Basic Search / Detailed Display

Author: 蔡効謙
Hsiao-Chien Tsai
Thesis Title: 汽車隨意網路上偽造訊息的影響與防禦方法
The Prevention of False Message Influence on Vehicular Ad Hoc Networks - An Event-based Reputation-centric Approach
Advisor: 羅乃維
Nai-Wei Lo
Committee: 吳宗成
Tzong-Chen Wu
賴源正
Yuan-Cheng Lai
Degree: 碩士
Master
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2007
Graduation Academic Year: 95
Language: 英文
Pages: 57
Keywords (in Chinese): 車輛隨意網路無線網路網路安全名譽系統
Keywords (in other languages): VANET, wireless network, network security, reputation system
Reference times: Clicks: 954Downloads: 4
Share:
School Collection Retrieve National Library Collection Retrieve Error Report
  • 為了減少交通事故、提供緊急交通資訊及增加開車的舒適度,車輛隨意網路(Vehicular ad hoc networks) 在近幾年吸引了許多學者的注意。車輛隨意網路與傳統無線網路最大的不同在於使用者的注意力不可被影響,否則可能會造成生命財產的損失。此篇論文中,我們展現了一種新的網路安全威脅,此安全威脅的原理為,利用偽造的交通安全訊息來誤導駕駛人,進而控制駕駛行為。惡意攻擊者可利用此安全弱點來造成交通事故,或減低車輛隨意網路的網路效能。我們提出了以交通事件為基礎的名譽系統,來防治此種攻擊。在此系統下,車輛彼此合作蒐集交通事件的證據,只有在證據足夠時,系統才會認為此交通事件是真正存在的。我們使用網路模擬來分析與評估所提出的名譽系統,結果顯示我們所提出的系統可在絕大部分的車輛隨意網路環境下運作,且可以有效解決各種偽造訊息所造成的影響。


    Vehicular ad hoc networks (VANET) have drawn a lot of attention in resent years in terms of novel applications to reduce car accidents, provide emergency information, and create more comfortable driving experience on roadways. The main difference between vehicular ad hoc networks and other traditional wireless networks is the driver’s attention can not be distracted because driving safety in a matter of life and death. In this thesis, we show a new security threat that fraud messages could disturb the drivers’ attention. The attacker can use this weakness to control the drivers’ behavior that could cause traffic accidents, traffic jam or decreasing the VANET performance in terms of bandwidth utilization. To defend against this kind of attack, we proposed a event-based reputation system. In this system, vehicles collect the evidence of the traffic event cooperatively. The traffic event is trustworthy only if the reputation system collects enough reputation value and signatures about this event. The proposed solution is characterized and evaluated through extensive simulation. The result of simulation shows that our system is suitable in most VANET environments and can defend against all kinds of bogus messages.

    Contents 中文摘要 I Abstract II 誌 謝 III Contents IV List of Figures VI List of Tables VII Chapter 1. Introduction 1 Chapter 2. Security of traffic safety application 5 Chapter 3. Environment models and problem statement 10 3.1 Network model 10 3.2 Security model 11 3.3 Problem statement 11 Chapter 4. Event-based reputation system on VANET 13 4.1 Traffic event generation 15 4.2 Collaboration observation mechanism 17 4.3 Message verification 19 4.4 Reputation value suppression 20 4.5 Adaptive reputation threshold and event signature threshold 21 4.5.1 Reputation threshold 22 4.5.2 Event signature threshold 24 Chapter 5. Traffic event management on VANET 27 5.1 Event intensity 27 5.2 Event movement and erasion 29 5.3 Event information update 30 Chapter 6. Simulation 31 6.1 Performance analysis 32 6.2 Security analysis 42 Chapter 7. Discussion 46 7.1 Comparisons to similar work 46 7.2 Limitations 48 Chapter 8. Related work 50 Chapter 9. Conclusions 54 Reference 55

    Reference
    [1] W. H. Organization, "World report on road traffic injury prevention," 2004.
    [2] L. J. Blincoe, "The Economic Impact of Motor Vehicle Crashes,2000," US Dept. of Transportation, National Highway Traffic Safety Administration, 2002.
    [3] W. D. Jones, "Building SaferCars," IEEE Specturm, vol. 39, pp. 82-85, 2002.
    [4] J. J. Blum, A. Eskandarian, and L. J. Hoffman, "Challenges of intervehicle ad hoc networks," IEEE Transactions on Intelligent Transportation System, vol. 5, pp. 347-351, 2004.
    [5] J. Luo and J.-P. Hubaux, "A Survey of Inter-Vehicle Communication," EPFL Technical Report IC, 2004.
    [6] T. Nadeem, S. Dashtinezhad, C. Liao, and L. Iftode, "TrafficView: traffic data dissemination using car-to-car communication," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 8, pp. 6-19, 2004.
    [7] P. Shankar, M. T. Alam, S. Musharoff, N. Ravi, C. V. Prados, V. Gradinescu, R. Diaconescu, C. Gorgorin, and L. Iftode, "Outdoor Experience with the TrafficView Application," 2005.
    [8] Q. Xu, T. Mak, J. Ko, and R. Sengupta, "Vehicle-to-vehicle safety messaging in DSRC," Proceedings of the first ACM workshop on Vehicular ad hoc networks, pp. 19-28, 2004.
    [9] Y. Jijun, E. Tamer, Y. Gavin, R. Bo, H. Stephen, K. Hariharan, and T. Timothy, "Performance evaluation of safety applications over DSRC vehicular ad hoc networks," Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, 2004.
    [10] W. Chen and S. Cai, "Ad hoc peer-to-peer network architecture for vehicle safety communications," IEEE Communications Magazine, vol. 43, pp. 100-107, 2005.
    [11] F. Dötzer, M. Strassberger, and T. Kosch, "Classification for traffic related inter-vehicle messaging," Proceedings of the 5th IEEE International Conference on ITS Telecommunications, 2005.
    [12] H. Yang, F. Ricciato, S. Lu, and L. Zhang, "Securing a wireless world," Proceedings of the IEEE, vol. 94, pp. 442-454, 2006.
    [13] D. Djenouri, L. Khelladi, and A. N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Communications Surveys & Tutorials, vol. 7, pp. 2-28, 2005.
    [14] A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller, "Attacks on Inter-Vehicle Communication Systems - An Analysis," Proceedings of the 3rd International Workshop on Intelligent Transportation (WIT 2006), 2006.
    [15] S. Eichler, F. Dotzer, C. Schwingenschlogl, F. J. F. Caro, and J. Eberspaher, "Secure routing in a vehicular ad hoc network," 2004.
    [16] R. Maxim and H. Jean-Pierre, "The security of vehicular ad hoc networks," Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005.
    [17] K. Plobl, T. Nowey, and C. Mletzko, "Towards a Security Architecture for Vehicular Ad Hoc Networks," Proceedings of the First International Conference on Availability,Reliability and Security (ARES' 06), 2006.
    [18] D. Jungels, M. Raya, I. Aad, and J. P. Hubaux, "Certificate Revocation in Vehicular Ad Hoc Networks," EPFL Technical Report, 2006.
    [19] E. Fonseca and A. Festag, "A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS," NOW Technical Report, 2006.
    [20] J. Blum and E. Azim, "The threat of intelligent collisions," IT Professional, vol. 6, pp. 24-29, 2004.
    [21] B. Parno and A. Perrig, "Challenges in securing vehicular networks," Workshop on Hot Topics in Networks (HotNets-IV), 2005.
    [22] C. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad hoc ondemand distance vector (AODV) routing," IETF RFC3561experimental Standard, July, 2003.
    [23] D. B. Jonhson, D. A. Maltz, Y. C. Hu, and J. G. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks," IETF MANET WG lnternet draft, 2000.
    [24] Y. B. Ko and N. H. Vaidya, "Location-Aided Routing (LAR) in mobile ad hoc networks," Wireless Networks, vol. 6, pp. 307-321, 2000.
    [25] F. Picconi, N. Ravi, M. Gruteser, and L. Iftode, "Probabilistic validation of aggregated data in vehicular ad-hoc networks," Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 76-85, 2006.
    [26] G. F. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey: Research Articles," Wireless Communications & Mobile Computing, vol. 6, pp. 319-332, 2006.
    [27] Nai-Wei Lo and H.-C. Tsai, "Illusion Attack on VANET Applications – A Message Plausibility Problem," Dept. of Information Management, NTUST, Technical Report, 2007.
    [28] K. Fall and K. Varadhan, "The ns Manual (formerly ns Notes and Documentation)," The VINT Project, vol. 1, 2002.
    [29] A. Mahajan, N. Potnis, K. Gopalan, and A. I. A. Wang, "Evaluation of Mobility Models For Vehicular Ad-Hoc Network Simulations," IEEE International Workshop on Next Generation Wireless Networks (WoNGeN '06) 2006.
    [30] G. Philippe, G. Dan, and S. Jessica, "Detecting and correcting malicious data in VANETs," Proceedings of the 1st international workshop on Vehicular ad hoc networks, Philadelphia, USA, 2004.
    [31] M. Raya and J. P. Hubaux, "Efficient secure aggregation in VANETs," Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 67-75, 2006.
    [32] U. S. C. Bureau, "TIGER, TIGER/Line and TIGER-Related Products," Available at http://www.census.gov/geo/www/tiger/.
    [33] S. Amit Kumar and B. J. David, "Modeling mobility for vehicular ad-hoc networks," Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, Philadelphia, USA, 2004.
    [34] B. Schneier, "Attack Trees," Dr. Dobb's Journal, vol. 24, pp. 21-29, 1999.

    QR CODE