Worm Epidemics in Vehicular Networks

Connected vehicles promise to enable a wide range of new automotive services that will improve road safety, ease traffic management, and make the overall travel experience more enjoyable. However, they also open significant new surfaces for attacks on the electronics that control most of modern vehicle operations. In particular, the emergence of vehicle-to-vehicle (V2V) communication risks to lay fertile ground for self-propagating mobile malware that targets automobile environments. In this work, we perform a first study on the dynamics of vehicular malware epidemics in a large-scale road network, and unveil how a reasonably fast worm can easily infect thousands of vehicles in minutes. We determine how such dynamics are affected by a number of parameters, including the diffusion of the vulnerability, the penetration ratio and range of the V2V communication technology, or the worm self-propagation mechanism. We also propose a simple yet very effective numerical model of the worm spreading process, and prove it to be able to mimic the results of computationally expensive network simulations. Finally, we leverage the model to characterize the dangerousness of the geographical location where the worm is first injected, as well as for efficient containment of the epidemics through the cellular network.

[1]  Jing Zhao,et al.  VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[2]  Hayder Radha,et al.  Analyzing the spread of active worms over VANET , 2004, VANET '04.

[3]  Bernard Mans,et al.  Information propagation speed in bidirectional vehicular delay tolerant networks , 2011, 2011 Proceedings IEEE INFOCOM.

[4]  Yanheng Liu,et al.  Modelling and simulating worm propagation in static and dynamic traffic , 2014 .

[5]  Giovanni Malnati,et al.  Epidemic information diffusion in realistic vehicular network mobility scenarios , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[6]  Guangzhong Sun,et al.  Driving with knowledge from the physical world , 2011, KDD.

[7]  Brian D. O. Anderson,et al.  On the Information Propagation Process in Mobile Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.

[8]  Stelios Sidiroglou,et al.  Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks , 2007, USENIX Security Symposium.

[9]  Robert K. Cunningham,et al.  A taxonomy of computer worms , 2003, WORM '03.

[10]  Hao Wu,et al.  Spatial Propagation of Information in Vehicular Networks , 2009, IEEE Transactions on Vehicular Technology.

[11]  Lars C. Wolf,et al.  A new mobility trace for realistic large-scale simulation of bus-based DTNs , 2010, CHANTS '10.

[12]  Fan Bai,et al.  Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers , 2010, MobiCom.

[13]  Hariharan Krishnan,et al.  Analysis of Information Dissemination in Vehicular Ad-Hoc Networks With Application to Cooperative Vehicle Safety Systems , 2011, IEEE Transactions on Vehicular Technology.

[14]  Marco Fiore,et al.  Vehicular networks on two Madrid highways , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[15]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[16]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[17]  Bhaskar Krishnamachari,et al.  Optimizing Content Dissemination in Vehicular Networks with Radio Heterogeneity , 2014, IEEE Transactions on Mobile Computing.

[18]  Fan Bai,et al.  Optimizing Content Dissemination in Heterogeneous Vehicular Networks , 2010 .

[19]  Maziar Nekovee Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks , 2006, 2006 IEEE 63rd Vehicular Technology Conference.

[20]  Lin Cheng,et al.  VANET worm spreading from traffic modeling , 2010, 2010 IEEE Radio and Wireless Symposium (RWS).

[21]  Hao Wu,et al.  MDDV: a mobility-centric data dissemination algorithm for vehicular networks , 2004, VANET '04.

[22]  Stefan Saroiu,et al.  A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.

[23]  Marco Fiore,et al.  Understanding, modeling and taming mobile malware epidemics in a large-scale vehicular network , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[24]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[25]  Pascal Bouvry,et al.  A Vehicular Mobility Model Based on Real Traffic Counting Data , 2011, Nets4Cars/Nets4Trains.

[26]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[27]  Ashish Agarwal,et al.  Analytical Model for Message Propagation in Delay Tolerant Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[28]  P. Reiher,et al.  Mobile contagion: simulation of infection & defense , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).

[29]  Marco Fiore,et al.  Generation and Analysis of a Large-Scale Urban Vehicular Mobility Dataset , 2014, IEEE Transactions on Mobile Computing.

[30]  J. Kleinberg Computing: the wireless epidemic. , 2007, Nature.

[31]  Kay W. Axhausen,et al.  An Agent-Based Microsimulation Model of Swiss Travel: First Results , 2003 .

[32]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[33]  José Alberto Hernández,et al.  New insights from the analysis of free flow vehicular traffic in highways , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[34]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[35]  Guillaume Leduc,et al.  Road Traffic Data: Collection Methods and Applications , 2008 .

[36]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[37]  Paolo Santi,et al.  A measurement-based study of beaconing performance in IEEE 802.11p vehicular networks , 2012, 2012 Proceedings IEEE INFOCOM.