Browse > Article
http://dx.doi.org/10.1109/JCN.2013.000028

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs  

Chen, Yi-Ming (Department of Information Management, National Central University)
Wei, Yu-Chih (Department of Information Management, National Central University, Information & Communication Security Lab., TL, Chunghwa Telecom co. Ltd.)
Publication Information
Abstract
In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.
Keywords
Privacy; safety; trust management; vehicle ad-hoc network (VANET);
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. C. V. S. C. Consortium, "Vehicle safety communications project task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc," Tech. Rep. DOT HS 809 859, National Highway Traffic Safety Administration, Mar. 2005.
2 H. M. Zahera, G. F. El-Hady, and W. F. A. El-Wahed, "Query recommendation for improving search engine results," IJIRR, pp. 45-52, 2011.
3 Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE J. Sel. Areas. Commun., vol. 24, no. 2, pp. 305-317, 2006.   DOI   ScienceOn
4 J. Luo, X. Liu, andM. Fan, "A trust model based on fuzzy recommendation for mobile ad-hoc networks," Comput. Netw., vol. 53, no. 14, pp. 2396- 2407, 2009.   DOI   ScienceOn
5 T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks," IEEE Internet Comput.,, vol. 9, no. 6, pp. 35-41, 2005.
6 W. Li and A. Joshi, "Outlier detection in ad hoc networks using Dempster- Shafer theory," in Proc. MDM, May 2009, pp. 112-121.
7 B. Aslam, S. Park, C. Zou, and D. Turgut, "Secure traffic data propagation in vehicular ad hoc networks," Int. J. Ad Hoc Ubiquitous Comput., vol. 6, no. 1, pp. 24-39, 2010.   DOI
8 C. Harsch, A. Festag, and P. Papadimitratos, "Secure position-based routing for VANETs," in Proc. IEEE VTC, 2007, pp. 26-30.
9 Y. Yang and X. Liu, "A re-examination of text categorization methods," in Proc. ACM SIGIR, 1999, pp. 42-49.
10 T. Leinmuller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Commun., vol. 13, pp. 16- 21, Oct. 2006.
11 M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security, vol. 15, no. 1, pp. 39-68, 2007.   DOI
12 F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Proc. PETS, vol. 3856, Springer Berlin Heidelberg, 2006, pp. 197-209.
13 M. Gerlach and F. Guttler, "Privacy in VANETs using changing pseudonyms - ideal and real," in Proc. IEEE VTC, Apr. 2007, pp. 2521- 2525.
14 G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proc. ACM VANET, New York, NY, USA, 2007, pp. 19-28.
15 J. Sun and Y. Fang, "Defense against misbehavior in anonymous vehicular ad hoc networks," Ad Hoc Netw., vol. 7, no. 8, pp. 1515-1525, 2009.   DOI   ScienceOn
16 R. K. Schmidt, T. Leinmuller, E. Schoch, A. Held, and G. Schafer, "Vehicle behavior analysis to enhance security in VANETs," in Proc. V2VCOM, 2009.
17 M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, "Eviction of misbehaving and faulty nodes in vehicular networks," IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1557-1568, 2007.   DOI   ScienceOn
18 M. Ghosh, A. Varghese, A. A. Kherani, and A. Gupta, "Distributed misbehavior detection in VANETs," in Proc. IEEE WCNC, 2009, pp. 1-6.
19 X. Hong, D. Huang, M. Gerla, and Z. Cao, "SAT: Situation-aware trust architecture for vehicular networks," IEEE Commun. Mag., 2008.
20 M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, "Detecting misbehaviors in VANET with integrated root-cause analysis," Ad Hoc Netw., vol. 8, no. 7, pp. 778-790, 2010.   DOI   ScienceOn
21 F. Dotzer, L. Fischer, and P. Magiera, "VARs: A vehicle ad-hoc network reputation system," in Proc. WOWMOM, 2005, pp. 454-456.
22 B. Ostermaier, F. Dotzer, and M. Strassberger, "Enhancing the security of local dangerwarnings in VANETs - a simulative analysis of voting schemes," in Proc. ARES, Apr. 2007, pp. 422-431,
23 Q.Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, 2010.   DOI   ScienceOn
24 M. Raya, P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "On data-centric trust establishment in ephemeral ad hoc networks," in Proc. INFOCOM, 2008, pp. 1238-1246.
25 N.-W. Lo and H.-C. Tsai, "A reputation system for traffic safety event on vehicular ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2009, Dec. 2009.
26 T. Leinmuller, C. Maihofer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification," in Proc. VANET, 2006.
27 J. Grover, N. K. Prajapati, V. Laxmi, and M. S. Gaur, "Machine learning approach for multiple misbehavior detection in VANET," in Proc. ACC, vol. 192, Springer Berlin Heidelberg, 2011, pp. 644-653.
28 J. Grover, V. Laxmi, and M. Gaur, "Misbehavior detection based on ensemble learning in VANET advanced computing," in Proc. ADCONS, vol. 7135, Springer Berlin Heidelberg, 2012, pp. 602-611.
29 Z. Huang, S. Ruj,M. Cavenaghi, M. Stojmenovic, and A. Nayak, "A social network approach to trust management in VANETs," Peer-to-Peer Netw. Appl., pp. 1-14, 2012.
30 X. Zhuo, J. Hao, D. Liu, and Y. Dai, "Removal of misbehaving insiders in anonymous VANETs," in Proc. ACM MSWIM, 2009, pp. 106-115.
31 IEEE Trial-Use Standard for Wireless Access in Vehicular Environments - Security Services for Applications andManagement Messages, IEEE Standard 1609.2-2006, pp. 1-105, 2006.
32 K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "Amoeba: Robust location privacy scheme for VANET," IEEE J. Sel. Areas Commun., vol. 25, pp. 1569-1589, Oct. 2007.   DOI   ScienceOn
33 E. Schoch, F. Kargl, T. Leinmuller, S. Schlott, and P. Papadimitratos, "Impact of pseudonym changes on geographic routing in VANETs," in Proc. ESAS, vol. 4357, Springer Berlin Heidelberg, 2006, pp. 43-57.
34 R. Schmidt, T. Leinmuller, E. Schoch, F. Kargl, and G. Schafer, "Exploration of adaptive beaconing for efficient intervehicle safety communication," IEEE Network, vol. 24, no. 1, pp. 14-19, 2010.
35 A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002.
36 P. Wex, J. Breuer, A. Held, T. Leinmuller, and L. Delgrossi, "Trust issues for vehicular ad hoc networks," in Proc. VTC, 2008, pp. 2800-2804.
37 A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]," IEEE Trans. Wireless Commun., vol. 17, pp. 22-28, Oct. 2010.
38 S. Ahren, B. Fan, B. Bhargav, and P. Adrian, "Flexible, extensible, and efficient VANET authentication," J. Commun. Netw., vol. 11, no. 6, pp. 894- 901, 2009.
39 Y.-C. Wei, Y.-M. Chen, and H.-L. Shan, "Beacon-based trust management for location privacy enhancement VANETs," in Proc. APNOMS, Sept. 2011.
40 G. Yan, S. Olariu, and M. C. Weigle, "Providing VANET security through active position detection," Comput. Commun., vol. 31, no. 12, pp. 2883- 2897, 2008.   DOI   ScienceOn
41 S.-H. Cha, "Comprehensive survey on distance/similarity measures between probability density functions," Int. J. Math. Models Methods Applied Sci., vol. 1, no. 4, pp. 300-307, 2008.