On the Security of Information Dissemination in the Internet-of-Vehicles

Internet of Vehicles (IoV) is regarded as an emerging paradigm for connected vehicles to exchange their information with other vehicles using vehicle-to-vehicle (V2V) communications by forming a vehicular ad hoc networks (VANETs), with roadside units using vehicle-to-roadside (V2R) communications. IoV offers several benefits such as road safety, traffic efficiency, and infotainment by forwarding up-to-date traffic information about upcoming traffic. For instance, IoV is regarded as a technology that could help reduce the number of deaths caused by road accidents, and reduce fuel costs and travel time on the road. Vehicles could rapidly learn about the road condition and promptly respond and notify drivers for making informed decisions. However, malicious users in IoV may mislead the whole communications and create chaos on the road. Data falsification attack is one of the main security issues in IoV where vehicles rely on information received from other peers/vehicles. In this paper, we present data falsification attack detection using hashes for enhancing network security and performance by adapting contention window size to forward accurate information to the neighboring vehicles in a timely manner (to improve throughput while reducing end-to-end delay). We also present clustering approach to reduce travel time in case of traffic congestion. Performance of the proposed approach is evaluated using numerical results obtained from simulations. We found that the proposed adaptive approach prevents IoV from data falsification attacks and provides higher throughput with lower delay.

[1]  Gongjun Yan,et al.  Securing vehicular ad-hoc networks from data falsification attacks , 2016, 2016 IEEE Region 10 Conference (TENCON).

[2]  Jun Zheng,et al.  Performance Modeling and Analysis of the IEEE 802.11p EDCA Mechanism for VANET , 2016, IEEE Transactions on Vehicular Technology.

[3]  Chan Yeob Yeun,et al.  Recent Advances in VANET Security: A Survey , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[4]  Gongjun Yan,et al.  CoR-VANETs: Game Theoretic Approach for Channel and Rate Selection in Cognitive Radio VANETs , 2012, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications.

[5]  Gongjun Yan,et al.  Towards Secure Vehicular Clouds , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.

[6]  Danda B. Rawat,et al.  Cross-layer Location Information Security in Vehicular Networks , 2012, J. Next Gener. Inf. Technol..

[7]  Li He,et al.  Mitigating DoS attacks against signature-based authentication in VANETs , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[8]  Srinivas Sampalli,et al.  A novel sender authentication scheme based on hash chain for Vehicular Ad-Hoc Networks , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[9]  Gongjun Yan,et al.  Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention Window Size , 2011, IEEE Transactions on Parallel and Distributed Systems.

[10]  M. Schliwa Kinesin: walking or limping? , 2003, Nature Cell Biology.