DOI QR코드

DOI QR Code

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A. (Department of Information and Communications Engineering, University of Murcia) ;
  • Vigueras, Daniel (Department of Information and Communications Engineering, University of Murcia) ;
  • Ros, Francisco J. (Department of Information and Communications Engineering, University of Murcia) ;
  • Ruiz, Pedro M. (Department of Information and Communications Engineering, University of Murcia)
  • Received : 2012.07.27
  • Published : 2013.04.30

Abstract

We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.

Keywords

References

  1. M. Mauve, A. Widmer, and H. Hartenstein, "A survey on position-based routing in mobile ad hoc networks," IEEE netw., vol. 15, no. 6, pp. 30-39, 2001. https://doi.org/10.1109/65.967595
  2. F. Li and Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE Veh. Technol. Mag., vol. 2, no. 2, pp. 12-22, 2007.
  3. C. Lochert, H. Hartenstein, J. Tian, H. Fussler, D. Hermann, and M. Mauve, "A routing strategy for vehicular ad hoc networks in city environments," in Proc. IEEE IVS, 2003, pp. 156-161.
  4. J. Tian, L. Han, K. Rothermel, and C. Cseh, "Spatially aware packet rout ing for mobile ad hoc inter-vehicle radio networks," in Proc. IEEE ITSC, 2003, pp. 1546-1551.
  5. B. Seet, G. Liu, B. Lee, C. Foh, K.Wong, and K. Lee, "A-STAR: A mobile ad hoc routing strategy for metropolis vehicular communications," in Proc. IFIP-TC6 Netw., 2004, pp. 989-999.
  6. I. Leontiadis and C. Mascolo, "GeOpps: Geographical opportunistic routing for vehicular networks," in Proc. WoWMoM, 2007, pp. 1-6.
  7. P. Ruiz, V. Cabrera, J. Martinez, and F. Ros, "BRAVE: Beacon-less routing algorithm for vehicular environments," in Proc. IEEE MASS, 2010, pp. 709-714.
  8. J. Douceur, "The sybil attack," in Proc. IPTPS, 2002, pp. 251-260.
  9. J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses," in Proc. IPSN, 2004, pp. 259-268.
  10. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc netw., vol. 1, no. 2-3, pp. 293-315, 2003. https://doi.org/10.1016/S1570-8705(03)00008-8
  11. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, IEEE. Std. 1609.2-2006, 2006.
  12. I. Lequerica, J. A. Martinez, and P. M. Ruiz, "Efficient certificate revocation in vehicular networks using NGN capabilities," in Proc. IEEE VTC, 2010, pp. 1-5.
  13. R. Marín-Pérez and P. M. Ruiz, "SBGR: A simple self-protected beaconless geographic routing for wireless sensor networks," in Proc. IEEE MASS, 2011, pp. 610-619.
  14. M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Secur., vol. 15, pp. 39-68, Jan. 2007.
  15. P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: Design and architecture," IEEE Commun. Mag., vol. 46, no. 11, pp. 100-109, 2008.
  16. C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs," in Proc. IEEE VTC, 2007, pp. 26-30.
  17. A. Festag, P. Papadimitratos, and T. Tielert, "Design and performance of secure geo-cast for vehicular communication," IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2456-2471, June 2010. https://doi.org/10.1109/TVT.2010.2045014
  18. V. Cabrera, F. Ros, and P. Ruiz, "Simulation-based study of common issues in VANET routing protocols," in Proc. IEEE VTC, 2009.
  19. J. Sanchez, R. Marin-Perez, and P. Ruiz, "Beacon-less geographic routing in real wireless sensor networks," J. Comput. Sci. Technol., vol. 23, no. 3, pp. 438-450, 2008. https://doi.org/10.1007/s11390-008-9145-8
  20. Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M. Torrent-Moreno, L. Delgrossi, and H. Hartenstein, "Overhaul of IEEE 802.11 modeling and simulation in NS-2," [Online]. Available: http://dsn.tm.kit.edu/english/ Overhaul_NS-2.php
  21. F. Martinez, M. Fogue, C. K. Toh, J. C. Cano, C. T. Calafate, and P. Manzoni, "Computer simulations of VANETs using realistic city topologies," Wireless Pers. Commun., pp. 1-25, 2012.