Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to transmit information covertly. In this work, two mechanisms for vehicle reporting are proposed based on two information hiding techniques—subliminal channels and steganography. The approach is to embed information into beacon messages either in the signature process (subliminal channel) or altering the least significant bits of selected sensorial fields (steganography). Results show that the proposal is computationally feasible for current vehicular devices and that it is possible to configure the system to operate in highways, secondary roads, and urban maps.

[1]  María Isabel González Vasco,et al.  A Subliminal-Free Variant of ECDSA , 2006, Information Hiding.

[2]  Panagiotis Papadimitratos,et al.  Design and Performance of Secure Geocast for Vehicular Communication , 2010, IEEE Transactions on Vehicular Technology.

[3]  Fan Bai,et al.  Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[4]  Christian Bäcker,et al.  Subliminal Channels in Cryptographic Systems , 2009 .

[5]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[6]  Ana I. González-Tablas,et al.  Towards an automatic enforcement for speeding: enhanced model and intelligent transportation systems realisation , 2012 .

[7]  Gustavus J. Simmons,et al.  Subliminal Communication is Easy Using the DSA , 1994, EUROCRYPT.

[8]  Ozan K. Tonguz,et al.  Network Connectivity of VANETs in Urban Areas , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[9]  Norsheila Fisal,et al.  Overview of Wireless Access in Vehicular Environment (WAVE) protocols and standards , 2013 .

[10]  Yuan Wen Hau,et al.  A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography , 2008 .

[11]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[12]  Mohamed Khalil Hani,et al.  A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography , 2008, 2008 International Conference on Electronic Design.

[13]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[14]  Miodrag Potkonjak,et al.  Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.

[15]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[16]  James W. Moore,et al.  Institute of Electrical and Electronics Engineers (IEEE) , 2002 .

[17]  Sushil Jajodia,et al.  Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..

[18]  Radu Sion,et al.  On Watermarking Numeric Sets , 2002, IWDW.

[19]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[20]  Guang Gong,et al.  Elliptic Curve Digital Signatures and Accessories , 2007 .

[21]  Elmar Schoch,et al.  On the efficiency of secure beaconing in VANETs , 2010, WiSec '10.

[22]  José María de Fuentes,et al.  WEVAN - A mechanism for evidence creation and verification in VANETs , 2013, J. Syst. Archit..