A Trust System for Detecting Selective Forwarding Attacks in VANETs

Vehicular ad-hoc Networks (VANETs) have inherent high mobility and take data forwarding as a basic mechanism to share information among vehicles. Selective forwarding attack, in which malicious nodes deliberately drop data packets, destroys the integrity

  • PDF / 842,659 Bytes
  • 10 Pages / 439.37 x 666.142 pts Page_size
  • 49 Downloads / 203 Views

DOWNLOAD

REPORT


Abstract. Vehicular ad-hoc Networks (VANETs) have inherent high mobility and take data forwarding as a basic mechanism to share information among vehicles. Selective forwarding attack, in which malicious nodes deliberately drop data packets, destroys the integrity of data and hurts the validity of real VANETs applications. Because malicious nodes usually masquerade themselves as normal nodes and collude with each other whenever possible, it is hard to obtain clear and direct evidence of selective forwarding attacks. In this paper, we address the issue of detecting selective forwarding attacks by building a trust system. The proposed approach to maintain this system mainly includes (1) local and global detection of attacks based on mutual monitoring among all nodes, and (2) detection of abnormal driving patterns of malicious nodes. Since both in-band and out-band information is utilized, our approach is effective in relatively low-density road conditions and resilient to various scenarios, such as different rate of malicious occurrence or different road’s range. The extensive simulations demonstrate that our approach achieves a high fault tolerance by choosing most reliable nodes for information delivery, while at the same time identify malicious nodes with relatively high accuracy. Keywords: VANETs pattern



Selective forwarding attack



Detection



Driving

1 Introduction With rapid progress in wireless communication and mobile network, Vehicular Ad-hoc Network (VANET) has become an important and basic part in modern intelligent transportation systems. In VANETs, important information, e.g. accidents, can be disseminated to all vehicular nodes through the ad-hoc networks [1], so as to ensure driving safety, to improve transportation efficiency, or to provide data communication services [2, 3]. Efficient data delivery is clearly a key technique for service provisioning in VANETs applications. Due to the mobile ad-hoc nature of VANETs, the vehicular nodes usually rely on multi-hop forwarding [4] to transmit data. Note that the vehicular nodes usually move at a flexible context. The data forwarding among them is thus vulnerable to various network attacks.

© Springer International Publishing Switzerland 2016 Y. Wang et al. (Eds.): BigCom 2016, LNCS 9784, pp. 377–386, 2016. DOI: 10.1007/978-3-319-42553-5_32

378

S. Wang and Y. He

A typical attack is selective forwarding [6]. By masquerading itself as a normal node, a malicious node is able to hijack the forwarded data and then randomly or selectively drops the data packets. Therefore the downstream nodes of that malicious node cannot receive integrated data, probably causing not only unpredictable but serious consequences. Because malicious nodes usually masquerade themselves as normal nodes and collude with each other whenever possible, it is hard to obtain clear and direct evidence of selective forwarding attacks. At the same time, the forwarded data traffic is highly dynamic and hard to control under network-wide inconsistence. As a result, general techniques