using the grades mechanism to differentiate the users in vanet (3)

7
2012 1 st International Conference on Future Trends in Computing and Communication Technologies 1 Using the Grades Mechanism to Differentiate the Users in Vehicular Ad hoc Network (VANET) Irshad Ahmed Sumra, Halabi Bin Hasbullah Computer and Information Sciences Department Universiti Teknologi PETRONAS, Bandar Seri Iskandar 31750, Tronoh, Perak,Malaysia. [email protected]@pertronas.com.my Jamalul-lail Ab Manan Advanced Analysis & Modeling Cluster,MIMOS Berhad Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia. [email protected] AbstractEnd user is the key module of a future vehicular network and safety and non safety applications mostly focuses on the user’s safety and comfortable during the journey. Security of these applications are very significant and these life saving messages cannot be altered by any attacker. The behavior of the user plays a vital role whiles communicating with other users in a network. Trusted users are those people who behave in a trusted manner while sending and receiving safety or non safety messages in the network. If users change their behavior from a trusted user to a malicious user, it would be harmful for other users of the network. In this paper, the role of the end user in a vehicular network will be discussed in detail and three levels of trust grades for users will be proposed. It is necessary for secure vehicular communication that the user’s role in the network should be in a positive direction, and other users should take more benefits from this new future technology. Keywords- Safety and non Safety applications, Attacker, Trusted user, Behavior, Malicious User, trust grades. I. INTRODUCTION Road accidents and traffic jams are major problems in current traffic systems and these problems directly effect the human lives on the road. In the U.S, more than 6 million vehicle accidents happen every year. More than 2.5 million people are seriously injured and 40,000 people are killed in car accidents every year [1]. These figures have given more incentive to the government and researchers to solve these problems and find some solutions for better secure human life on the road. Vehicular Ad hoc Network (VANET) is a special class of mobile ad hoc network (MANET) and objective of VANET is to reduce the road accidents and safe human lives. Potential applications are focused on traffic problems and provide solutions by sending safety and non safety messages in vehicle to vehicle (V2V) and vehicle to infrastructure (V2I). Users, vehicles and road side units (RSUs) are some of the entities of a vehicular network. The purpose of VANET applications is to serve the users as the users role is more prominent in the whole network’s communications. If a vehicle and a RSU perform their task accurately, but an user changes his/her behavior, then it would be difficult for other users of the network. Trusted users perform their tasks in a proper manner and non-trusted users change their behavior and create problems by launching different types of attacks in a network. The rest of the paper is divided into five sections; in Section II, describe the role of users in VANET and discussed in detail safety and non safety applications of VANET. In Section III, explain the related work in this area and three Trust grades for end users are proposed in section IV. Finally, section V describes the conclusion and future work of this paper. II. ROLE OF END USERS IN VANET Role of end user is most important in VANET and objective of VANET applications to serve the users and reduces the death rate due to road accident. Car manufacturers provide smart vehicles while government agencies provide the basic infrastructure needed to implement applications and serve the users. VANET applications and smart vehicles are major modules and users directly communicate with them and send and receive safety and non safety messages. Users have a direct relationship with applications and smart vehicles; therefore, if users change their behavior and launch any attack, then it would be difficult for other users of the network to take benefit from VANET applications. Safety applications are the most important applications; they are directly related to safety of end users and their priority is high as compare to non safety applications. Figure.1 explains the relationship of end users with safety and non safety applications in vehicle to vehicle (V2V) and vehicle to infrastructure (V2I. Vehicle safety communication project classifies the intelligent safety applications into following the five major categories [2]. Public Safety Applications A public safety application is used to help an emergency team by sending event driven messages. The objective of these applications are to minimize the travel time needed for the emergency team to reach a specific location. The approaching emergency vehicle warning, emergency vehicle signal preemption, SOS Services and Post crash Warning are Public safety applications.

Upload: irshad-ahmed-sumra

Post on 26-Sep-2015

3 views

Category:

Documents


2 download

DESCRIPTION

This paper is related to users behavior in VANET.

TRANSCRIPT

  • 2012 1st International Conference on Future Trends in Computing and Communication Technologies

    1

    Using the Grades Mechanism to Differentiate the Users in

    Vehicular Ad hoc Network (VANET)

    Irshad Ahmed Sumra, Halabi Bin Hasbullah Computer and Information Sciences Department

    Universiti Teknologi PETRONAS, Bandar Seri

    Iskandar 31750, Tronoh,

    Perak,Malaysia. [email protected]@pertronas.com.my

    Jamalul-lail Ab Manan

    Advanced Analysis & Modeling Cluster,MIMOS

    Berhad Technology Park Malaysia, 57000 Kuala

    Lumpur, Malaysia. [email protected]

    Abstract End user is the key module of a future vehicular network and safety and non safety applications mostly focuses

    on the users safety and comfortable during the journey. Security of these applications are very significant and these life

    saving messages cannot be altered by any attacker. The

    behavior of the user plays a vital role whiles communicating

    with other users in a network. Trusted users are those people

    who behave in a trusted manner while sending and receiving

    safety or non safety messages in the network. If users change

    their behavior from a trusted user to a malicious user, it would

    be harmful for other users of the network. In this paper, the

    role of the end user in a vehicular network will be discussed in

    detail and three levels of trust grades for users will be

    proposed. It is necessary for secure vehicular communication

    that the users role in the network should be in a positive direction, and other users should take more benefits from this

    new future technology.

    Keywords- Safety and non Safety applications, Attacker,

    Trusted user, Behavior, Malicious User, trust grades.

    I. INTRODUCTION

    Road accidents and traffic jams are major problems in

    current traffic systems and these problems directly effect the

    human lives on the road. In the U.S, more than 6 million

    vehicle accidents happen every year. More than 2.5 million

    people are seriously injured and 40,000 people are killed in

    car accidents every year [1]. These figures have given more

    incentive to the government and researchers to solve these

    problems and find some solutions for better secure human

    life on the road.

    Vehicular Ad hoc Network (VANET) is a special class of

    mobile ad hoc network (MANET) and objective of VANET

    is to reduce the road accidents and safe human lives.

    Potential applications are focused on traffic problems and

    provide solutions by sending safety and non safety messages

    in vehicle to vehicle (V2V) and vehicle to infrastructure

    (V2I). Users, vehicles and road side units (RSUs) are some

    of the entities of a vehicular network. The purpose of

    VANET applications is to serve the users as the users role is more prominent in the whole networks communications. If a vehicle and a RSU perform their task accurately, but an

    user changes his/her behavior, then it would be difficult for

    other users of the network. Trusted users perform their tasks

    in a proper manner and non-trusted users change their

    behavior and create problems by launching different types

    of attacks in a network.

    The rest of the paper is divided into five sections; in Section

    II, describe the role of users in VANET and discussed in

    detail safety and non safety applications of VANET. In

    Section III, explain the related work in this area and three

    Trust grades for end users are proposed in section IV.

    Finally, section V describes the conclusion and future work

    of this paper.

    II. ROLE OF END USERS IN VANET

    Role of end user is most important in VANET and objective of VANET applications to serve the users and reduces the death rate due to road accident. Car manufacturers provide smart vehicles while government agencies provide the basic infrastructure needed to implement applications and serve the users. VANET applications and smart vehicles are major modules and users directly communicate with them and send and receive safety and non safety messages. Users have a direct relationship with applications and smart vehicles; therefore, if users change their behavior and launch any attack, then it would be difficult for other users of the network to take benefit from VANET applications. Safety applications are the most important applications; they are directly related to safety of end users and their priority is high as compare to non safety applications. Figure.1 explains the relationship of end users with safety and non safety applications in vehicle to vehicle (V2V) and vehicle to infrastructure (V2I. Vehicle safety communication project classifies the intelligent safety applications into following the five major categories [2].

    Public Safety Applications A public safety application is used to help an emergency team by sending event driven messages. The objective of these applications are to minimize the travel time needed for the emergency team to reach a specific location. The approaching emergency vehicle warning, emergency vehicle signal preemption, SOS Services and Post crash Warning are Public safety applications.

  • 2012 1st International Conference on Future Trends in Computing and Communication Technologies

    105

    Intersection Collision Avoidance Application Many major accidents have occurred due to intersection collisions. In the U.S. 2003, more than 9000 people died and 1.5 million people were seriously injured in accidents due to intersections. The intersection collision avoidance system is based on Vehicle to infrastructure (V2I) communication or Infrastructure to Vehicle (I2V) communication.

    Figure 1. Relationship of End user with VANET applications

    Sign Extension Application Sign extension applications guide the driver while driving on the road and sign extension applications work in I2V communications and are called period nature messages. The range of these kinds of messages is between 100m and 500m with the minimum 1Hz frequency.

    Vehicle Diagnostics and Maintenance Application These kinds of applications are related to vehicles diagnostics and maintenance and sending alert messages to the owner of vehicle. So the owner is reminded about safety defects of the vehicle and its maintenance schedule. The range of these events driven messages is 400m and it is used in the I2V type of vehicle communication.

    Information from other Vehicles Application Short range communication is used for sending and receiving information between a host vehicle and other vehicles. These applications are used in V2V or V2I and in both. The 2 to 50 Hz minimum frequencies and the 50m to 400m communication range is used for these kinds of periodic or event driven messages. Non safety applications mostly related to user comfort and these applications have low priority as compare to safety applications. The role of non safety applications are to provide ease of passengers and to improve the traffic system. So here we give overview of some non-safety applications [2,3,4].

    Road Status Application This provides information to other users about the status of roads as well as traffic. It detects the congestion on the road

    and notifies the other users. This is a very important application of VANET; by using this information, people can change their routes and save time and fuel.

    Parking Slot Application Finding an appropriate parking place near shopping malls, restaurants and sport complexes are a difficult task. This application provides information regarding empty parking slots in a specific geographical area. It provides safety for your vehicle and saves your time.

    Toll Collection Application Toll collection is the time consuming task on the highway where hundreds of vehicles pass through a toll collection point. VANET makes it easier as one can pay the toll without stopping his/her vehicle. The vehicle passes by the toll point and the toll collection point scans the Electrical License Plate (ELP) of the vehicle and issues the receipt message. The toll amount, time and location are mentioned in the receipt message.

    Comfort Application The role of non safety applications are to provide comfort to the passengers and improve the traffic system. These applications are related to users entertainment and these applications should not interfere with safety applications. These applications also provide opportunities for business parties to set up their business nears the highway.

    III. RELATED WORK

    The behavior of attackers is extremely hard to

    comprehend as they are constantly changing their behavior

    and launching attacks that vary from area to area in a

    network as well as from network to network. The objective

    of the attacker is to launch different kind of attacks and

    disturb users to achieve his/her own benefit. M. Raya et.al

    [6] described the attacker model and this model consists of

    these kinds of attackers: Insider, Outsider, Malicious,

    Rational, Active, Passive, Local, and Extended. B.Parno

    et.al [7] has also suggested the following class of attackers

    (Adversaries). More detail is given below of each type of

    attacker. Figure.2 shows the details of all types of attackers.

    Figure 2. Different types of attackers in VANET

  • 2012 1st International Conference on Future Trends in Computing and Communication Technologies

    106

    Insider: As an insider, the attacker is a legitimate user in the

    network; therefore, problems are easily created in the

    network by simply altering the certificate keys. Insider

    attackers are possibly more effective as compared to

    outsider attackers. Particular information about the design

    and configuration of a network might be more accessible to

    insider attackers and that information can help these insider

    attackers for launching different kind of attacks.

    Active: Active attackers work in two dimensions while they

    create trouble in the network. These dimensions are

    described here.

    Some packets are generated and sent to other VANET vehicles and also to the infrastructure

    (RSU).

    Signals are generated by active attackers and sent in

    the network in a way that disturbs the main

    frequency band of the communication medium.

    Extended: These kinds of attackers the attackers launch

    attacks related to user privacy violations and wormholes

    type attack. In extended types of attackers, the attackers

    extended and spread their attack (DoS) throughout network

    which causes problems for many entities in that network.

    Malicious: Malicious users can break the integrity of messages sent through the communication in a vehicular environment; this can be done by changing the content of the message. This attack depends on the behavior of the attacker; by altering the existing messages or replaying earlier messages. Outsider: Although outsider attackers are thought of as

    authentic vehicles in a network, they are actually a type of

    intruder. These attackers attempt to misuse the protocols of

    the network; however, their attack range is rather limited as

    compare to insider attack.

    Passive: In this type of attack, eavesdropping is the passive

    attackers main goal. The attacker just wants to listen the communication over the wireless medium between the

    vehicles or infrastructure of the network. This is another

    type of the users privacy violation on the road. Local: This type of attack is often limited in its scope and

    affect, as the attackers can only control the VANET vehicles

    or its infrastructure (RSU) locally. Only a localized area is

    effected by an attack such as other entities of the network is

    not bothered and perform their task.

    Rational: Rational attackers have their own goals and they

    determine what specific target will benefit them and they

    attempt to achieve their goals. For example, they often send

    false message regarding road conditions to group of users,

    so due to this wrong message whole areas of traffic divert to

    other roads to clear the road for the benefit of this attacker.

    Snoop: It is a type of attacker that launches different types

    of attacks in a network. Using a vehicular network, it can

    find out where empty garages are located in any particular

    area. Different business companies may use this type of

    attack to find out the users' purchasing habits and use these

    data to plan their business strategies, For example any

    business party offering some new discount to meet their

    business targets.

    Prankster: Pranksters are bored teenagers who sit near the

    road and send two different types of messages in a network.

    Attackers selectively drop the network packets, these

    packets may be safety related or non safety related. Mostly

    this kind of attack is launched by pranksters. They send

    messages to other users and convince users to slow down

    their vehicles and send some messages to others user to

    speed up their vehicles. The purpose of this kind of attack to

    create different types of confusion among the users and also

    prevent safety messages from reaching other users in the

    network.

    Greedy Driver: The GD is a non-trusted user and

    convinces the other users of network through their wrong

    messages to move the traffic in different directions. The

    purpose of these users is to change the flow of traffic from

    any specific area and make it easy for these drivers to move

    and reach their destination on time.

    Industrial Insider: Smart vehicles need software updates

    with the passage of time. Industrial insiders are those non-

    trusted users of industry who physically update the software

    of the vehicle. They have the opportunity to load malicious

    programs inside the vehicle and these malicious programs

    create problems while communicating with other users or

    with roadside units (RSU). Trojan horses or any other type

    of virus are some types of examples of malicious programs.

    Industrial insiders also send rogue keys to other vehicles or

    change the key of that particular vehicle using malicious

    software.

    Malicious Attacker: Malicious users are those people who

    unintentionally or intentionally create problems for

    networks by launching passive or active attacks. In a

    vehicular network, their role is more prominent because

    they can potentially change life critical information on the

    road.

    IV. PROPOSED TRUST GRADES FOR END USERS

    Users are important entities in a network and the purpose of VANET applications to serve the end user and provide safety on the highway. Applications serve the end users when these applications are secured and user should be trusted, otherwise these applications create more problems for users of the network. Good or bad user always remains part of the network and it is difficult to predict his/her behavior on the road due to the dynamic topology of the network. Therefore, trust grades for vehicular users have been proposed and objective of these grades to differentiate between good users and malicious users in a network.

    A. Zero Trusted User (ZTU) (Attackers) Trust Grade (0)

    Zero Trusted Users (ZTUs) are those users that do not possess the trusted credentials and could potentially be the kind of attackers who create problems for legitimate users by

  • 2012 1st International Conference on Future Trends in Computing and Communication Technologies

    107

    launching some type of attack. In the vehicular network, their role is more prominent because they can potentially change the life critical information on the road. All types of attackers which we have discussed in related work is also considered in zero trusted users. Figure.3 shows the Trust grades for End Users.

    Figure 3. Proposed Trust grades for end users in VANET

    Here, we will explain through two different examples (network availability, data integrity) the negative behavior of the attacker in network. We will assign zero grade to all types of attackers who launched such kinds of attacks in network and create problem for other users of the network

    These users could potentially be an active attacker and launch attacks that can be of high intensity. Denial of service attack (DoS) and sybil attacks are examples of such types of attacks. The main objective of attacks is to disturb the direct basic functionality of the network. Figure. 4 show the whole scenario; when the attacker (X) launches the DoS attack in a vehicular network and jams the whole communication medium between V2V and V2I. As a result, users cannot communicate with other users or infrastructure (RSU).

    Figure 4. DoS Attacks between V2V and V2I (Attack on Availability)

    These users can break the integrity of messages sent through the communication in a vehicular environment. Attacker (x) could change the content of the message, for example, "Accident at Location X" can become "Road is clear". Figure. 5 show the example in which attacker X launches an attack on a safety application. Attacker X receives one warning message "Work Zone Warning" from a nearby vehicle A. So attacker X changes the content

    of the message and sends this wrong message "Road is Clear" to vehicle B.

    Figure 5. Safety Application Attack (Attack on data Integrity)

    This type of attacker has no personal recompense for launching the attacks, but they want to achieve their specific goals.

    To create problems for other vehicles of the network by sending any wrong information or

    altering the safety message.

    To generate problems by agitating the right functionality of the network by sending

    unnecessary frames to other vehicles.

    Possible Solutions for Zero Trusted Users (Attackers)

    These are many techniques and security proposal has been

    proposed in previous studies and main purpose of different

    techniques and security proposal to ensure security in

    network and the role of the attackers become zero. So Table

    I explain the summary of some attackers and attacks with

    some possible solutions [8]. M.A Moharrum et. al [9] also

    discussed in detail the some security techniques for secure

    communication in VANET.

    PKI-based Proposal

    Hybrid Approaches

    Pseudonyms-based Approaches

    Group Signature-based Approaches

    Independent Security Improvements

    Identity-based Cryptography Approaches

    B. Weak Trusted User (WTU) Trust Grade (1)

    These people are not attackers, but their behavior indirectly

    effects the main functionality of network. These are the

    factors that change the behavior of the users and assign

    weak trusted users. Figure 6 describes weak users type and we have assigned the one grade to these types of users.

    Figure 6. Different Types of Weak Trusted Users in VANET

    RSU

    Jam

    Area

    XB

    C D

    Jam Communication Area

  • 2012 1st International Conference on Future Trends in Computing and Communication Technologies

    108

    Drinking and Driving: Small amounts of alcohol also effect the behavior of drivers on highways. Most countries of the world where drunk driving is one main reason of road accidents show an open public opinion that drinking and driving is an extremely shameful task. Any amount of alcohol changes the behavior of drivers and other users of the network is directly effected by this bad habit of bad people. In this way, accidents due to drinking can be reduced. Drinking while driving causes the following affects [10].

    Increases reaction time to road hazards

    Driving in the wrong lane on the highway

    Judgment of speed, and distance is very poor

    Driving through red lights.

    Reduces judgment and vision power

    Sleeping while Driving: Driving on the road needs the full attention of the drivers to perform necessary tasks like increasing or decreasing the speed of their vehicle, lane changes and stopping on red lights. Night time, the driving is even more difficult and the need for more attention is vital because at that time the body needs to relax. Midnight and early morning is the most dangerous time for driving; mostly at that time the body wants to sleep. If the vehicle and infrastructure are trusted and performing their tasks properly, then secure messages will be sent among the vehicles and infrastructure. However, if at that time drivers loose their attention due to sleep, accidents can occur on the highway. So in this way, the main objective of the VANET is to provide safety of users life and reduces the accident, but due to negative behavior of users, other user of the network is effected. So, it is necessary for a driver to take seven to nine hours sleep before a long trip or nighttime drive. Many drivers try to solve the problem of sleeping while driving on highway in different ways. Some drivers think that playing loud music or talking on the phone can solves the sleeping problem while driving, but actually these situations make it more dangerous because they distract the driver and he/she looses his/her concentration[11,12]. Mental Stress: Mental stress [13] is one reason for road

    accidents. Mental stress may be due to a bad break up, job

    loss and negative emotions. When your mind is occupied

    due to any tragedy, then it is very difficult to concentrate on

    driving. When user mind is stuck on these bad situations

    then it is better to avoid driving their vehicle.

    Possible Solutions for Weak Trust Users

    These kinds of users are indirectly effect the main

    functionality of the network. Embedded sensors inside the

    smart vehicle might be playing key role to identity the weak

    users. Here we are providing solution according to the

    problems.

    - Drinking and Driving: Sensors can be introduced inside the vehicle to check the alcohol levels in the

    users body. The purpose of these sensors to check the alcohol levels in driver body and warn the drivers

    about their negative activity. Smart vehicles do not

    give permission for driving the vehicle whiles the

    alcohol level is high in a current vehicle user.

    - Sleeping while Driving: Whenever driver sit on the driver seat, one embedded sensor of the smart vehicle

    check the movement time of eyes in any specific

    interval. Time interval could be different from

    normal eye movement of driver and sleepy driver. So

    sensor will guide the situation whenever driver

    sleeping conditions.

    - Mental Stress: Driving need full-time attention on road, if user losses their attention whiles driving it

    would be happened any accident. Mental stress is

    also one of the reasons for road accident and it is

    necessary to solve it and users should be more active

    while using applications of VANET. Mostly blood

    pressures show the metal stress of users, so whenever

    driver starts driving the embedded sensors of the

    vehicle will guide his/her stresses levels. If an user

    stress level is high in any specific point then sensors

    will warn the users to decrease their stress levels or

    stop their vehicle. Due to stress, driver may not give

    full attention for driving and send some wrong

    messages that make accident and create problems for

    other users of the network.

    C. Strong Trusted User (STU) Trust Grade (2)

    Strong Trusted Users (STUs) are those people who perform their tasks properly and achieve the security requirements in the network. Security requirements are important factor for all components of vehicular network, so every module should be secured and work properly to serve the users. Applications and other modules should be fulfilling the maximum levels of security requirements [5, 9]. If network break any security requirements, then it could be difficult for other users of the network. User either communication with other users or with infrastructure and send or received safety or non safety application, it should be met the maximum levels of security requirements. Figure 7 shows the relationship of trusted user with security requirements.

    Figure 7. Strong Trusted Users with security requirements

  • 2012 1st International Conference on Future Trends in Computing and Communication Technologies

    109

    In a vehicular environment the users role is important for building a chain of trust. The chain of trust would be effected if users are not performing their tasks accurately. In their respective vehicles, users communicate with an application unit (AU) and send messages to other vehicles in the network. Trusted users have the following qualities.

    Receive messages from other vehicles, perform task according to the message (safety or non safety) and pass this message on to other vehicles in the network.

    Receive messages from infrastructure (RSU), execute it and then pass this message on to other vehicles of the network.

    Messages are generated by users according to various situations e.g., if an accident has occurred in some specific place, messages are passed on to other vehicles as well as to the infrastructure in the network.

    User Training Program (UTP): Now all responsibilities of the end users, to use properly the potential safety and non safety applications of VANET and take benefit from them. Users must be trained, active and familiar with this vehicular technology as well as its safety and non safety applications. When implementing VANET with its applications in real environments, some training programs should be introduced and explains how to use these applications and take benefits from it and also classify the different types of users (zero, weak and trusted users). User Training Programs (UTPs) give some positive response from users and shows that user are taking benefits from the new vehicular technology and improve their traffic system and reduces road accidents.

    V. CONCLUSION AND FUTURE WORK

    End users require more safety on the road in future vehicular networks and this could be possible by the successful implementing of VANET in real environment with its potential applications. Vehicular applications must be secured; if non-trusted users (attackers) change the content of safety applications then other users are directly effected. Attackers change their attacking behavior and they launch different attacks at different times. The proposed trust grades of attackers are expected to be helpful to identify and understand the behavior of different types of users. Implementation of this future human life saving network could be easy if users play their positive roles and make secure communications. In future work, we will develop such system to identify the users and reduces the role of zero users (attacker) and increase the functionality of trusted users in network.

    REFERENCES

    [1] Jon C, UN: Forget Terrorism Threats, Try Crossing The Road First Global Ministerial Conference on Road Safety, Posted by on Nov 22, 2009.

    [2] National Highway Traffic Safety Administration, CAMP, Vehicle Safety Communications Project Task 3 Final Report, Identify

    Intelligent Vehicle Safety Applications Enabled by DSRC,DOT HS 809 859, Washington , D. C. March 2005.

    [3] Y.Qian, N. Moayeri,Design of Secure and Application Oriented Vanets, Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE ,11-14 May 2008, Singapore

    [4] M.Ghosh, S. Goswami, IntelligentTransportation using VANET, Access date, 25 october 2012, (http://pcquest.ciol.com)

    [5] M. Raya, J.P. Hubaux, The Security of vehicular ad hoc Networks, SASN05, Nov. 07, 2005, alexandria,Virginia USA.

    [6] M. Raya, J. Pierre, Hubaux,Securing vehicular ad hoc Networks Journal of Computer Security,vol.15, issue no.1 January 2007, pp: 39-68.

    [7] B. Parno, A. Perrig, Challenges in Securing Vehicular Networks,, Hot Topics in Networks (HotNets-IV), 2005.

    [8] Isaac, J.T.; Zeadally, S.; Camara, J.S.; , "Security attacks and solutions for vehicular ad hoc networks," Communications, IET , vol.4, no.7, pp. 894-903, April 30 2010.

    [9] Moharrum MA, Al Daraiseh AA. Toward Secure Vehicular Ad-hoc Networks: A Survey. IETE Tech Rev [serial online] 2012 [cited 2012 Nov 21];29:80-9.

    [10] http://www.drinkdriving.ie/ (access date, 12 Nov. 2012).

    [11] http://longevity.about.com (access date, 15 Nov. 2012).

    [12] http://en.wikipedia.org/wiki/Sleep-deprived_driving (access date, 20 Nov. 2012).

    [13] www.defensivedriving.com (access date, 20 Nov. 2012)

    [14] B. Liu; Y. Zhong; Sh. Zhang, "Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs," Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on , vol., no., pp.967-972, 16-19 Oct. 2007.

    [15] C. Langley, R. Lucas, Fu. Huirong,"Key management in vehicular ad-hoc networks," Electro/Information Technology, 2008. EIT 2008. IEEE International Conference on , vol., no., pp.223-226, 18-20 May 2008.

    [16] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, J-P.Hubaux, Eviction of Misbehaving and Faulty Nodes in Vehicular Networks, IEEE J. Sel. Areas Commun., 2007, 25, (8), pp. 15571568.

    [17] Xi. Yong, Sha. Kewei, Shi. Weisong, L. Schwiebert, T. Zhang, "Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks," Autonomous Decentralized Systems, 2007. ISADS '07. Eighth International Symposium on , vol., no., pp.344-351, 21-23 March 2007.

    [18] P. Cencioni, R. D. Pietro, A mechanism to enforce privacy in vehicle-to-infrastructure communication Computer communications,vol 31, issue 12, 30 july 2008, pp 2790 - 2802.

    [19] D.Floriand, F. Lars , M. Przemyslaw , VARS: a vehicle ad hoc network reputation system. Int. Conf. on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 2005, pp. 454456.

    [20] N. Wei Lo, H. C. Tsai, "Illusion Attack on VANET Applications - A Message Plausibility Problem," Globecom Workshops, 2007 IEEE , vol., no., pp.1-8, 26-30 Nov. 2007.

    [21] G.Yan, S.Olariu, C.Michele, Weigle,Providing VANET security through active position detection, Computer Communications, vol 31, Issue 12, 30 July 2008, pp 2883-2897.

    [22] T.Leinmuller, C.Maihofer, E.Schoch, F. Kargl, Improved security in geographic ad hoc routing through autonomous position verification, Third Int. Workshop on Vehicular Ad Hoc Networks (VANET 2006), 2006, pp. 5766.

  • 2012 1st International Conference on Future Trends in Computing and Communication Technologies

    110

    TABLE I. POSSIBLE PROPOSED SECURITY SOLUTIONS FOR ATTACKERS AND ATTACKS IN VANET

    Authors Attacker and

    Attacks Name

    Proposed

    Solutions

    Working of Proposed Solutions

    Liu et al.

    [14]

    Malicious

    vehicle

    Probabilistic

    method

    The authors proposed a probabilistic method and this method uses bloom

    filters and TPD, to keep the record of both dishonest nodes and trusted

    nodes in network. Main purpose of proposed work to isolate malicious

    nodes in network.

    Langley et

    al. [15]

    Brute force

    attacks

    Secure

    method for

    authentication

    The Authors proposed secure method for authentication and this method

    requires use of some unique identification for vehicles and then Hashed

    these unique identifications using of some hash algorithm.

    Raya et al.

    [16]

    Misbehaving

    and faulty

    nodes

    Proposed

    Framework

    The Authors proposed a framework for the identification and local control of

    such kind of attacks. Proposed framework consists of the following basic

    components:

    Centralized Revocation of a vehicle (node) by the CA.

    Local detection of misbehavior performed individually by each vehicle (node).

    A distributed, localized protocol for the eviction of an attacker by its neighboring vehicle (nodes).

    Xi et al.

    [17]

    Malicious

    users

    Random

    keyset-based

    authentication

    Protocol

    The Authors proposed a protocol and this protocol saves the user privacy

    under the zero-trust policy. In this protocol there is no trusted central

    authority for users privacy and users have to rely on OBUs and OBU ensure the privacy of end users in network.

    Cencioni

    et al. [18]

    Traffic

    analysis

    attacks

    Proposed

    Protocol

    (VIPER)

    The Authors proposed VIPER: a vehicle-to infrastructure Communication

    privacy enforcement protocol and objective is to resilient traffic analysis

    attacks. Proposed protocol (VIPER) is resilient to three kinds of traffic

    analysis attacks:

    Message Coding Attack

    Message Volume Attack

    Timing Attack

    Florian et

    al. [19]

    Malicious

    nodes

    Vehicle

    Ad hoc

    Reputation

    System

    (VARS)

    The Authors proposed VARS and this proposed trust system is a completely

    distributed approach based on reputation method. This Vehicle Ad hoc

    Reputation System (VARS) make use of direct and indirect trust in network

    and through the opinion piggybacking to provide the confidence decisions

    on event messages.

    Lo et al.

    [20]

    illusion

    attacks

    Plausibility

    validation

    Network

    (PVN)

    The Authors proposed new system architecture which is called Plausibility

    validation Network (PVN) to handle with this attack. The proposed new

    system architecture is to check the sensors raw data and evaluate it whether

    the incoming or generated message is valid or not.

    Yan et al.

    [21]

    Forging

    positions and

    Sybil attacks

    Proposed a

    novel solution

    The Authors have been mentioned three types of attack in threat model.

    Position Attack

    Sybil Attack

    Combination of the position attack and the Sybil attack

    The Authors proposed a novel solution that uses on-board radar and its role

    is as the virtual eye of a vehicle.

    Leinmull

    er et al.

    [22]

    Position

    cheating and

    false position

    disseminating

    Proposed

    detection

    mechanism

    The Authors proposed a detection mechanism that is capable of recognizing

    cheating nodes about their position. The proposed mechanism is provided

    the security of geographic routing by focusing on infrastructure-less

    autonomous position verification in network. In this mechanism each node

    independently judge the position claims of others nodes without using

    special hardware device.