Securing data dissemination in vehicular ad hoc networks

Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging, particularly in military applications where controlling the dissemination of messages is essential. This thesis therefore provides a review of the issue of security in VANET and MANET; it also surveys existing solutions for dissemination control. It highlights a particular area not adequately addressed until now: controlling information flow in VANETs. This thesis contributes a policy-based framework to control the dissemination of messages communicated between nodes in order to ensure that message remains confidential not only during transmission, but also after it has been communicated to another peer, and to keep the message contents private to an originator-defined subset of nodes in the VANET. This thesis presents a novel framework to control data dissemination in vehicle ad hoc networks in which policies are attached to messages as they are sent between peers. This is done by automatically attaching policies along with messages to specify how the information can be used by the receiver, so as to prevent disclosure of the messages other than consistent with the requirements of the originator. These requirements are represented as a set of policy rules that explicitly instructs recipients how the information contained in messages can be disseminated to other nodes in order to avoid unintended disclosure. This thesis describes the data dissemination policy language used in this work; and further describes the policy rules in order to be a suitable and understandable language for the framework to ensure the confidentiality requirement of the originator. This thesis also contributes a policy conflict resolution that allows the originator to be asked for upto-date policies and preferences. The framework was evaluated using the Network Simulator (NS-2) to provide and check whether the privacy and confidentiality of the originators’ messages were met. A policy-based agent protocol and a new packet structure were implemented in this work to manage and enforce the policies attached to packets at every node in the VANET. Some case studies are presented in this thesis to show how data dissemination can be controlled based on the policy of the originator. The results of these case studies show the feasibility of our research to control the data dissemination between nodes in VANETs. NS-2 is also used to test the performance of the proposed policy-based agent protocol and demonstrate its effectiveness using various network performance metrics (average delay and overhead).

[1]  Yu Cheng,et al.  A Distributed Key Management Framework with Cooperative Message Authentication in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Iman Almomani Security Solutions for Wireless Mobile Ad hoc Networks: (WMANETs) , 2011, AdHocNets 2011.

[3]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[4]  Aihuang Guo,et al.  Evaluation of MANET Routing Protocols in Realistic Environments , 2013 .

[5]  Andrea Westerinen,et al.  Terminology for Policy-Based Management , 2001, RFC.

[6]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[7]  Flaminio Borgonovo,et al.  ADHOC MAC: New MAC Architecture for Ad Hoc Networks Providing Efficient and Reliable Point-to-Point and Broadcast Services , 2004, Wirel. Networks.

[8]  M. Malowidzki Network Simulators: a Developer's Perspective , .

[9]  Stephan Eichler,et al.  Performance Evaluation of the IEEE 802.11p WAVE Communication Standard , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[10]  Yen-Fu Liu,et al.  Secure Communication Scheme of VANET with Privacy Preserving , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[11]  D. Curren,et al.  A Survey of Simulation in Sensor Networks , 2005 .

[12]  Stephen Smalley,et al.  Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.

[13]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[14]  Juan E. Tapiador,et al.  Cooperative Security in Peer-to-Peer and Mobile Ad Hoc Networks , 2009 .

[15]  Ekata Mehul,et al.  Security in Mobile Ad Hoc Networks , 2009 .

[16]  Hussein Zedan,et al.  Security Solution for Mobile Ad Hoc Network of Networks (MANoN) , 2009, 2009 Fifth International Conference on Networking and Services.

[17]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[18]  Roberto Baldessari C2C-C Consortium Requirements for NEMO Route Optimization , 2007 .

[19]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[20]  Tim Leinmüller,et al.  Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[21]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[22]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[23]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[24]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[25]  Ray Hunt,et al.  PKI and digital certification infrastructure , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..

[26]  Xin Wang,et al.  A Robust Detection of the Sybil Attack in Urban VANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[27]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[28]  Jack Brassil Hiding Information in Document Images , 2007 .

[29]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..

[30]  Hussein Zedan,et al.  Security Management for Mobile Ad Hoc Network of Networks (MANoN) , 2009, Int. J. Mob. Comput. Multim. Commun..

[31]  Dijiang Huang,et al.  SeGCom: Secure Group Communication in VANETs , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[32]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[33]  Sherali Zeadally,et al.  Security in vehicular ad hoc networks , 2013 .

[34]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[35]  Mike Burmester,et al.  Short c-Secure Fingerprinting Codes , 2003, ISC.

[36]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[37]  Changhui Hu,et al.  Efficient HMAC-based secure communication for VANETs , 2012, Comput. Networks.

[38]  Iman Almomani END-TO-END SECURITY SOLUTION FOR WIRELESS MOBILE AD HOC NETWORK ( WMANET ) , 2007 .

[39]  S. Katragadda,et al.  A decentralized location-based channel access protocol for inter-vehicle communication , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[40]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[41]  Ravi S. Sandhu,et al.  How to do discretionary access control using roles , 1998, RBAC '98.

[42]  Xiaohui Liang,et al.  STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.

[43]  Jorge Lobo,et al.  Policy Technologies for Self-Managing Systems , 2008 .

[44]  Stephen T. Kent,et al.  Securing the Nimrod routing architecture , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[45]  Mohan S. Kankanhalli,et al.  Watermarking of Electronic Text Documents , 2002, Electron. Commer. Res..

[46]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[47]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[48]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[49]  Shon Harris,et al.  CISSP All-in-One Exam Guide , 2001 .

[50]  Tariq A. A. Alsboui,et al.  Simulation Issues in Wireless Sensor Networks : A Survey , 2012 .

[51]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[52]  Xiaoyan Hong,et al.  Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.

[53]  Brian Haberman,et al.  Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.

[54]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[55]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[56]  Hsiao-Hwa Chen,et al.  DESCV—A Secure Wireless Communication Scheme for Vehicle ad hoc Networking , 2009, Mob. Networks Appl..

[57]  Liviu Iftode,et al.  A Comparative Study of Data Dissemination Models for VANETs , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.

[58]  L. Wolf,et al.  Mobility management for vehicular ad hoc networks , 2005, 2005 IEEE 61st Vehicular Technology Conference.

[59]  Erik G. Ström,et al.  How Severe Is the Hidden Terminal Problem in VANETs When Using CSMA and STDMA? , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[60]  Singh Sumitkumar,et al.  Enhanced Security for Information Flow in VANET using Signcryption and Trust level , 2011 .

[61]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[62]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[63]  Xiaohui Liang,et al.  PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.

[64]  Simon S. Lam,et al.  Authorization in Distributed Systems: A New Approach , 1993 .

[65]  Rosslin John Robles,et al.  Symmetric-Key Encryption for Wireless Internet SCADA , 2009, FGIT-SecTech.

[66]  Wu Hsin-Te,et al.  A Novel RSU-Based Message Authentication Scheme for VANET , 2010, 2010 Fifth International Conference on Systems and Networks Communications.