Illusion Attack on VANET Applications - A Message Plausibility Problem

In order to reduce car accidents, provide emergency information, novel applications on vehicular ad hoc networks (VANETs) have drawn a lot of attention in resent years. This paper presents a new security threat on VANET applications called illusion attack. In this attack, based on the current during condition on the road, the adversary broadcasts the scene-aligned traffic warning messages, which produce an illusion to cars at its neighborhood. In consequence, the illusion can largely manipulate other drivers' behaviors on their responses. The illusion attack can easily cause car accident, traffic jam and the decrease of VANET performance in terms of bandwidth utilization. We discuss the reasons why traditional authentication mechanisms cannot resolve this security threat effectively and propose a new model, called plausibility validation network (PVN), to remedy the illusion attack. Finally, we analyze the security properties and potential overhead of proposed model.

[1]  Wai Chen,et al.  Ad hoc peer-to-peer network architecture for vehicle safety communications , 2005, IEEE Communications Magazine.

[2]  Liviu Iftode,et al.  Outdoor Experience with the TrafficView Application , 2006 .

[3]  Thomas Nowey,et al.  Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[4]  Jun Luo,et al.  A Survey of Inter-Vehicle Communication , 2004 .

[5]  Maxim Raya,et al.  Certificate Revocation in Vehicular Networks , 2006 .

[6]  Liviu Iftode,et al.  TrafficView: traffic data dissemination using car-to-car communication , 2004, MOCO.

[7]  Raja Sengupta,et al.  Vehicle-to-vehicle safety messaging in DSRC , 2004, VANET '04.

[8]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[9]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[10]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[11]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[12]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[13]  Liviu Iftode,et al.  Probabilistic validation of aggregated data in vehicular ad-hoc networks , 2006, VANET '06.

[14]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[15]  Amer Aijaz,et al.  Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .

[16]  Hariharan Krishnan,et al.  Performance evaluation of safety applications over DSRC vehicular ad hoc networks , 2004, VANET '04.

[17]  A. Festag,et al.  A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006 , 2006 .

[18]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[19]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[20]  Ted R. Miller,et al.  THE ECONOMIC IMPACT OF MOTOR VEHICLE CRASHES, 2000 , 2002 .

[21]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[22]  W. D. Jones Building safer cars , 2002 .

[23]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[24]  S. Eichler,et al.  Secure routing in a vehicular ad hoc network , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.