Security games for vehicular networks

Vehicular ad-hoc networks (VANETs) enabling vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications is an emerging research field aiming to improve transportation security, reliability, and management. To better understand networking and security aspects of VANETs, we have been investigating network connectivity issues and mappings of car networks to the underlying road topology. Using this mapping and various metrics, we locate hot-spots in vehicular networks to determine the most vulnerable points for jamming. We also use these to optimize the placement of roadside units. To this end, we first develop quantitative measures for assessment of the importance of road segments in the context of security and traffic flow. We then use game theoretic analysis to investigate the effects of possible malicious users on the system for increased reliability and better management of resources. For example, we study the optimal deployment of traffic control and security infrastructure both in the static (roadside units) and dynamic case (law enforcement units). We use realistic simulation data, obtained from traffic scientists, as input to our models as well as to evaluate the effectiveness of countermeasures.

[1]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[2]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[3]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[4]  Panagiotis Papadimitratos,et al.  VANET Connectivity Analysis , 2009, ArXiv.

[5]  V. Latora,et al.  Centrality measures in spatial networks of urban streets. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Maxim Raya,et al.  Revocation games in ephemeral networks , 2008, CCS.

[7]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[8]  Nicolas Christin,et al.  Predicted and Observed User Behavior in the Weakest-link Security Game , 2008, UPSEC.

[9]  G. Marfia,et al.  VANET: On Mobility Scenarios and Urban Infrastructure. A Case Study , 2007, 2007 Mobile Networking for Vehicular Environments.

[10]  T. Basar,et al.  Intrusion Response as a Resource Allocation Problem , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[11]  Jeff S. Shamma,et al.  Unified convergence proofs of continuous-time fictitious play , 2004, IEEE Transactions on Automatic Control.

[12]  T. Basar,et al.  A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[13]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: References , 2007 .

[14]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[15]  Lourdes Campos Fuzzy linear programming models to solve fuzzy matrix games , 1989 .

[16]  B. Scheuermann,et al.  The feasibility of information dissemination in vehicular ad-hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[17]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[18]  Christian Wewetzer,et al.  Data aggregation and roadside unit placement for a vanet traffic information system , 2008, VANET '08.

[19]  J. B. Cruz,et al.  An Approach to Fuzzy Noncooperative Nash Games , 2003 .

[20]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .