ABSTRACT
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security.In order to lessen this problem, we propose a detection mechanism that is capable of recognizing nodes cheating about their position in beacons (periodic position dissemination in most single-path geographic routing protocols, e.g. GPSR). Unlike other proposals described in the literature, our detection does not rely on additional hardware or special nodes, which contradicts the ad hoc approach. Instead, this mechanism uses a number of different independent sensors to quickly give an estimation of the trustworthiness of other nodes' position claims without using dedicated infrastructure or specialized hardware.The simulative evaluation proves that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.
- Blazevic, L., Giordano, S., and Boudec, J. L. Self organized terminode routing. Technical Report DSC/2000/040, Swiss Federal Institute of Technology, 2000.Google Scholar
- C2C-CC. Car2Car Communication Consortium. http://www.car-to-car.org/.Google Scholar
- CarTalk 2000. CarTalk 2000. http://www.cartalk2000.net, 2004.Google Scholar
- Couto, D. S. J. D., and Morris, R. Location proxies and intermediate node forwarding for practical geographic forwarding. Tech. Rep. MIT-LCS-TR-824, MIT Laboratory for Computer Science, June 2001.Google Scholar
- Franz, W., Wagner, C., Maihöfer, C., and Hartenstein, H. FleetNet: Platform for Inter-Vehicle Communications. In Procedings of 1st International Workshop on Intelligent Transportatin (WIT'04) (Hamburg, Germany, Mar. 2004).Google Scholar
- Giordano, S., Stojmenovic, I., and Blazevie, L. Position based routing algorithms for ad hoc networks: a taxonomy. IEEE Communications Magazine 40, 7 (July 2001), 128--134. Google ScholarDigital Library
- Hou, T.-C., and Li, V. Transmission Range Control in Multihop Packet Radio Networks. IEEE Transactions on Communications 34, 1 (Jan. 1986), 38--44.Google Scholar
- Hu, Y.-C., Perrig, A., and Johnson, D. B. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the ACM Workshop on Wireless security (WISE) (San Diego, CA, USA, 2003), pp. 30--40. Google ScholarDigital Library
- Hubaux, J.-P., Čapkun, S., and Luo, J. The Security and Privacy of Smart Vehicles. IEEE Security and Privacy 4, 3 (2004), 49--55. Google ScholarDigital Library
- Kargl, F., Klenk, A., Schlott, S., and Weber, M. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004) (Sept. 2004), Springer Verlag, pp. 152--165. Google ScholarDigital Library
- Karp, B., and Kung, H. Greedy Perimeter Stateless Routing for Wireless Networks. In Proceedings of the Sixth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000) (Boston, USA, Aug. 2000), pp. 243--254. Google ScholarDigital Library
- Ko, Y., and Vaidya, N. Location-aided routing (LAR) in mobile ad hoc networks. In Proceedings of the Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 1998) (1998), pp. 66--75. Google ScholarDigital Library
- Leinmüller, T., and Schoch, E. Greedy routing in highway scenarios: The impact of position faking nodes. In Proceedings of Workshop On Intelligent Transportation (WIT 2006) (Mar. 2006).Google Scholar
- Leinmüller, T., Schoch, E., Kargl, F., and Maihöfer, C. Influence of Falsified Position Data on Geographic Ad-Hoc Routing. In Proceedings of the second European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2005) (July 2005). Google ScholarDigital Library
- Maihöfer, C., Eberhardt, R., and Schoch, E. CGGC: Cached Greedy Geocast. In Proceedings of 2nd Intl. Conference Wired/Wireless Internet Communications (WWIC 2004) (Frankfurt (Oder), Germany, Feb. 2004), vol. 2957 of Lecture Notes in Computer Science, Springer Verlag.Google ScholarCross Ref
- Marti, S., Giuli, T. J., Lai, K., and Baker, M. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (2000), pp. 255--265. Google ScholarDigital Library
- Mauve, M., Widmer, J., and Hartenstein, H. A Survey on Position-Based Routing in Mobile Ad-Hoc Networks. IEEE Network 1, 6 (Dec. 2001), 30--39. Google ScholarDigital Library
- Michiardi, P., and Molva, R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security (Deventer, The Netherlands, The Netherlands, 2002), Kluwer, B.V., pp. 107--121. Google ScholarDigital Library
- Newsome, J., Shi, R., Song, D., and Perrig, A. The Sybil Attack in Sensor Networks: Analysis and Defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004) (Apr. 2004). Google ScholarDigital Library
- Saha, A. K., and Johnson, D. B. Modeling mobility for vehicular ad-hoc networks. In Proceedings of the first ACM workshop on Vehicular ad hoc networks (VANET '04) (2004), ACM Press, pp. 91--92. Google ScholarDigital Library
- Sastry, N., Shankar, U., and Wagner, D. Secure verification of location claims. In Proceedings of the 2003 ACM workshop on Wireless security (WiSe'03) (2003), ACM Press, pp. 1--10. Google ScholarDigital Library
- Takagi, H., and Kleinrock, L. Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Transactions on Communications 32, 3 (Mar. 1984), 246--257.Google ScholarCross Ref
- Čapkun, S., Buttyán, L., and Hubaux, J.-P. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 2003) (2003), ACM Press, pp. 21--32. Google ScholarDigital Library
- Vora, A., and Nesterenko, M. Secure location verification using radio broadcast. In Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS 2004) (2004), Springer Verlag. Google ScholarDigital Library
- VSCC. US Vehicle Safety Communication Consortium. http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm.Google Scholar
Index Terms
- Improved security in geographic ad hoc routing through autonomous position verification
Recommendations
Dynamic route maintenance for geographic forwarding in mobile ad hoc networks
Traditional route maintenance requires mobile nodes periodically exchange beacon messages with their neighbors in geographic forwarding algorithms. The interval at which these nodes broadcast their beacon messages is typically fixed. However, ...
On the scalability of rendezvous-based location services for geographic wireless ad hoc routing
Geographic routing protocols allow stateless routing by taking advantage of the location information of mobile nodes and thus are highly scalable. A central challenge in geographic routing protocols is the design of scalable distributed location services ...
A Beacon-Less Geographic Multipath Routing Protocol for Ad Hoc Networks
Multipath routing has been considered as one of the most efficient and reliable routing solutions for ad hoc networks. Compared with the link-disjoint paths, the node-disjoint paths are less likely to fail and provide better performance for load ...
Comments