Proof-of-relevance: Filtering false data via authentic consensus in Vehicle Ad-hoc Networks

Emerging applications in vehicle ad hoc networks (VANETs) not only open tremendous business opportunities and navigation benefits; they also pose formidable research challenges in security provisioning. A critical security threat to VANETs is false data injection, i.e., an attacker disseminates false information to disrupt the behavior of the other drivers. Information driven operations of vehicular networks make false data injection a very effective attack. As the first line of defense, this paper presents the notion of proof-of-relevance (PoR), which consists in proving that the event reporter is authentically relevant to the event it has reported. The PoR is accomplished by collecting authentic consensus on the event from witness vehicles in a cooperative way. Event reports from attackers who fail to provide this PoR are disregarded, making the network immune to bogus data. Performance evaluation and security analysis demonstrate the efficiency and security of the proposed scheme.

[1]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[2]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[3]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[4]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[5]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[6]  Jon Feldman,et al.  Growth codes: maximizing sensor network data persistence , 2006, SIGCOMM 2006.

[7]  A.A. Kherani,et al.  Secure V2V Communication With Certificate Revocations , 2007, 2007 Mobile Networking for Vehicular Environments.

[8]  Florian Dotzer,et al.  Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[9]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[10]  Adrian Perrig,et al.  Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[11]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[12]  Yong Guan,et al.  An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.