Eviction of misbehaving, and faulty nodes in vehicular networks

被引:235
作者
Raya, Maxim [1 ]
Papadimitratos, Panagiotis [1 ]
Aad, Imad [1 ]
Jungels, Daniel [1 ]
Hubaux, Jean-Pierre [1 ]
机构
[1] HITEC Luxembourg SA, Luxembourg, Luxembourg
关键词
vehicular networks; misbehavior detection; certificate revocation;
D O I
10.1109/JSAC.2007.071006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an omnipresent infrastructure in VNs may unacceptably delay the retrieval of the most recent and relevant revocation information; this will especially be the case in the early deployment stages of such a highly volatile and large-scale system. In this paper, we address this specific problem. We propose protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system. We tailor our design to the VN characteristics and analyze our system. Our results show that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.
引用
收藏
页码:1557 / 1568
页数:12
相关论文
共 37 条
[1]   Cryptographic processors - A surrey [J].
Anderson, R ;
Bond, M ;
Clulow, J ;
Skorobogatov, S .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :357-369
[2]  
[Anonymous], 3280 RFC
[3]  
[Anonymous], 1987, ROBUST REGRESSION OU
[4]  
[Anonymous], 2006, DEVELOPMENT
[5]   The complexity of approximating the entropy [J].
Batu, T ;
Dasgupta, S ;
Kumar, R ;
Rubinfeld, R .
SIAM JOURNAL ON COMPUTING, 2005, 35 (01) :132-150
[6]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[7]  
Blum J., 2004, IT Professional, V6, P24, DOI 10.1109/MITP.2004.1265539
[8]  
BUCHEGGER S, 2000, P P2PECON 04
[9]  
Calandriello G, 2007, P VANET 07
[10]   Denial-of-service attack-detection techniques [J].
Carl, G ;
Kesidis, G ;
Brooks, RR ;
Rai, S .
IEEE INTERNET COMPUTING, 2006, 10 (01) :82-89