In this paper we discuss misbehavior detection for vehicular ad-hoc networks (VANETs), a special case of cyber-physical systems (CPSs). We evaluate the suitability of existing PKI approaches for insider misbehavior detection and propose a classification for novel detection schemes. Cyber-physical systems (CPSs) are digital systems that are closely embedded into the physical world with which they interact through sensors and actuators. In contrast to classical embedded systems, they often form networks with a large number of sensor or actuator devices. These devices sense information, process it in a distributed system, and then influence the physical world using actuators. Notable examples of CPS are wireless sensor networks (WSNs), smart factories, distributed eHealth systems, and VANETs. In this paper, we focus on VANETs, which are a prime example for CPS and will soon be deployed on a large scale. Vehicular ad-hoc networks (VANETs) are networks that are created by equipping vehicles with wireless transmission equipment. VANETs offer great potential to improve road safety and to provide information and entertainment applications for drivers and passengers. Due to the unique properties of VANETs, this type of network has attracted many researchers, including those in the domain of security. The security challenges in VANETs include the requirement for strong privacy, the computationally constrained environment, and the ephemeral nature of connectivity. VANETs and other CPSs share a number of characteristics that require fundamentally new approaches for security, which differ from existing IT security requirements. • Critical usage scenarios. CPSs often control systems where failure or malfunction may have severe consequences, including massive financial loss or loss of lives. Often, these systems fall under the term critical infrastructures (CI). VANETs are one example where failure or malfunction may lead to massive congestion with subsequent delays and financial losses or even to accidents with loss of lives in a worst case. • No clear security perimeter. In many of these systems, there is no clear boundary between insiders and outsiders. Instead, the logically and physically distributed nature of CPSs leads to unclear security perimeters and possible insider attacks. VANETs are again a core example, as such networks are cooperatively formed by vehicles and road-side equipment. As vehicles are under distributed ownership and control, it needs to be assumed that some of the vehicles are under full control of attackers. • Limited physical security. As nodes in CPSs are often distributed in a potentially hostile environment, they may be subject to hijacking, analysis, and reprogramming by attackers. Due to cost constraints, the protection against such hijacking is often limited. A typical example is a Wireless Sensor Network for environmental monitoring, where nodes may be scattered randomly in the environment. Due to the long lifetime of vehicles, similar challenges can be found in both VANETs and invehicle networks. • Sensor values as security assets. The primary security assets in CPS are the sensor values and the actuators controlled based on this input. Spoofing and manipulation of sensor data are thus primary attack vectors. For instance, in a VANET that is used for detecting traffic jams, an attacker may want to suppress certain sensor readings that would indicate a traffic jam, or inject sensor values that indicate a traffic jam where none exists.
[1]
Xuemin Shen,et al.
Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System
,
2010,
2010 Proceedings IEEE INFOCOM.
[2]
Chunxiao Chigan,et al.
AWF-NA: A Complete Solution for Tampered Packet Detection in VANETs
,
2008,
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[3]
Panagiotis Papadimitratos,et al.
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
,
2007,
IEEE Journal on Selected Areas in Communications.
[4]
Jessica Staddon,et al.
Detecting and correcting malicious data in VANETs
,
2004,
VANET '04.
[5]
Panagiotis Papadimitratos,et al.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
,
2008,
IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[6]
Sorin A. Huss,et al.
A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition
,
2011,
2011 IEEE Vehicular Networking Conference (VNC).
[7]
Tim Leinmüller,et al.
Vehicle Behavior Analysis to Enhance Security in VANETs
,
2008
.
[8]
Kpatcha M. Bayarou,et al.
Central misbehavior evaluation for VANETs based on mobility data plausibility
,
2012,
VANET@MOBICOM.
[9]
Pietro Manzoni,et al.
Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs
,
2010,
2010 IEEE International Conference on Communications Workshops.
[10]
Vijay Laxmi,et al.
Misbehavior Detection Based on Ensemble Learning in VANET
,
2011,
ADCONS.