Tracking-Based Wireless Intrusion Detection for Vehicular Networks

In this work we develop a new tracking-based wireless intrusion detection algorithm that allows for the identification of malicious vehicle network users who are not at their appropriate locations. Based on a particle filter implementation and detection thresholds set by Cramer-Rao lower bounds we show how our tracking-verification algorithm is capable of verifying any reported positions within a reasonable time frame of order 30 seconds. We explicitly determine how the performance of the algorithm, as measured by detection and false positive rates, is influenced by the amount of tracking information collected. The results presented here are important for implementation of safe vehicular networks where only users at the expected locations can access and participate in the network communications.

[1]  Robert A. Malaney Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.

[2]  Fredrik Gustafsson,et al.  Particle filters for positioning, navigation, and tracking , 2002, IEEE Trans. Signal Process..

[3]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[4]  Sheng Zhang,et al.  Vehicle Positioning Using Wi-Fi Networks and GPS/DR System , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[5]  Neil J. Gordon,et al.  A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking , 2002, IEEE Trans. Signal Process..

[6]  Robert A. Malaney,et al.  Particle Filters and Position Tracking in Wi-Fi Networks , 2006, 2006 IEEE 63rd Vehicular Technology Conference.

[7]  Sergiu Nedevschi,et al.  Tracking multiple objects using particle filters and digital elevation maps , 2009, 2009 IEEE Intelligent Vehicles Symposium.

[8]  Fredrik Gustafsson,et al.  Mobile Positioning Using Wireless Networks , 2005 .

[9]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[10]  Tim Leinmüller,et al.  Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.

[11]  Robert A. Malaney Nuisance Parameters and Location Accuracy in Log-Normal Fading Models , 2007, IEEE Transactions on Wireless Communications.

[12]  Maxim Raya,et al.  Security Aspects of Inter-Vehicle Communications , 2005 .

[13]  Victor C. M. Leung,et al.  Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[14]  Alfred O. Hero,et al.  Relative location estimation in wireless sensor networks , 2003, IEEE Trans. Signal Process..

[15]  F. Gustafsson,et al.  Mobile positioning using wireless networks: possibilities and fundamental limitations based on available wireless network measurements , 2005, IEEE Signal Processing Magazine.

[16]  Branko Ristic,et al.  Beyond the Kalman Filter: Particle Filters for Tracking Applications , 2004 .

[17]  Nalini Venkatasubramanian,et al.  Security Issues in a Future Vehicular Network , 2002 .

[18]  Dan Simon,et al.  Optimal State Estimation: Kalman, H∞, and Nonlinear Approaches , 2006 .