Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs

Abstract--- This paper evaluates the usefulness of watchdog modules for intrusion detection. A watchdog is the basic component for the construction of most of the intrusion detection systems proposed so far for self-organizing wireless networking systems like VANETs. Contributions of this work are threefold. First, the component is designed to be protocol independent, thus compatible with any different types of ad hoc routing protocols. Second, it encompasses a high detection coverage with a low detection latency. Third, the previous properties are guaranteed while minimizing the number of generated false positives and negatives The provided design is implemented and evaluated. Results show that a set of trade-offs must be adopted in order to obtain an acceptable balance between the coverage and detection latency of the watchdog and the resources required from devices.

[1]  Juan-Carlos Cano,et al.  Castadiva: A Test-Bed Architecture for Mobile AD HOC Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[2]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[3]  Janne Lundberg Routing Security in Ad Hoc Networks , 2000 .

[4]  Charlie Obimbo,et al.  A Watchdog Enhancement to IDS in MANET , 2006, Wireless and Optical Communications.

[5]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[6]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[9]  Sadie Creese,et al.  Conceptual Model and Architecture of MAFTIA , 2003 .

[10]  Hossam S. Hassanein,et al.  Routeguard: an intrusion detection and response system for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[11]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[12]  Oivind Kure,et al.  The UniK - OLSR plugin library , 2004 .

[13]  George Kesidis,et al.  Secure routing in ad hoc networks and a related intrusion detection problem , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[14]  Giovanni Pau,et al.  Code torrent: content distribution using network coding in VANET , 2006, MobiShare '06.

[15]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[16]  H. Hartenstein,et al.  Performance measurements of a vehicular ad hoc network , 2004, 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514).