Intelligence and Data Processing Symposium (IDAP)10.1109/IDAP.2019.8875954(1-7)Online publication date: Sep-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking
January 2019
535 pages
ISBN:9781450360944
DOI:10.1145/3288599
  • General Chairs:
  • R. C. Hansdah,
  • Dilip Krishnaswamy,
  • Nitin Vaidya
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 January 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. auto-correlation function (ACF)
  2. beacon denial attack
  3. intrusion detection
  4. malicious source vehicle
  5. periodic transmission
  6. random inspection
  7. shadowing
  8. wireless channel error

Qualifiers

  • Research-article

Conference

ICDCN '19
Sponsor:
  • SIGOPS
  • Indian Institute of Science

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Security in V2I Communications: A Systematic Literature ReviewSensors10.3390/s2223912322:23(9123)Online publication date: 24-Nov-2022
  • (2022)Beacon Non-Transmission attack and its detection in intelligent transportation systemsInternet of Things10.1016/j.iot.2022.10060220(100602)Online publication date: Nov-2022
  • (2019)Veins based studies for vehicular ad hoc networks2019 International Artificial Intelligence and Data Processing Symposium (IDAP)10.1109/IDAP.2019.8875954(1-7)Online publication date: Sep-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media