DOI QR코드

DOI QR Code

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming (Department of Information Management, National Central University) ;
  • Wei, Yu-Chih (Department of Information Management, National Central University, Information & Communication Security Lab., TL, Chunghwa Telecom co. Ltd.)
  • Received : 2012.09.15
  • Published : 2013.04.30

Abstract

In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

Keywords

References

  1. M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007. https://doi.org/10.3233/JCS-2007-15103
  2. F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Proc. PETS, vol. 3856, Springer Berlin Heidelberg, 2006, pp. 197-209.
  3. M. Gerlach and F. Guttler, "Privacy in VANETs using changing pseudonyms - ideal and real," in Proc. IEEE VTC, Apr. 2007, pp. 2521- 2525.
  4. G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proc. ACM VANET, New York, NY, USA, 2007, pp. 19-28.
  5. J. Sun and Y. Fang, "Defense against misbehavior in anonymous vehicular ad hoc networks," Ad Hoc Netw., vol. 7, no. 8, pp. 1515-1525, 2009. https://doi.org/10.1016/j.adhoc.2009.04.013
  6. T. Leinmuller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Commun., vol. 13, pp. 16- 21, Oct. 2006.
  7. R. K. Schmidt, T. Leinmuller, E. Schoch, A. Held, and G. Schafer, "Vehicle behavior analysis to enhance security in VANETs," in Proc. V2VCOM, 2009.
  8. M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, 2007. https://doi.org/10.1109/JSAC.2007.071006
  9. M. Ghosh, A. Varghese, A. A. Kherani, and A. Gupta, "Distributed misbehavior detection in VANETs," in Proc. IEEE WCNC, 2009, pp. 1-6.
  10. M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, "Detecting misbehaviors in VANET with integrated root-cause analysis," Ad Hoc Netw., vol. 8, no. 7, pp. 778-790, 2010. https://doi.org/10.1016/j.adhoc.2010.02.008
  11. X. Hong, D. Huang, M. Gerla, and Z. Cao, "SAT: Situation-aware trust architecture for vehicular networks," IEEE Commun. Mag., 2008.
  12. F. Dotzer, L. Fischer, and P. Magiera, "VARs: A vehicle ad-hoc network reputation system," in Proc. WOWMOM, 2005, pp. 454-456.
  13. B. Ostermaier, F. Dotzer, and M. Strassberger, "Enhancing the security of local dangerwarnings in VANETs - a simulative analysis of voting schemes," in Proc. ARES, Apr. 2007, pp. 422-431,
  14. Q.Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, 2010. https://doi.org/10.1109/TVT.2009.2034669
  15. M. Raya, P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "On data-centric trust establishment in ephemeral ad hoc networks," in Proc. INFOCOM, 2008, pp. 1238-1246.
  16. T. Leinmuller, C. Maihofer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," in Proc. VANET, 2006.
  17. J. Grover, N. K. Prajapati, V. Laxmi, and M. S. Gaur, "Machine learning approach for multiple misbehavior detection in VANET," in Proc. ACC, vol. 192, Springer Berlin Heidelberg, 2011, pp. 644-653.
  18. J. Grover, V. Laxmi, and M. Gaur, "Misbehavior detection based on ensemble learning in VANET advanced computing," in Proc. ADCONS, vol. 7135, Springer Berlin Heidelberg, 2012, pp. 602-611.
  19. N.-W. Lo and H.-C. Tsai, "A reputation system for traffic safety event on vehicular ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2009, Dec. 2009.
  20. Z. Huang, S. Ruj,M. Cavenaghi, M. Stojmenovic, and A. Nayak, "A social network approach to trust management in VANETs," Peer-to-Peer Netw. Appl., pp. 1-14, 2012.
  21. X. Zhuo, J. Hao, D. Liu, and Y. Dai, "Removal of misbehaving insiders in anonymous VANETs," in Proc. ACM MSWIM, 2009, pp. 106-115.
  22. K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "Amoeba: Robust location privacy scheme for VANET," IEEE J. Sel. Areas Commun., vol. 25, pp. 1569-1589, Oct. 2007. https://doi.org/10.1109/JSAC.2007.071007
  23. E. Schoch, F. Kargl, T. Leinmuller, S. Schlott, and P. Papadimitratos, "Impact of pseudonym changes on geographic routing in VANETs," in Proc. ESAS, vol. 4357, Springer Berlin Heidelberg, 2006, pp. 43-57.
  24. R. Schmidt, T. Leinmuller, E. Schoch, F. Kargl, and G. Schafer, "Exploration of adaptive beaconing for efficient intervehicle safety communication," IEEE Network, vol. 24, no. 1, pp. 14-19, 2010.
  25. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications andManagement Messages, IEEE Standard 1609.2-2006, pp. 1-105, 2006.
  26. A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002.
  27. A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]," IEEE Trans. Wireless Commun., vol. 17, pp. 22-28, Oct. 2010.
  28. S. Ahren, B. Fan, B. Bhargav, and P. Adrian, "Flexible, extensible, and efficient VANET authentication," J. Commun. Netw., vol. 11, no. 6, pp. 894- 901, 2009.
  29. Y.-C. Wei, Y.-M. Chen, and H.-L. Shan, "Beacon-based trust management for location privacy enhancement VANETs," in Proc. APNOMS, Sept. 2011.
  30. P. Wex, J. Breuer, A. Held, T. Leinmuller, and L. Delgrossi, "Trust issues for vehicular ad hoc networks," in Proc. VTC, 2008, pp. 2800-2804.
  31. G. Yan, S. Olariu, and M. C. Weigle, "Providing VANET security through active position detection," Comput. Commun., vol. 31, no. 12, pp. 2883- 2897, 2008. https://doi.org/10.1016/j.comcom.2008.01.009
  32. S.-H. Cha, "Comprehensive survey on distance/similarity measures between probability density functions," Int. J. Math. Models Methods Applied Sci., vol. 1, no. 4, pp. 300-307, 2008.
  33. T. C. V. S. C. Consortium, "Vehicle safety communications project task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc," Tech. Rep. DOT HS 809 859, National Highway Traffic Safety Administration, Mar. 2005.
  34. H. M. Zahera, G. F. El-Hady, and W. F. A. El-Wahed, "Query recommendation for improving search engine results," IJIRR, pp. 45-52, 2011.
  35. Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE J. Sel. Areas. Commun., vol. 24, no. 2, pp. 305-317, 2006. https://doi.org/10.1109/JSAC.2005.861389
  36. J. Luo, X. Liu, andM. Fan, "A trust model based on fuzzy recommendation for mobile ad-hoc networks," Comput. Netw., vol. 53, no. 14, pp. 2396- 2407, 2009. https://doi.org/10.1016/j.comnet.2009.04.008
  37. T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks," IEEE Internet Comput.,, vol. 9, no. 6, pp. 35-41, 2005.
  38. W. Li and A. Joshi, "Outlier detection in ad hoc networks using Dempster- Shafer theory," in Proc. MDM, May 2009, pp. 112-121.
  39. B. Aslam, S. Park, C. Zou, and D. Turgut, "Secure traffic data propagation in vehicular ad hoc networks," Int. J. Ad Hoc Ubiquitous Comput., vol. 6, no. 1, pp. 24-39, 2010. https://doi.org/10.1504/IJAHUC.2010.033823
  40. C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs," in Proc. IEEE VTC, 2007, pp. 26-30.
  41. Y. Yang and X. Liu, "A re-examination of text categorization methods," in Proc. ACM SIGIR, 1999, pp. 42-49.