EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


23497 Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols
Home Policy Brochure Browse Search User Area Contact Help

Dietzel, S. and Petit, J.Y. and Heijenk, G.J. and Kargl, F. (2013) Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Transactions on Vehicular Technology, 62 (4). pp. 1505-1518. ISSN 0018-9545 *** ISI Impact 2,243 ***

Full text available as:

PDF

1404 Kb
Open Access



Official URL: http://dx.doi.org/10.1109/TVT.2012.2236117

Exported to Metis

Abstract

Vehicular networks (VANETs) are a growing research area with a large number of use cases. Foreseen applications include safety applications, traffic efficiency enhancements, and infotainment services. To make future deployment successful, it is imperative that all applications are matched with proper security mechanisms. Current proposals mostly focus on entity authorization by establishing a public key infrastructure. Such proactive security efficiently excludes nonauthorized entities from the network. However, in the face of insider attackers possessing valid key material, we need to consider data-centric methods to complement entity-centric trust. A promising approach for consistency checks, particularly in multihop scenarios, is to exploit redundant information dissemination. If information is received from both honest and malicious vehicles, chances are that attacks can be detected. In this paper, we propose three graph-based metrics to gauge the redundancy of dissemination protocols. We apply our metrics to a baseline protocol, a geocast protocol, and an aggregation protocol using extensive simulations. In addition, we point out open issues and applications of the metrics, such as colluding attackers and eviction of attacker nodes based on detected attacks. Results show that Advanced Adaptive Geocast behaves almost optimally from a routing efficiency point of view but fails to offer sufficient redundancy for data consistency mechanisms in many scenarios. The simulated aggregation protocol shows sufficient redundancy to facilitate data consistency checking.

Item Type:Article
Research Group:EWI-DIES: Distributed and Embedded Security, EWI-DACS: Design and Analysis of Communication Systems
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World, CTIT-WiSe: Wireless and Sensor Systems
Research Project:PRESERVE: Preparing Secure Vehicle-to-x Communication Systems
Uncontrolled Keywords:Graph-Based, Metrics, Attack Detection, VANET
ID Code:23497
Status:Published
Deposited On:14 July 2013
Refereed:Yes
International:Yes
ISI Impact Factor:2,243
More Information:statisticsmetis

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item