Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Central misbehavior evaluation for VANETs based on mobility data plausibility

 
: Bißmeyer, Norbert; Njeukam, Joël; Petit, Jonathan; Bayarou, Kpatcha

:
Postprint urn:nbn:de:0011-n-2092881 (223 KByte PDF)
MD5 Fingerprint: 950f2c5e48d664c98c6110f013b63c84
© ACM 2012 This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution.
Created on: 31.7.2012


Association for Computing Machinery -ACM-:
VANET 2012, Ninth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications. Proceedings : Lake District, United Kingdom, June 2012
New York: ACM, 2012
ISBN: 978-1-4503-1317-9
pp.73-82
International Workshop on VehiculAR Inter-NETworking, Systems, and Applications (VANET) <9, 2012, Low Wood Bay>
English
Conference Paper, Electronic Publication
Fraunhofer SIT ()
C2X; C2C; VANET; IDS; misbehavior evaluation; intrusion detection; V2X; V2V; trust; confidence; reputation

Abstract
Trustworthy communication in vehicular ad-hoc networks is essential to provide functional and reliable traffic safety and efficiency applications. A Sybil attacker that is simulating "ghost vehicles" on the road, by sending messages with faked position statements, must be detected and excluded permanently from the network. Based on misbehavior detection systems, running on vehicles and roadside units, a central evaluation scheme is proposed that aims to identify and exclude attackers from the network. The proposed algorithms of the central scheme are using trust and reputation information provided in misbehavior reports in order to guarantee long-term functionality of the network. A main aspect, the scalability, is given as misbehavior reports are created only if an incident is detected in the VANET. Therefore, the load of the proposed central system is not related to the total number of network nodes. A simulation study is conducted to show the effective and reliable detection of attacker nodes, assuming a majority of benign misbehavior reporters. Extensive simulations show that a few benign nodes (at least three witnesses) are enough to significantly decrease the fake node reputation and thus identify the cause of misbehavior. In case of colluding attackers, simulations show that if 37% of neighbor nodes cooperate, then an attack could be obfuscated.

: http://publica.fraunhofer.de/documents/N-209288.html