A Topological Approach to Secure Message Dissemination in Vehicular Networks

Secure message dissemination is an important issue in vehicular networks, especially considering the vulnerability of vehicle-to-vehicle message dissemination to malicious attacks. Traditional security mechanisms, largely based on message encryption and key management, can only guarantee secure message exchanges between a known source and destination pairs. In vehicular networks, however, every vehicle may learn its surrounding environment and contributes as a source, while in the meantime, acting as a destination or a relay of information from other vehicles, and message exchanges often occur between “stranger” vehicles. This makes secure message dissemination against malicious tampering much more intricate. For secure message dissemination in vehicular networks against insider attackers, who may tamper the content of the disseminated messages, ensuring the consistency and integrity of the transmitted messages becomes a major concern which the traditional message encryption and key management-based approaches fall short to provide. However, it is challenging for a vehicle to distinguish which message is true when the messages received from multiple nearby vehicles are conflicting. In this paper, by incorporating the underlying network topology information, we propose an optimal decision algorithm that is able to maximize the chance of making a correct decision on the message content, assuming the prior knowledge of the percentage of malicious vehicles in the network. Furthermore, a novel heuristic decision algorithm is proposed that can make decisions without the aforementioned knowledge of the percentage of malicious vehicles. The simulations are conducted to compare the security performance achieved by our proposed decision algorithms with that achieved by the existing ones that do not consider or only partially consider the topological information to verify the effectiveness of the algorithms. Our results show that by incorporating the network topology information, the security performance can be much improved. This paper sheds light on the optimum algorithm design for secure message dissemination.

[1]  Saneeha Ahmed,et al.  Novel Trust Framework for Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.

[2]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[3]  Brian D. O. Anderson,et al.  Graph Theoretic Models and Tools for the Analysis of Dynamic Wireless Multihop Networks , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[4]  Panganamala Ramana Kumar,et al.  A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks , 2017, IEEE Transactions on Control of Network Systems.

[5]  Qing Yang,et al.  Toward trustworthy vehicular social networks , 2015, IEEE Communications Magazine.

[6]  Véronique Berge-Cherfaoui,et al.  Detecting Road Events Using Distributed Data Fusion: Experimental Evaluation for the Icy Roads Case , 2016, IEEE Transactions on Intelligent Transportation Systems.

[7]  Sushmita Ruj,et al.  A social network approach to trust management in VANETs , 2012, Peer-to-Peer Networking and Applications.

[8]  David R. Karger,et al.  A new approach to the minimum cut problem , 1996, JACM.

[9]  Fred L. Mannering,et al.  Estimating Rear-End Accident Probabilities at Signalized Intersections: Occurrence-Mechanism Approach , 2003 .

[10]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1951 .

[11]  W. Gray,et al.  Optimal data fusion of correlated local decisions in multiple sensor detection systems , 1992 .

[12]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[13]  A. Festag,et al.  A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006 , 2006 .

[14]  Jun Zhang,et al.  A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.

[15]  Mashrur Chowdhury,et al.  A Distributed Message Delivery Infrastructure for Connected Vehicle Technology Applications , 2018, IEEE Transactions on Intelligent Transportation Systems.

[16]  Yiqing Zhou,et al.  Heterogeneous Vehicular Networking: A Survey on Architecture, Challenges, and Solutions , 2015, IEEE Communications Surveys & Tutorials.

[17]  Brian D. O. Anderson,et al.  Stochastic Characterization of Information Propagation Process in Vehicular Ad hoc Networks , 2014, IEEE Transactions on Intelligent Transportation Systems.

[18]  Abdelfettah Belghith,et al.  A distributed advanced analytical trust model for VANETs , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[19]  Kai-Yuan Cai,et al.  Multisensor Decision And Estimation Fusion , 2003, The International Series on Asian Studies in Computer and Information Science.

[20]  Nathalie Mitton,et al.  Delivery Delay Analysis for Roadside Unit Deployment in Vehicular Ad Hoc Networks With Intermittent Connectivity , 2016, IEEE Transactions on Vehicular Technology.

[21]  Andrew V. Goldberg,et al.  A new approach to the maximum flow problem , 1986, STOC '86.

[22]  S. Gottwald,et al.  Fuzzy set theory and its applications. Second edition , 1992 .

[23]  Jorge Lobo,et al.  Detecting distributed signature-based intrusion: The case of multi-path routing attacks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[24]  Mohammad S. Obaidat,et al.  Vehicular Security Through Reputation and Plausibility Checks , 2014, IEEE Systems Journal.

[25]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[26]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[27]  Yacine Ghamri-Doudane,et al.  A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[28]  Jean-Bernard Saloman Probability and Statistics (Fourth Edition) , 2013 .

[29]  Elyes Ben Hamida,et al.  On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.

[30]  Hendrik Decke,et al.  A flexible, subjective logic-based framework for misbehavior detection in V2V networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[31]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[32]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[33]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[34]  Sanjay E. Sarma,et al.  A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas , 2017, IEEE Transactions on Intelligent Transportation Systems.

[35]  Frank Kargl,et al.  Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[36]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[37]  Frank Kargl,et al.  Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols , 2013, IEEE Transactions on Vehicular Technology.