Cross-layer tradeoff of QoS and security in Vehicular ad hoc Networks: A game theoretical approach

Abstract Vehicular ad hoc Networks (VANETs) have high requirements on both Quality of Service (QoS) and security due to their unique wireless features such as highly dynamic vehicles and unreliable channels. However, it is challenging to jointly optimize QoS and security because they are conflicting objectives that contend for limited network resources. Therefore, it is essential to make a tradeoff between them. In this study, a two-period game is designed to deal with the external decision-making of vehicles and internal resource competition of an individual vehicle, respectively. In the first-period external decision-making, each vehicle aims to maximize the throughput by constructing a cross-layer utility between Medium Access Control (MAC) and Physical (PHY) layers. Moreover, the optimal transmission power of the external decision-making is obtained as the vehicle’s best strategy, which serves as an input in the next period. In the second-period internal decision-making, the conflicting objectives, i.e., QoS and security, inside an individual vehicle are viewed as two abstract players who compete for the vehicle’s limited resources. Furthermore, a general game is formulated for the internal decision-making to model the behaviors of the “communication player” in controlling the number of data blocks and that of the “security player” in deciding the hash length. The theoretical value of the Nash equilibrium of the internal game is derived and proved to be the two players’ optimal strategy composition. The simulation results demonstrate that the proposed game enables a vehicle to obtain satisfactory QoS and security levels by dynamically adjusting its optimal strategies according to the situated network and traffic environment.

[1]  Fredrik Tufvesson,et al.  A survey on vehicle-to-vehicle propagation channels , 2009, IEEE Wireless Communications.

[2]  Harry J. F. Qiu,et al.  A Methodology for Studying 802.11p VANET Broadcasting Performance With Practical Vehicle Distribution , 2014, IEEE Transactions on Vehicular Technology.

[3]  Hui Li,et al.  A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[4]  Noureddine Boudriga,et al.  A secure QoS aware VANET , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).

[5]  Paolo Santi,et al.  Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety-Critical Information , 2009, IEEE Transactions on Vehicular Technology.

[6]  David Hutchison,et al.  Survey of Game Theory and Future Trends for Applications in Emerging Wireless Data Communication Networks , 2017, 1704.00323.

[7]  Heinrich von Stackelberg Market Structure and Equilibrium , 2010 .

[8]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[9]  Elyes Ben Hamida,et al.  On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.

[10]  Bo Ai,et al.  5-GHz Obstructed Vehicle-to-Vehicle Channel Characterization for Internet of Intelligent Vehicles , 2019, IEEE Internet of Things Journal.

[11]  Peter C. Mason,et al.  Combined Authentication and Quality of Service in Cooperative Communication Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[12]  Emmanuel Chaput,et al.  Comparison of CSMA and TDMA for a Heartbeat VANET Application , 2010, 2010 IEEE International Conference on Communications.

[13]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[14]  Angelos Antonopoulos,et al.  Bankruptcy Problem in Network Sharing: Fundamentals, Applications and Challenges , 2020, IEEE Wireless Communications.

[15]  Sunilkumar S. Manvi,et al.  A survey on authentication schemes in VANETs for secured communication , 2017, Veh. Commun..

[16]  仲上 稔,et al.  The m-Distribution As the General Formula of Intensity Distribution of Rapid Fading , 1957 .

[17]  Shujing Li,et al.  SCMAC: A Slotted-Contention-Based Media Access Control Protocol for Cooperative Safety in VANETs , 2020, IEEE Internet of Things Journal.

[18]  Angela Doufexi,et al.  V2V for Vehicular Safety Applications , 2020, IEEE Transactions on Intelligent Transportation Systems.

[19]  Hazem H. Refai,et al.  Unsaturated Performance of IEEE 802.11 Broadcast Service in Vehicle-to-Vehicle Networks , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[20]  T. Aaron Gulliver,et al.  Store-Carry-Forward Message Dissemination in Vehicular Ad-Hoc Networks with Local Density Estimation , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[21]  Fan Bai,et al.  Mobile Vehicle-to-Vehicle Narrow-Band Channel Measurement and Characterization of the 5.9 GHz Dedicated Short Range Communication (DSRC) Frequency Band , 2007, IEEE Journal on Selected Areas in Communications.

[22]  Jerzy Konorski A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.

[23]  Qiang Ni,et al.  Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs , 2016, IEEE Transactions on Dependable and Secure Computing.

[24]  Hong Wen,et al.  On the Security–Reliability and Secrecy Throughput of Random Mobile User in Internet of Things , 2020, IEEE Internet of Things Journal.

[25]  Xue Liu,et al.  Performance and Reliability Analysis of IEEE 802.11p Safety Communication in a Highway Environment , 2013, IEEE Transactions on Vehicular Technology.

[26]  Weiwen Deng,et al.  Non-cooperative game of effective channel capacity and security strength in vehicular networks , 2017, Phys. Commun..

[27]  J. Eberspacher,et al.  Intelligent Wireless Communication for Future Autonomous and Cognitive Automobiles , 2007, 2007 IEEE Intelligent Vehicles Symposium.

[28]  Nitin H. Vaidya,et al.  A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[29]  Wei Xu,et al.  QoS Constrained Optimization for Multi-Antenna AF Relaying With Multiple Eavesdroppers , 2015, IEEE Signal Processing Letters.

[30]  Jing Zhu,et al.  MAC for dedicated short range communications in intelligent transport system , 2003, IEEE Commun. Mag..

[31]  Christos V. Verikoukis,et al.  Multi-Player Game Theoretic MAC Strategies for Energy Efficient Data Dissemination , 2014, IEEE Transactions on Wireless Communications.

[32]  Angelos Antonopoulos,et al.  COPS: Cooperative Statistical Misbehavior Mitigation in Network-Coding-Aided Wireless Networks , 2018, IEEE Transactions on Industrial Informatics.

[33]  Marc Stevens Attacks on Hash Functions and Applications , 2012 .

[34]  Zeeshan Hameed Mir,et al.  Simulation and Performance Evaluation of Vehicle-to-Vehicle (V2V) Propagation Model in Urban Environment , 2016, 2016 7th International Conference on Intelligent Systems, Modelling and Simulation (ISMS).

[35]  Aashish Mathur,et al.  On Physical Layer Security of Double Rayleigh Fading Channels for Vehicular Communications , 2018, IEEE Wireless Communications Letters.

[36]  Zibin Zheng,et al.  Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.

[37]  Azzedine Boukerche,et al.  Joint authentication and quality of service provisioning in cooperative communication networks , 2012, Comput. Commun..

[38]  Klaus Wehrle,et al.  ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication , 2008, CoNEXT '08.

[39]  Nei Kato,et al.  Joint optimization of QoS and security for differentiated applications in heterogeneous networks , 2016, IEEE Wireless Communications.

[40]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[41]  Weiwen Deng,et al.  Non-Cooperative Game of Throughput and Hash Length for Adaptive Merkle Tree in Mobile Wireless Networks , 2019, IEEE Transactions on Vehicular Technology.

[42]  Jian Shen,et al.  Secure and Efficient Data Sharing in Dynamic Vehicular Networks , 2020, IEEE Internet of Things Journal.

[43]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[44]  Zhu Qi,et al.  Game-based TDMA MAC protocol for vehicular network , 2017, Journal of Communications and Networks.

[45]  Barbara M. Masini,et al.  On the Performance of IEEE 802.11p and LTE-V2V for the Cooperative Awareness of Connected Vehicles , 2017, IEEE Transactions on Vehicular Technology.

[46]  Nei Kato,et al.  GT-QoSec: A Game-Theoretic Joint Optimization of QoS and Security for Differentiated Services in Next Generation Heterogeneous Networks , 2017, IEEE Transactions on Wireless Communications.

[47]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[48]  Ibrahim Y. Abualhaol,et al.  General BER analysis over Nakagami-m fading channels , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).

[49]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[50]  Hazem H. Refai,et al.  Saturation Performance of IEEE 802.11 Broadcast Scheme in Ad Hoc Wireless LANs , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[51]  Xuemin Shen,et al.  BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.

[52]  Li Zhao,et al.  Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.

[53]  Javaid Iqbal,et al.  Development of FPGA-based system for control of an Unmanned Ground Vehicle with 5-DOF robotic arm , 2015, 2015 15th International Conference on Control, Automation and Systems (ICCAS).