Cooperative Intelligent Transportation Systems (cITS) are a promising technology to enhance driving safety and efficiency. Vehicles communicate wirelessly with other vehicles and infrastructure, thereby creating a highly dynamic and heterogeneously managed ad-hoc network. It is these network properties that make it a challenging task to protect integrity of the data and guarantee its correctness. A major component is the problem that traditional security mechanisms like PKIbased asymmetric cryptography only exclude outsider attackers that do not possess key material. However, because attackers can be insiders within the network (i.e., possess valid key material), this approach cannot detect all possible attacks. In this survey, we present misbehavior detection mechanisms that can detect such insider attacks based on attacker behavior and information analysis. In contrast to well-known intrusion detection for classical IT systems, these misbehavior detection mechanisms analyze information semantics to detect attacks, which aligns better with highly application-tailored communication protocols foreseen for cITS. In our survey, we provide an extensive introduction to the cITS ecosystem and discuss shortcomings of PKI-based security. We derive and discuss a classification for misbehavior detection mechanisms, provide an in-depth overview of seminal papers on the topic, and highlight open issues and possible future research trends.
Abstract-Vehicular networks are a very promising technology to increase traffic safety and efficiency and to enable numerous other applications in the domain of vehicular communication. Proposed applications for VANETs have very diverse properties and often require non-standard communication protocols. Moreover, the dynamics of the network due to vehicle movements further complicates the design of an appropriate, comprehensive communication system. In this work, we collect and categorize envisioned applications from various sources and classify the unique network characteristics of vehicular networks. Based on this analysis, we propose five distinct communication patterns that form the basis of almost all VANET applications. Both the analysis and the communication patterns shall deepen the understanding of VANETs and simplify further development of VANET communication systems.
ne of the major goals of vehicular ad hoc networks (VANETs) is to support traffic safety. Cooperative awareness applications require frequent and low-delay information exchange among vehicles, including data such as current position, movement, and acceleration. This is realized by broadcasting socalled (single-hop) beacon messages. As a result, every vehicle is aware of other vehicles within a certain range. Beaconing is also the basic supporting process that enables geographic routing and message dissemination. However, this also requires a significant amount of bandwidth. The higher the frequency and thus the accuracy, the higher the bandwidth consumption.The first phase of research on VANETs has set the boundary conditions in terms of basic communication protocols and routing paradigms. Communication in VANETs will be based on IEEE 802.11p. Message dissemination and routing are based on geocast principles. Beaconing takes place on a single communication channel (commonly referred to as the control channel) that is shared by all nodes.However, it has also been shown in [1] that the limited bandwidth of the wireless channel has a severe impact on the efficiency of the communication. This means that if the beacon rate is fixed, channel load may increase too much in scenarios with high vehicle density. High channel utilization increases the information loss as packets are received erroneously, which is especially observed at large distances between sender and receiver.Simply reducing the beacon rate is not a suitable solution because it reduces the information quality at the same time. The error between the real position of a vehicle and the last known position retrieved from a beacon increases as the beacon rate is reduced. This results in position inaccuracies, which may disturb correct operation of active safety applications, which rely on accurate and up-to-date information.Currently, there is no final recommendation for a particular static beacon rate. No upper boundary in terms of maximum channel load has been specified. Furthermore, no requirements from the different applications have yet been clearly defined. As a consequence, even minimum and maximum beacon rate are hard to derive as these two boundaries have to satisfy all imaginable road traffic situations.In this article we pave the way for further enhancements of beaconing algorithms for the second phase of research on VANETs. After a short assessment of the current state of the art, we present a detailed analysis of the problem space and how different beacon rates influence 1) the offered load to the channel and 2) the resulting average and maximum accuracy of information Based on this problem evaluation, we motivate a flexible approach to control both appropriately. For this purpose, we propose a situation adaptive beaconing process that adapts the beacon rate continuously. The design space and different candidates for such an algorithm are introduced in this article. AbstractIn the future intervehicle communication will make driving safer, easier...
Abstract-Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs, these so called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security.In this work, we first analyze the problems that may arise from falsified position data. Then, in order to lessen these problems, we propose detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons. In contrast to other position verification approaches, our solution does not rely on special hardware or dedicated infrastructure. Evaluation based on simulations shows that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security.In order to lessen this problem, we propose a detection mechanism that is capable of recognizing nodes cheating about their position in beacons (periodic position dissemination in most single-path geographic routing protocols, e.g. GPSR). Unlike other proposals described in the literature, our detection does not rely on additional hardware or special nodes, which contradicts the ad hoc approach. Instead, this mechanism uses a number of different independent sensors to quickly give an estimation of the trustworthiness of other nodes' position claims without using dedicated infrastructure or specialized hardware.The simulative evaluation proves that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.