ABSTRACT
Emerging applications in connected vehicles have tremendous potential for advances in safety, navigation, traffic management and fuel efficiency, while also posing new security challenges such as false information attacks. This paper targets the problem of securing critical information that is disseminated among nearby vehicles for safety and traffic efficiency purposes through distributed consensus. We present a consensus algorithm, which uses a "proof of eligibility" test to establish that a group of vehicles are actually within the vicinity of the information source. With the presence of a limited number of compromised (Byzantine faulty) participants, our algorithm provides correct consensus among healthy vehicles in real time. The algorithm provides fast and reliable consensus group formation and private key distribution without privileged members, trusted setup, or leader election. In addition to proving a safety property of our consensus algorithm, we have implemented it on top of a widely-used vehicle simulation environment (SUMO, OMNeT++ and Veins) and evaluated its performance on a model of the streets in a real midtown area. Simulation results demonstrate that the algorithm can reach consensus very efficiently (within 9.5s) and with up to 30% of compromised vehicles in a given area. The simulations also demonstrate the ability of our algorithm to more quickly disseminate information about a traffic accident and more efficiently route traffic around the accident site, as compared to previous robust information dissemination approaches.
- M. Al-Kahtani. 2012. Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on. IEEE.Google ScholarCross Ref
- M. Arshad, Z. Ullah, N. Ahmad, M. Khalid, H. Criuckshank, and Y. Cao. 2018. A survey of local/cooperative-based malicious information detection techniques in VANETs. EURASIP Journal on Wireless Communications and Networking 1 (2018).Google Scholar
- J. Augustine, G. Pandurangan, and P. Robinson. 2013. Fast byzantine agreement in dynamic networks. In Proceedings of the 2013 ACM symposium on Principles of distributed computing. ACM.Google Scholar
- Abdulkader B., Pascale L., and Frédéric G. 2015. Solving Consensus in Opportunistic Networks. In ICDCN.Google Scholar
- Z. Cao, J. Kong, U. Lee, M. Gerla, and Z. Chen. 2008. Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks. In INFOCOM Workshops 2008, IEEE. IEEE.Google Scholar
- M. Castro, B. Liskov, et al. 1999. Practical Byzantine fault tolerance. In OSDI, Vol. 99.Google ScholarDigital Library
- D. Cavin, Y. Sasson, and A. Schiper. 2004. Consensus with unknown participants or fundamental self-organization. In International Conference on Ad-Hoc Networks and Wireless. Springer.Google Scholar
- Q. Chen, Y. Yin, Y. Feng, Z M. Mao, and H. Liu. [n. d.]. Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. ([n. d.]).Google Scholar
- Q. Ding, X. Li, M. Jiang, and X. Zhou. 2010. Reputation management in vehicular ad hoc networks. In Int'l Conf. on Multimedia Technology. IEEE.Google Scholar
- F. Dotzer, L. Fischer, and P. Magiera. 2005. Vars: A vehicle ad-hoc network reputation system. In World of Wireless Mobile and Multimedia Networks, 2005. WoWMoM 2005. Sixth IEEE International Symposium on a. IEEE.Google Scholar
- J. Douceur. 2002. The sybil attack. In International workshop on peer-to-peer systems. Springer.Google ScholarCross Ref
- T. Garip, H. Kim, P. Reiher, and M. Gerla. 2017. INTERLOC: An interferenceaware RSSI-based localization and Sybil attack detection mechanism for vehicular ad hoc networks. In 14th Annual Consumer Comm. & Networking Conf. IEEE.Google Scholar
- M. Ghosh, A. Varghese, A. Gupta, A. A Kherani, and S. Muthaiah. 2010. Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Networks 8, 7 (2010), 778--790.Google ScholarDigital Library
- F. Greve and S. Tixeuil. 2007. Knowledge connectivity vs. synchrony requirements for fault-tolerant agreement in unknown networks. In Dependable Systems and Networks, 2007. DSN'07. 37th Annual IEEE/IFIP International Conference on. IEEE.Google Scholar
- J. Grover, Nitesh. Prajapati, V. Laxmi, and Manoj. Gaur. 2011. Machine learning approach for multiple misbehavior detection in VANET. In International Conference on Advances in Computing and Communications. Springer.Google ScholarCross Ref
- R. Guerraoui, F. Huc, and A. Kermarrec. 2013. Highly dynamic distributed computing with byzantine failures. In Proceedings of the 2013 ACM symposium on Principles of distributed computing. ACM.Google Scholar
- D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker. 2012. Recent Development and Applications of SUMO - Simulation of Urban Mobility. International Journal On Advances in Systems and Measurements 5, 3&4 (December 2012).Google Scholar
- L. Lamport et al. 2001. Paxos made simple. ACM Sigact News 32, 4 (2001).Google Scholar
- L. Lamport, R. Shostak, and M. Pease. 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 3 (1982).Google ScholarDigital Library
- T. Leinmüller, E. Schoch, F. Kargl, and C. Maihöfer. 2010. Decentralized position verification in geographic ad hoc routing. Security and communication networks 3, 4 (2010).Google Scholar
- Z. Li and C. Chigan. 2014. On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Transactions on Mobile Computing 13, 10 (2014).Google ScholarCross Ref
- N. Lo and H. Tsai. 2007. Illusion attack on vanet applications-a message plausibility problem. In Globecom Workshops, 2007 IEEE. IEEE.Google Scholar
- NHTSA. [n. d.]. Federal Motor Vehicle Safety Standards; V2V Communications. https://www.federalregister.gov/documents/2017/01/12/2016--31059/ federal-motor-vehicle-safety-standards-v2v-communications#h-1Google Scholar
- NHTSA. 2017. Federal Motor Vehicle Safety Standards; V2V Communications. Retrieved May 20, 2019 from https://www.federalregister.gov/documents/2017/01/ 12/2016--31059/federal-motor-vehicle-safety-standards-v2v-communicationsGoogle Scholar
- D. Ongaro and J. Ousterhout. 2014. In search of an understandable consensus algorithm.. In USENIX Annual Technical Conference.Google Scholar
- OpenStreetMap contributors. 2017. Planet dump retrieved from https://planet.osm.org . https://www.openstreetmap.org.Google Scholar
- J. Petit and Z. Mammeri. 2011. Dynamic consensus for secured vehicular ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2011 IEEE 7th International Conference on. IEEE.Google Scholar
- C. Qi and M. Z. Morley. [n. d.]. Connected cars can lie, posing a new threat to smart cities. https://theconversation.com/ connected-cars-can-lie-posing-a-new-threat-to-smart-cities-95339Google Scholar
- K. Rabieh, M. Mahmoud, T. N Guo, and M. Younis. 2015. Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs. In 2015 IEEE International Conference on Communications (ICC). IEEE.Google Scholar
- C. Sommer, R. German, and F. Dressler. 2011. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis. IEEE Transactions on Mobile Computing 10, 1 (January 2011). https://doi.org/10.1109/TMC.2010.133Google ScholarDigital Library
- R. van der Heijden, S. Dietzel, and F. Kargl. 2013. Misbehavior detection in vehicular ad-hoc networks. 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication. University of Innsbruck (2013).Google Scholar
- R. van der Heijden, S. Dietzel, T. Leinmüller, and F. Kargl. 2016. Survey on misbehavior detection in cooperative intelligent transportation systems. arXiv preprint arXiv:1610.06810 (2016).Google Scholar
- L.Wu and H. Tsai. 2013. Modeling vehicle-to-vehicle visible light communication link duration with empirical data. In Globecom Workshops, 2013. IEEE.Google Scholar
- W. Wu, J. Cao, and M. Raynal. 2008. Eventual clusterer: A modular approach to designing hierarchical consensus protocols in manets. IEEE Transactions on Parallel & Distributed Systems 6 (2008).Google Scholar
- Y. Yao, B. Xiao, G. Wu, X. Liu, Z. Yu, K. Zhang, and X. Zhou. 2019. Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Transactions on Mobile Computing 18, 2 (2019).Google ScholarDigital Library
Index Terms
- A Byzantine-Tolerant Distributed Consensus Algorithm for Connected Vehicles Using Proof-of-Eligibility
Recommendations
Development of a methodology to demonstrate the environmental impact of connected vehicles under lane-changing conditions
This paper describes a lane-change model for connected vehicles, and evaluates the environmental impact per road level of service (LOS) when a host vehicle makes a lane change. During manual driving, the host vehicle accelerates or decelerates to create ...
Urban Traffic Simulation Methodology for Connected Vehicles Congestion Avoidance
iiWAS '20: Proceedings of the 22nd International Conference on Information Integration and Web-based Applications & ServicesEnhancing traffic experience in congested urban areas is one of the main challenge of Intelligent Transportation Systems caused by road infrastructure, time and investment cost. Since road infrastructure have very small chances to be changed and the ...
Future connected vehicles: challenges and opportunities for spatio-temporal computing
SIGSPATIAL '15: Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information SystemsModern vehicles are increasingly being equipped with rich instrumentation that enables them to collect location aware data on a wide variety of travel related phenomena such as the real-world performance of engines and powertrain, driver preferences, ...
Comments