A flexible, subjective logic-based framework for misbehavior detection in V2V networks

Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication aims to increase safety, efficiency, and comfort of drivers. Vehicles periodically broadcast their current status, such as position, velocity, and other information. Received information is stored in a local knowledge base, often called world model, and used for application decisions. Because of the potential impact, V2V communication is an interesting target for malicious attackers. Message integrity protection using cryptographic signatures only protects against outsider attackers. In addition to signatures, misbehavior detection mechanisms comparable to intrusion detection systems (IDS) are needed to detect insider attackers. Given the complexity and large number of foreseen V2V and V2I applications, misbehavior detection cannot be a one-size-fits-all solution. In this paper, we present a flexible framework that can combine a range of different misbehavior detection mechanisms by modeling their outputs using subjective logic. We demonstrate the feasibility of our framework by using a combination of existing detection mechanisms to increase their misbehavior detection results.

[1]  Ashish Vulimiri Misbehavior Detection in Vehicular Ad Hoc Networks , 2009 .

[2]  Soumaya Cherkaoui,et al.  Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[3]  Nsw Roads and Maritime Services Intelligent Transport Systems (ITS) , 2016 .

[4]  A. Jøsang Artificial Reasoning with Subjective Logic , 2008 .

[5]  Sorin A. Huss,et al.  A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition , 2011, 2011 IEEE Vehicular Networking Conference (VNC).

[6]  Tim Leinmüller,et al.  Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.

[7]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[8]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[9]  Michel Riveill,et al.  A framework for trust assessment of sensor data , 2011, 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011).

[10]  Klaus Diepold,et al.  A Trust Model for Intervehicular Communication Based on Belief Theory , 2010, 2010 IEEE Second International Conference on Social Computing.

[11]  Audun Jøsang,et al.  Subjective Logic , 2016, Artificial Intelligence: Foundations, Theory, and Algorithms.

[12]  Hannes Hartenstein,et al.  VANET: Vehicular Applications and Inter-Networking Technologies , 2010, VANET.

[13]  Audun Jøsang,et al.  Base Rates for Belief Functions , 2013 .

[14]  Marko Wolf,et al.  Design, Implementation, and Evaluation of a Vehicular Hardware Security Module , 2011, ICISC.

[15]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[16]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[17]  Tim Leinmüller,et al.  Decentralized position verification in geographic ad hoc routing , 2010, Secur. Commun. Networks.