IA2P: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs

Several studies investigating data validity and security against malicious data injection attacks in vehicular ad hoc networks (VANETs) have focused on trust establishment based on cryptology. However, the current researching suffers from two problems: (P1) it is difficult to distinguish an authorized attacker from other participators; (P2) the large scale of the system and high mobility set up an obstacle in key distribution with a security-based approach. In this paper, we develop a data-centric trust mechanism based on traffic flow theory expanding the notion of trust from intrusion-rejecting to intrusion-tolerant. First, we use catastrophe theory to describe traffic flow according to noncontinuous, catastrophic characteristics. Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA2P, without any security codes or authentication. Finally, we simulate two kinds of malicious data injection attack scenarios and evaluate IA2P based on real traffic flow data from Zhongshan Road in Dalian, China, over 24 hours. Evaluation results show that our method can achieve a 94% recognition rate in the majority of cases.

[1]  D. Bhattacharya Secure Data Aggregation in Wireless Sensor Networks , 2014 .

[2]  Francis P. D. Navin,et al.  Traffic congestion catastrophes , 1986 .

[3]  Weisong Shi,et al.  $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.

[4]  Peter Wagner,et al.  Fluid-dynamical and microscopic description of traffic flow: a data-driven comparison , 2010, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[5]  Antonio F. Gómez-Skarmeta,et al.  A Cooperative Approach to Traffic Congestion Detection With Complex Event Processing and VANET , 2012, IEEE Transactions on Intelligent Transportation Systems.

[6]  Fei-Yue Wang,et al.  Data-Driven Intelligent Transportation Systems: A Survey , 2011, IEEE Transactions on Intelligent Transportation Systems.

[7]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[8]  Damla Turgut,et al.  Secure traffic data propagation in Vehicular Ad Hoc Networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..

[9]  Aifeng Wu,et al.  RATE: A RSU-Aided Scheme for Data-Centric Trust Establishment in VANETs , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[10]  Ciprian Dobre,et al.  Securing Vehicular Networks Based on Data-Trust Computation , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[11]  X. Lignos,et al.  Non-linear buckling of simple models with tilted cusp catastrophe , 2003 .

[12]  Fred L. Hall,et al.  An interpretation of speed-flow-concentration relationships using catastrophe theory , 1987 .

[13]  Elmar Schoch,et al.  Dependable and secure geocast in vehicular networks , 2010, VANET '10.

[14]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[15]  Doo-Kwon Baik,et al.  Model for accurate speed measurement using double-loop detectors , 2006, IEEE Transactions on Vehicular Technology.

[16]  Wei Zhang,et al.  Distributed Algorithm for Traffic Data Collection and Data Quality Analysis Based on Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.

[17]  D. Gazis,et al.  Nonlinear Follow-the-Leader Models of Traffic Flow , 1961 .

[18]  Guo Jian Research on model of traffic flow based on cusp catastrophe , 2008 .

[19]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[20]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[21]  A. Held,et al.  Modeling Roadside Attacker Behavior in VANETs , 2008, 2008 IEEE Globecom Workshops.

[22]  Ivan Martinovic,et al.  Chaotic communication improves authentication: protecting WSNs against injection attacks , 2009, Secur. Commun. Networks.

[23]  Gábor Stépán,et al.  Traffic jams: dynamics and control , 2010, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[24]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[25]  Ahmad Al-Daraiseh,et al.  Toward Secure Vehicular Ad-hoc Networks: A Survey , 2012 .

[26]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[27]  Xuemin Shen,et al.  DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.