Data Verification and Misbehavior Detection in Vehicular Ad-hoc Networks

Authors

  • Fuad A. Ghaleb Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Anazida Zainal Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Murad A. Rassam Faculty of Engineering and Information Technology, Taiz University, Yemen

DOI:

https://doi.org/10.11113/jt.v73.4190

Keywords:

ITS, VANET, misbehavior detection, malicious data verification

Abstract

Vehicle Ad hoc Network (VANET) is an emerging and promising technology for the Intelligent Transportation System (ITS). VANET can help to increase safety and traffic efficiency in flexible and feasible way. However, disseminating incorrect information in VANET has wide range of implications effecting drivers’ behaviors and causing serious, and may be catastrophic, results. Misbehaving attackers can create traffic illusion to disturb VANET operations as well as the potential deployment of safety and traffic efficiency applications. In this paper, a holistic view of the existing misbehavior detection approaches for countermeasures against spreading malicious data in VANET is studied. In addition, the importance and the challenges faced when verifying the correctness of VANET messages are discussed. Finally, the drawbacks of existing detection and verification approaches are analyzed.  

References

Raya, M., et al. 2008. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE.

Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)-Resource Manager. IEEE Std 1609.1-2006, 2006. 1–71.

Administration, N.H.T.S. Vehicle Safety Communications Project Task 3 Final Report, Identify Intelligent Vehicle Safety Applications Enabled by Dsrc. US Department of Transportation. Technical Report DOT HS 809 859 2005.(Technical Report DOT HS 809 859 2005).

Consortium, C.C.C., Car 2 Car Communication Consortium Manifesto. Http://car-to-car.org/index.php?id=31.

Al-Sultan, S., et al. 2014. A Comprehensive Survey on Vehicular Ad Hoc Network. Journal of Network and Computer Applications. 37(0): 380–392.

Hartenstein, H. and K.P. Laberteaux. 2008. A Tutorial Survey on Vehicular Ad Hoc Networks. Communications Magazine, IEEE. 46(6): 164–171.

Xiaodong, L., et al. 2008. Security in Vehicular Ad Hoc Networks. Communications Magazine, IEEE. 46(4): 88–95.

Raya, M., P. Papadimitratos, and J. P. Hubaux. 2006. SECURING Vehicular Communications. Wireless Communications, IEEE. 13(5): 8–15.

Hubaux, J.-P., S. Capkun, and J. Luo. 2004. The Security and Privacy of Smart Vehicles. IEEE Security & Privacy Magazine, 2 (LCA-ARTICLE-2004-007). 49–55.

Zeadally, S., et al. 2012.Vehicular ad Hoc Networks (VANETS): Status, Results, and Challenges. Telecommunication Systems. 50(4): 217–241.

Nai-Wei, L. and T. Hsiao-Chien. 2007. Illusion Attack on VANET Applications-A Message Plausibility Problem. In Globecom Workshops, IEEE.

Kounga, G., T. Walter, and S. Lachmund. 2009. Proving Reliability of Anonymous Information in VANETs. Vehicular Technology, IEEE Transactions on. 58(6): 2977–2989.

Ghosh, M., et al. 2010. Detecting Misbehaviors in VANET with Integrated Root-cause Analysis. Ad Hoc Networks. 8(7): 778–790.

Ruj, S., et al. 2011. On Data-centric Misbehavior Detection in VANETs. in Vehicular Technology Conference (VTC Fall), 2011 IEEE.

Muriel, M., A. Busson, and V. Veque. 2009. Performance Evaluation of VANET Under Realistic Vehicular Traffic Assumption. Traffic and Granular Flow '07, ed. C. AppertRolland, et al. 739–744.

Raya, M., et al. 2007. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. Selected Areas in Communications. IEEE Journal on. 25(8): 1557–1568.

Samara, G., W.A. Al-Salihy, and R. Sures. 2010. Security issues And Challenges of Vehicular Ad Hoc Networks (vanet). In New Trends in Information Science and Service Science (NISS), 2010 4th International Conference on. IEEE.

Yang, X., et al. 2004. A Vehicle-to-vehicle Communication Protocol For Cooperative Collision Warning. In Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International Conference on. IEEE.

Thompson, J. P. and C. D. Wang. 1997. Apparatus and Method for Motion Detection and Tracking of Objects in a Region for Collision Avoidance Utilizing A Real-time Adaptive Probabilistic Neural Network. Google Patents.

Gongjun, Y., S. Olariu, and M. C. Weigle. 2009. Providing Location Security in Vehicular Ad Hoc Networks. Wireless Communications. IEEE, 16(6): 48–55.

El Defrawy, K. and G. Tsudik. 2011. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. Mobile Computing, IEEE Transactions on. 10(9): 1345–1358.

Leinmuller, T., E. Schoch, and F. Kargl. 2006. Position Verification Approaches for Vehicular Ad Hoc Networks. Wireless Communications, IEEE. 13(5): 16–21.

Drawil, N. M., H. M. Amar, and O. A. Basir, GPS Localization Accuracy Classification: A Context-Based Approach. Intelligent Transportation Systems, IEEE Transactions on. 2013. 14(1): 262–273.

Yang, T., et al. 2013, MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET, in Web Technologies and Applications, Y. Ishikawa, et al. Editors. Springer Berlin Heidelberg. 583–594.

Yu, B., C.Z. Xu, and B. Xiao. 2013. Detecting Sybil Attacks in VANETs. Journal of Parallel and Distributed Computing. 73(6): 746–756.

Bibhu, V., et al. 2012. Performance Analysis of Black Hole Attack in VANET. International Journal of Computer Network and Information Security (IJCNIS). 4(11): 47.

Yih-Chun, H., A. Perrig, and D. B. Johnson. 2006. Wormhole Attacks in Wireless Networks. Selected Areas in Communications, IEEE Journal on. 24(2): 370–380.

Kakkasageri, M. S. and S. S. Manvi. 2014. Information Management in Vehicular Ad Hoc Networks: A Review. Journal of Network and Computer Applications. 39: 334–350.

Karagiannis, G., et al. 2011. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions. Communications Surveys & Tutorials, IEEE. 13(4): 584–616.

IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. IEEE Std 1609.2-2006, 2006. 0_1-105.

Qianhong, W., J. Domingo-Ferrer, and U. Gonzalez-Nicolas. 2010. Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications. Vehicular Technology, IEEE Transactions on. 59(2): 559–573.

Daza, V., et al. 2009. Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks. Vehicular Technology, IEEE Transactions on. 58(4): 1876–1886.

Douceur, J. 2002. The Sybil Attack, in Peer-to-Peer Systems, P. Druschel, F. Kaashoek, and A. Rowstron, Editors. Springer Berlin Heidelberg. 251–260.

Biswas, S., M.M. Haque, and J. Misic. 2010. Privacy and Anonymity in VANETs: A Contemporary Study. Ad Hoc & Sensor Wireless Networks. 10(2-3): 177–192.

Amro, B., Y. Saygin, and A. Levi. 2013. Enhancing Privacy in Collaborative Traffic-Monitoring Systems Using Autonomous Location Update. Iet Intelligent Transport Systems. 7(4): 388–395.

Chim, T.W., et al. 2014. VSPN: VANET-Based Secure and Privacy-Preserving Navigation. Ieee Transactions on Computers. 63(2): 510–524.

Li, J.S. and K.H. Liu. 2013. A Lightweight Identity Authentication Protocol for Vehicular Networks. Telecommunication Systems. 53(4): 425–438.

Ganan, C., et al. 2014. PPREM: Privacy Preserving Revocation Mechanism for Vehicular Ad Hoc Networks. Computer Standards & Interfaces. 36(3): 513–523.

Ganan, C., et al. 2013. COACH: Collaborative Certificate Status Checking Mechanism for VANETs. Journal of Network and Computer Applications. 36(5): 1337–1351.

Hussain, R., et al. 2013. Privacy-Aware Route Tracing and Revocation Games in VANET-based Clouds. 2013 Ieee 9th International Conference on Wireless and Mobile Computing, Networking and Communications (Wimob). 730–735.

Mikki, M., Y.M. Mansour, and K. Yim. 2013. Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks. 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (Imis 2013). 188–195.

Taha, S. and X.M. Shen. 2013. A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs. Ieee Transactions on Intelligent Transportation Systems. 14(4): 1665–1680.

Ying, B. D., D. Makrakis, and H. T. Mouftah. 2013. Privacy Preserving Broadcast Message Authentication Protocol for VANETs. Journal of Network and Computer Applications. 36(5): 1352–1364.

Zhu, H., et al. 2013. PPAS: Privacy Protection Authentication Scheme for VANET. Cluster Computing. 16(4): 873–886.

Zhuo, X. J., et al. 2009. Removal of Misbehaving Insiders in Anonymous VANETs. Mswim09. Proceedings of the 12th Acm International Conference on Modeling, Analysis, and Systems. 106–115.

Dietzel, S., et al. 2013. Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols. Ieee Transactions on Vehicular Technology. 62(4): 1505–1518.

Golle, P., D. Greene, and J. Staddon. 2004. Detecting and Correcting Malicious Data in VANETs. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks. ACM: Philadelphia, PA, USA. 29–37.

Harit, S. K., G. Singh, and N. Tyagi. 2012. Fox-Hole Model for Data-centric Misbehaviour Detection in VANETs. 2012 Third International Conference on Computer and Communication Technology (Iccct). 271–277.

Lo, N.W. and H.C. Tsai. 2007. Illusion attack on VANET Applications-A Message Plausibility Problem. 2007 Ieee Globecom Workshops, Proceedings. 69–76.

Ghosh, M., et al. 2009. Misbehavior Detection Scheme with Integrated Root Cause Detection in VANET. Sixth Acm International Workshop on Vehicular Inter-Networking-Vanet 2009. 123–124.

Burmester, M., E. Magkos, and V. Chrissikopoulos. 2008. Strengthening Privacy Protection in VANETs. 2008 4th Ieee International Conference on Wireless and Mobile Computing, Networking and Communications (Wimob). 508–513.

Schmidt, R. K., et al. 2008. Vehicle Behavior Analysis to Enhance Security In Vanets. In Proceedings of the 4th IEEE Vehicle-to-Vehicle Communications Workshop (V2VCOM2008).

Kim, T.H.-J., et al. 2010. Vanet Alert Endorsement Using Multi-source Filters. In Proceedings of the Seventh ACM International Workshop on VehiculAr InterNETworking. ACM.

Haeberlen, A., P. Kouznetsov, and P. Druschel. 2007. PeerReview: Practical accountability for distributed systems. In ACM SIGOPS Operating Systems Review. ACM.

Heijden, R.W.v.d. and F. Kargl. 2014. Open Issues in Differentiating Misbehavior and Anomalies for VANETs. In 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication, FG-IVC 2014. Vehicular Lab, University of Luxembourg: Luxembourg City, Luxembourg. 24–26.

Downloads

Published

2015-03-09

How to Cite

Data Verification and Misbehavior Detection in Vehicular Ad-hoc Networks. (2015). Jurnal Teknologi, 73(2). https://doi.org/10.11113/jt.v73.4190