MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles

被引:103
作者
Ahmad, Farhan [1 ]
Kurugollu, Fatih [1 ]
Adnane, Asma [2 ]
Hussain, Rasheed [3 ]
Hussain, Fatima [4 ]
机构
[1] Univ Derby, Coll Engn & Technol, Cyber Secur Res Grp, Derby DE22 3AW, England
[2] Loughborough Univ, Dept Comp Sci, Networks & Syst Res, Loughborough LE11 3TU, Leics, England
[3] Innopolis Univ, Inst Informat Secur & Cyber Phys Syst, Networks & Blockchain Lab, Innopolis 420500, Russia
[4] Royal Bank Canada, API Delivery & Operat, Toronto, ON M5J 0B8, Canada
关键词
Connected vehicles; man-in-the-middle (MiTM) attack; smart cities; trust management; trust model; vehicular ad hoc network (VANET); MANAGEMENT; SECURITY; PRIVACY; CHALLENGES; NETWORKS; VANETS; SCHEME; SYSTEM; NODES;
D O I
10.1109/JIOT.2020.2967568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc network (VANET), a novel technology, holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as man-in-the-middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate, and trusted content within the network. In this article, we propose a novel trust model, namely, MiTM attack resistance trust model in connected vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multidimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data are then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the benchmarked trust model. The simulation results show that for a network containing 35% of MiTM attackers, MARINE outperforms the state-of-the-art trust model by 15%, 18%, and 17% improvements in precision, recall, and F-score, respectively.
引用
收藏
页码:3310 / 3322
页数:13
相关论文
共 44 条
[1]  
Ahmad F., 2019, GLOB ADV CONNECTED I, P135
[2]  
Ahmad F., 2019, IFIP WIREL DAY, P1
[3]   TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks [J].
Ahmad, Farhan ;
Franqueira, Virginia N. L. ;
Adnane, Asma .
IEEE ACCESS, 2018, 6 :28643-28660
[4]   Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-hoc Network [J].
Ahmad, Farhan ;
Hall, Jordan ;
Adnane, Asma ;
Franqueira, Virginia N. L. .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :44-52
[5]  
Ahmed SI., 2016, P 2016 IEEE WIR COMM, P1
[6]  
Alishev D, 2017, IEEE VTS VEH TECHNOL
[7]  
[Anonymous], WIRELESS NETWORKS SE
[8]   TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks [J].
Azad, Muhammad Ajmal ;
Bag, Samiran ;
Parkinson, Simon ;
Hao, Feng .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :5878-5891
[9]   A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks [J].
Boualouache, Abdelwahab ;
Senouci, Sidi-Mohammed ;
Moussaoui, Samira .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :770-790
[10]   Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing [J].
Chen, Ing-Ray ;
Bao, Fenye ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (05) :1200-1210