A probabilistic model to corroborate three attacks in vehicular ad hoc networks

As VANET can be considered as a subclass of wireless ad hoc networks, they inherit the security problems. In this work, we focus on network security. We present some examples of attacks on these networks and we propose a method to optimize the security against three of these attacks. To improve the method of attacks' corroboration, we propose an innovative probabilistic model based on Logistic regression. This method will estimate the occurrence of an event (in this case, an attack). The method is based on a history of a knowledge base that estimates the attack's occurrences. When the regression model is validated, it will be used to estimate the probability of an attack and if it exceeds the threshold defined in advance, the attack is then confirmed.

[1]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[2]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[3]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[4]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[5]  Levent Ertaul,et al.  The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations , 2009, ICWN.

[6]  Olivier Heen,et al.  A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks , 2009, 2009 IEEE Vehicular Networking Conference (VNC).

[7]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[8]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[9]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[10]  Haojin Zhu,et al.  A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs , 2011, 2011 IEEE International Conference on Communications (ICC).

[11]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[12]  Dirk Pesch,et al.  Event Suppression for Safety Message Dissemination in VANETs , 2010, 2010 IEEE 71st Vehicular Technology Conference.

[13]  Jean-Pierre Hubaux,et al.  Securing wireless mesh networks , 2006, IEEE Wireless Communications.