Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice

The past decade has witnessed a growing interest in VANET (Vehicular Ad Hoc NETwork) and its myriad potential applications. Nevertheless, despite the surge in VANET research, security and privacy issues have been the root cause of impeded momentum in VANET deployment. In this paper we focus on misbehavior and Sybil attacks from VANET standpoint. With intrusion capabilities in hand, malicious users in VANET can inject false information and launch Sybil attack. Sybil attack refers to pretending one physical node to be many and in worst case almost all kinds of attacks can be launched in the presence of Sybil attack. Misbehavior in VANET can be categorized as a sub-effect of Sybil attack where a malicious vehicular node(s) spoof legitimate identities. There are two main strategies for avoiding misbehavior in VANET; Entity-centric strategies that focus on the revocation of misbehaving nodes by revocation authorities. On the other hand, Data-centric approach mainly focuses on the soundness of information rather than the source of information. We cover both strategies where decision on which strategy to be used, is taken on the basis of traffic situation. In a dense traffic regime, we propose SADS (Sybil Attack Detection Scheme) whereas in sparse traffic regime, we propose LMDS (Location-Based Misbehavior Detection Scheme). Our proposed schemes leverage position verification of the immediate source of warning message. Furthermore, we guarantee security and privacy (conditional anonymity) for both beacons and warning messages.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[3]  Heekuck Oh,et al.  Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET , 2009, WISA.

[4]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[5]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[6]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[7]  K. Ibrahim,et al.  CASCADE: Cluster-Based Accurate Syntactic Compression of Aggregated Data in VANETs , 2008, 2008 IEEE Globecom Workshops.

[8]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[9]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[10]  Yuguang Fang,et al.  Defense against misbehavior in anonymous vehicular ad hoc networks , 2009, Ad Hoc Networks.

[11]  Florian Dötzer,et al.  Privacy Issues in Vehicular Ad Hoc Networks , 2005, Privacy Enhancing Technologies.

[12]  Josep Domingo-Ferrer,et al.  Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[13]  Youngho Park,et al.  A Robust Conditional Privacy-Preserving Authentication Protocol in VANET , 2009, MobiSec.

[14]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[15]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[16]  David Antolino Rivas,et al.  Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation , 2011, J. Netw. Comput. Appl..

[17]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[18]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[19]  Hannes Hartenstein,et al.  Proceedings of the 3rd international workshop on Vehicular ad hoc networks , 2006, MobiCom 2006.

[20]  Raja Sengupta,et al.  Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks , 2004 .

[21]  Xuemin Shen,et al.  A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications , 2010, 2010 IEEE International Conference on Communications.

[22]  Markulf Kohlweiss,et al.  Self-certified Sybil-free pseudonyms , 2008, WiSec '08.

[23]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[24]  Xuemin Shen,et al.  DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.

[25]  Hannes Federrath,et al.  Preventing Profile Generation in Vehicular Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[26]  E. Schoch,et al.  Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[27]  Maxim Raya,et al.  Revocation games in ephemeral networks , 2008, CCS.

[28]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[29]  Arati Baliga,et al.  Secure, pseudonymous, and auditable communication in vehicular ad hoc networks , 2008, Secur. Commun. Networks.

[30]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[31]  Hannes Federrath,et al.  A privacy aware and efficient security infrastructure for vehicular ad hoc networks , 2008, Comput. Stand. Interfaces.

[32]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[33]  Xuemin Shen,et al.  BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree , 2009, IEEE Transactions on Wireless Communications.

[34]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[35]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[36]  Xuemin Shen,et al.  ECMV: Efficient Certificate Management Scheme for Vehicular Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[37]  Panagiotis Papadimitratos,et al.  Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.