Home > Publications
Home University of Twente
Prospective Students
Intranet (internal)

EEMCS EPrints Service

23497 Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols
Home Policy Brochure Browse Search User Area Contact Help

Dietzel, S. and Petit, J.Y. and Heijenk, G.J. and Kargl, F. (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on Vehicular Technology, 62 (4). pp. 1505-1518. ISSN 0018-9545 *** ISI Impact 2,243 ***

Full text available as:


1404 Kb
Open Access

Official URL:

Exported to Metis


Vehicular networks (VANETs) are a growing research area with a large number of use cases. Foreseen applications include safety applications, traffic efficiency enhancements, and infotainment services. To make future deployment successful, it is imperative that all applications are matched with proper security mechanisms. Current proposals mostly focus on entity authorization by establishing a public key infrastructure. Such proactive security efficiently excludes nonauthorized entities from the network. However, in the face of insider attackers possessing valid key material, we need to consider data-centric methods to complement entity-centric trust. A promising approach for consistency checks, particularly in multihop scenarios, is to exploit redundant information dissemination. If information is received from both honest and malicious vehicles, chances are that attacks can be detected. In this paper, we propose three graph-based metrics to gauge the redundancy of dissemination protocols. We apply our metrics to a baseline protocol, a geocast protocol, and an aggregation protocol using extensive simulations. In addition, we point out open issues and applications of the metrics, such as colluding attackers and eviction of attacker nodes based on detected attacks. Results show that Advanced Adaptive Geocast behaves almost optimally from a routing efficiency point of view but fails to offer sufficient redundancy for data consistency mechanisms in many scenarios. The simulated aggregation protocol shows sufficient redundancy to facilitate data consistency checking.

Item Type:Article
Research Group:EWI-DIES: Distributed and Embedded Security, EWI-DACS: Design and Analysis of Communication Systems
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World, CTIT-WiSe: Wireless and Sensor Systems
Research Project:PRESERVE: Preparing Secure Vehicle-to-x Communication Systems
Uncontrolled Keywords:Graph-Based, Metrics, Attack Detection, VANET
ID Code:23497
Deposited On:14 July 2013
ISI Impact Factor:2,243
More Information:statisticsmetis

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item