Feasibility Study of Misbehavior Detection Mechanisms in Cooperative Intelligent Transport Systems (C-ITS)

Cooperative Intelligent Transport Systems (C-ITS) is an emerging technology that aims at improving road safety, traffic efficiency and drivers experience. To this end, vehicles cooperate with each others and the infrastructure by exchanging Vehicle-to-X communication (V2X) messages. In such communicating systems message authentication and privacy are of paramount importance. The commonly adopted solution to cope with these issues relies on the use of a Public Key Infrastructure (PKI) that provides digital certificates to entities of the system. Even if the use of pseudonym certificates mitigate the privacy issues, the PKI cannot address all cyber threats. That is why we need a mechanism that enable each entity of the system to detect and report misbehaving neighbors. In this paper, we provide a state-of-the-art of misbehavior detection methods. We then discuss their feasibility with respect to current standards and law compliance as well as hardware/software requirements.

[1]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[2]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Xin Wang,et al.  A Robust Detection of the Sybil Attack in Urban VANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[4]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[5]  Tim Leinmüller,et al.  Vehicle Behavior Analysis to Enhance Security in VANETs , 2008 .

[6]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[7]  Kpatcha M. Bayarou,et al.  Intrusion detection in VANETs through verification of vehicle movement data , 2010, 2010 IEEE Vehicular Networking Conference.

[8]  Jizhong Zhao,et al.  Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[9]  Juan-Carlos Cano,et al.  T-VNets: A novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS , 2016, Comput. Commun..

[10]  Tim Leinmüller,et al.  Decentralized position verification in geographic ad hoc routing , 2010, Secur. Commun. Networks.

[11]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[12]  Tim Leinmüller,et al.  Cooperative Position Verification - Defending Against Roadside Attackers 2.0 , 2010 .

[13]  Elaine Shi,et al.  Efficient and secure threshold-based event validation for VANETs , 2011, WiSec '11.

[14]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[15]  Peng Ning,et al.  Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[16]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[17]  Frank Kargl,et al.  Enhanced Position Verification for VANETs Using Subjective Logic , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[18]  William Whyte,et al.  A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.

[19]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[20]  Duo Liu,et al.  Removal of misbehaving insiders in anonymous VANETs , 2009, MSWiM '09.

[21]  Sorin A. Huss,et al.  A Novel Framework for Efficient Mobility Data Verification in Vehicular Ad-hoc Networks , 2012, Int. J. Intell. Transp. Syst. Res..

[22]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[23]  Xin Zhang,et al.  VANET alert endorsement using multi-source filters , 2010, VANET '10.

[24]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[25]  Zhong Chen,et al.  Proof-of-relevance: Filtering false data via authentic consensus in Vehicle Ad-hoc Networks , 2008, IEEE INFOCOM Workshops 2008.

[26]  ByungKwan Lee,et al.  A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET , 2013 .

[27]  Walid Saad,et al.  Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.

[28]  Yu Cheng,et al.  Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.