Basic Search / Detailed Display

Author: 徐宗壕
Tsung-Hao Hsu
Thesis Title: 在混合式車輛隨意網路下 以合作模式為基礎之惡意行為偵測系統
Collaborate based Misbehavior Detection System in Hybrid Vehicular Ad Hoc Networks
Advisor: 羅乃維
Nai-Wei Lo
Committee: 賴源正
Yuan-Cheng Lai
Hung-Yu Chien
Degree: 碩士
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2009
Graduation Academic Year: 97
Language: 英文
Pages: 46
Keywords (in Chinese): 車輛隨意網路混合式車輛隨意網路路旁設備異常行為偵測系統
Keywords (in other languages): VANET, hybrid VANET, RSU, misbehavior detection system
Reference times: Clicks: 258Downloads: 3
School Collection Retrieve National Library Collection Retrieve Error Report

在近幾年來許多學者專注於車輛隨意網路(Vehicular Ad Hoc Networks),它能可提供駕駛所關心的交通資訊。其中一種型態的車輛隨意網路為混合式車輛隨意網路(hybrid Vehicular Ad Hoc Networks),此網路由車輛與固定的路旁設備(Road-Side Unit)所組成。車輛與路旁設備透過彼此的分享交通資訊,建立智慧型交通安全系統以增加道路安全或減少雍塞。由此可知,此交通資訊是必需受到安全系統的保護,否則被惡意車輛丟棄,導致駕駛忽略此資訊,可能會造成嚴重的交通意外,進而危害生命。雖然目前已存在許多異常行為偵測系統來面對此議題,然而,攻擊方式也會隨之變的更加複雜,惡意車輛想躲避異常行為偵測系統的偵測並能夠阻擋資訊的傳遞,導致做隨機丟棄訊息的攻擊。基於此理由,我們提出了一個新的異常行為偵測系統名為MEDIA來減輕此威脅造成的影響。本系統利用路旁設備與車輛的共同合作,找出與隔離惡意車輛。依模擬結果顯示,即使此環境存在高達百分之四十的惡意車輛,本系統還是能夠有效地提升網路效能與隔離惡意車輛。

In recent year, many academic researchers are focus in vehicular ad hoc networks (VANET). It can offer traffic information to drivers that care about. One kind of VANET is hybrid VANET. It consists of mobile vehicle and static road-side unit (RSU). They share traffic information with each other to build smart traffic safety system to increase road safety or less congestion. This traffic information must be protected by misbehavior detection system, otherwise it is discarded by malicious vehicles to lead drivers pass over this information and make serious traffic accidents to endanger life safety possibly. Although there are existed many misbehavior detection systems to face this issue, however, attack will also becomes complicated. Malicious vehicles want to escape the detection of misbehavior detection system and disrupt message propagation. It leads to do message random-dropping attack. For this reason, we propose a novel misbehavior detection system called MEDIA to mitigate influence of this threat. This system uses road-side unit (RSU) and vehicle to discover and isolate malicious vehicles collaboratively. The results of simulation show the MEDIA can enhance network performance and isolate malicious vehicles effectively even though up to 40% of malicious vehicle exists in the environment.

中文摘要 I Abstract II 誌 謝 III Contents IV List of Figures V List of Tables VI Chapter 1. Introduction 1 Chapter 2. Related work 6 Chapter 3. Misbehavior detection system 10 3.1 Attack model 13 3.2 System architecture 15 3.3 System operation flow 17 3.3.1 Monitoring module 17 3.3.2 Evaluation module 19 3.3.3 Decision module 24 3.3.4 Action module 26 Chapter 4. Simulation 28 4.1 Packet delivery ratio 32 4.2 Control overhead 35 Chapter 5. Discussion 39 Chapter 6. Conclusion 41 Reference 43

[1] E. Fonseca, and A. Festag, “A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS”, NEC Technical Report, 2006.
[2] M. Raya, and J. Hubaux, “Securing vehicular ad hoc networks”, Journal of Computer Security, Vol. 15, pp. 39-68, 2007.
[3] Advanced Safety Vehicle Program,
[4] Communications for eSafety,
[5] Vehicle Safety Communications Project,
[6] Vehicle Infrastructure Initiative, http:/
[7] Car-to-Car Communications,
[8] Security of Vehicular Networks@EPFL,
[9] Z. Wang, and C. Chigan, “Cooperation Enhancement for Message Transmission in VANETs”, Wireless Personal communications, Vol. 43, pp. 141-156, 2007.
[10] M. Raya, P. Papadimitrators, I. Aad, D. Jungels, and J.P. Hubaux, “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks”, IEEE Journal on selected areas in communications, Vol. 25, No.8, pp. 1557-1568, 2007.
[11] A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, “A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks”, Internetal Conference on Mobile and Ubiquitous Systems, pp. 1-8, 2006.
[12] C. Zhang, X. Lin, R. Lu, and PH. Ho, “RAISE: An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks”, ICC’08 IEEE International Conference, pp. 1454-1457, 2008.
[13] M. Raya, A. Aziz, and JP. Hubaux, “Efficient Secure Aggregation in VANETs”, Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 67-75, 2006.
[14] X. Hong, D. Huang, M. Gerla, and Z. Cao, “SAT: Situation-Aware Trust Architecture for Vehicular Networks”, Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture, pp. 31-36, 2008.
[15] F. Kong, and J. Tan, “A Collaboration-based Hybrid Vehicular Sensor Network Architecture”, Information and Automation , pp. 584-589, 2008.
[16] J-L Wang and S-P Huang, “Fuzzy Logic Based Reputation System for Mobile Ad Hoc Networks”, Lecture Notes in Computer Science, Vol. 4693, pp. 1315-1322, 2007.
[17] T. Anantvalee and J. Wu, “Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks”, IEEE International Conference on Communications (ICC’07), pp. 3383-3388, 2007.
[18] N. Nasser, and Y. Chen, “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad hoc Networks”, ICC '07 IEEE International Conference of Communications, pp. 1154-1159, 2007.
[19] W. Yu, Y. Sun, and K.Liu, “HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks”, Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, Vol. 2, pp. 1252-1261, 2005.
[20] L. Tamilselvan, and V. Sankaranarayanan, “Prevention of Co-operative Black Hole Attack in MANET”, JOURNAL OF NETWORKS, Vol. 3, No. 5, pp. 13-20, 2008.
[21] A. Boukerche, and Y. Ren, “A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks”, Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp. 88-95, 2008.
[22] Y. Ren, and A. Boukerche, “Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks”, Proceddings of IEEE International Conference on Communications, pp. 2129-2133, 2008.
[23] F. Dotzer, L. Fischer, and P. Magiera, “VARS: A Vehicle Ad-hoc network Reputation System”, In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMOM’05), pp. 454-456, 2005.
[24] D. B. Johnson, D. A. Maltz, Y. C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,” IETF MANET WG Internet draft, 2000.
[25] L. Tamilselvan, and V. Sankaranarayanan, “Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks”, International Journal of Computer Science and Network Security, Vol. 7, No. 3, pp. 118-123, 2007.
[26] J. Sun, C. Zhang, and Y. Fang, “AN ID-BASED FRAMEWORK ACHIEVING PRIVACY AND NON-REPUDIATION IN VEHICULAR AD HOC NETWORKS”, IEEE Military Communications Conference, pp. 1-7, 2007.
[27] Y. Sun, Z. Han and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks", IEEE Communications Magazine, Vol. 46, No. 2, pp. 112, 2008.
[28] G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks", IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 318-328, 2006.
[29] K. Fall and K. Varadhan, “The ns Manual (formerly ns Notes and Documentation),” The VINT Project, Vol. 1, 2002.
[30] C. Perkins, E. Belding-Royer, and S. Das, “RFC2561: Ad hoc On-Demand Distance Vector (AODV) Routing”, Internet RFC3561 experimental Standard, July, 2003.
[31] Nai-Wei Lo and H.-C Tsai, “Illusion Attack on VANET Applications – A Message Plausibility Problem,” Dept. of Information Management, NTUST, Technical Report, 2007.