Advertisement

Securing VANETs for Vehicular CPS

  • Danda B. RawatEmail author
  • Chandra Bajracharya
Chapter

Abstract

This chapter presents trust-based security in vehicular CPS using probabilistic and deterministic approaches, which are based on the local information obtained through interactions among vehicles to determine legitimacy of the messages and to decide whether the messages would be considered for further transmission over the network or be dropped.

Keywords

Receive Signal Strength Road Segment Deterministic Approach Trust Level Vehicular Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    P. Bahl, V. Padmanabhan, RADAR: an in-building RF-based user location and tracking system, in IEEE INFOCOM, vol. 2 (2000), pp. 775–784Google Scholar
  2. 2.
    A.R. Beresford, F. Stajano, Mix Zones: user privacy in location-aware services, in PERCOMW 2004, Washington, DC, USA (2004), p. 127Google Scholar
  3. 3.
    California Partners for Advanced Transit and Highways (PATH) (2010). http://www.path.berkeley.edu/
  4. 4.
    Car to Car Communication Consortium (C2CCC) (2010). http://www.car-to-car.org/
  5. 5.
  6. 6.
    F. Dotzer, Privacy issues in vehicular ad hoc networks, in Privacy Enhancing Technologies (2005), pp. 197–209Google Scholar
  7. 7.
    H. Hartenstein, K. Laberteaux (eds.), VANET: Vehicular Applications and Inter-Networking Technologies (Wiley, New York, 2010)Google Scholar
  8. 8.
    T. He, C. Huang, B. Blum, J. Stankovic, T. Abdelzaher, Range-free localization schemes for large scale sensor networks, in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (2003), pp. 81–95Google Scholar
  9. 9.
    U. Minhas, Intelligent agents in mobile vehicular ad hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, in Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI IAT) (2010), pp. 243 – 247Google Scholar
  10. 10.
    U. Minhas, J. Zhang, T. Tran, R. Cohen, Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Pract. (IJCITP) 5, 3–15 (2010)Google Scholar
  11. 11.
    National Highway Traffic Safety Administration 2012 Report. http://www.nhtsa.gov/staticfiles/administration/pdf/Budgets/FY2012_Budget_Overviewv3.pdf
  12. 12.
    Network on Wheels (NoW) (2010). http://www.network-onwheels.de/
  13. 13.
    S. Olariu, M.C. Weigle (eds.), Vehicular Networks: From Theory to Practice (CRC Press/Taylor & Francis, Boca Raton, 2009)Google Scholar
  14. 14.
    B. Ostermaier, F. Dotzer, M. Strassberger, Enhancing the security of local danger warnings in VANETs-a simulative analysis of voting schemes, in The Second International Conference on Availability, Reliability and Security, 2007. ARES 2007 (2007), pp. 422–431Google Scholar
  15. 15.
    PREVENT project (2010). http://www.prevent-ip.org
  16. 16.
    T. Rappaport, Wireless Communications: Principles and Practice (Prentice Hall PTR, New Jersey, 2002)Google Scholar
  17. 17.
    D.B. Rawat, G. Yan, in Infrastructures in Vehicular Communications: Status, Challenges and Perspectives, ed. by M. Watfa, (eds.) (IGI Global, 2010)Google Scholar
  18. 18.
    D.B. Rawat, B.B. Bista, G. Yan, M.C. Weigle, Securing vehicular ad-hoc networks against malicious drivers: a probabilistic approach, in Proceedings of the 5th International Conference on Complex, Intelligent, and Software Intensive Systems, June 2011Google Scholar
  19. 19.
    D.B. Rawat, D.C.Popescu, G. Yan, S. Olariu, Enhancing VANET performance by joint adaptation of transmission power and contention window size. IEEE Trans. Parallel Distrib. Syst. 22(9), 1528–1535 (2011)Google Scholar
  20. 20.
    D.B. Rawat, G. Yan, B.B. Bista, M.C. Weigle, Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc Sens. Wirel. Network. 24(3-4), 283–305 (2015)Google Scholar
  21. 21.
    M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks, in SASN ’05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (ACM, New York, 2005), pp. 11–21Google Scholar
  22. 22.
    M. Raya, P. Papadimitratos, I. Aad, D. Jungels, Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007)Google Scholar
  23. 23.
    M. Raya, P. Papadimitratos, V. D. Gligor, J.-P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in The 27th Conference on Computer Communications, INFOCOM 2008. IEEE (2008), pp. 1238–1246Google Scholar
  24. 24.
    D. Rick, Deriving the haversine formula, in The Math Forum, April 1999Google Scholar
  25. 25.
    P. Rong, M. Sichitiu, Angle of arrival localization for wireless sensor networks, in 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006. SECON’06, vol. 1 (2007), pp. 374–382Google Scholar
  26. 26.
    R. Sengupta, Q. Xu, DSRC for safety systems. Calif. PATH – Partners Adv. Transit Highw. 10(4), 2–5 (2004)Google Scholar
  27. 27.
    J. Serna, J. Luna, M. Medina, Geolocation-based trust for vanet’s privacy, in 4th International Conference on Information Assurance and Security, ISIAS’08 (2008), pp. 287–290Google Scholar
  28. 28.
    G. Shafer, A Mathematical Theory of Evidence, vol. 1 (Princeton University Press, Princeton, 1976)Google Scholar
  29. 29.
    A. Tajeddine, A. Kayssi, A. Chehab, A privacy-preserving trust model for VANETs, in Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT) (2010), pp. 832–837Google Scholar
  30. 30.
    Vehicle Safety Communications Project Task 3 Final Report: Identify Intelligent Vehicle Safety Applications Enabled by DSRC. Vehicle Safety Communications Consortium consisting of BMW, Daimler-Chrysler, Ford, GM, Nissian, Toyota, and VWGoogle Scholar
  31. 31.
    P. Wex, J. Breuer, A. Held, T. Leinmuller, L. Delgrossi, Trust issues for vehicular ad hoc networks, in Proceedings of the IEEE Vehicular Technology Conference (VTC Spring 2008) (2008),pp. 2800–2804Google Scholar
  32. 32.
    Q. Xu, T. Mak, J. Ko, R. Sengupta, Vehicle-to-vehicle safety messaging in dsrc, in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (2004), pp. 19–28Google Scholar
  33. 33.
    J. Zhang, A survey on trust management for VANETs, in Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA) (2011), pp. 105–112Google Scholar
  34. 34.
    S. Zhang, H. Wang, An improved delta and over-issued certificate revocation mechanism, in Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management (2008), pp. 346–350Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  1. 1.Howard UniversityWashingtonUSA
  2. 2.Georgia Southern UniversityStatesboroUSA

Personalised recommendations