Abstract
Vehicle to Vehicle (V2V) and Vehicle to Infrastruc- ture (V2I) communication aims to increase safety, efficiency, and comfort of drivers. Vehicles periodically broadcast their current status, such as position, velocity, and other information. Received information is stored in a local knowledge base, often called world model, and used for application decisions. Because of the potential impact, V2V communication is an interesting target for malicious attackers. Message integrity protection using cryptographic signatures only protects against outsider attackers. In addition to signatures, misbehavior detection mechanisms comparable to intrusion detection systems (IDS) are needed to detect insider attackers. Given the complexity and large number of foreseen V2V and V2I applications, misbehavior detection cannot be a one-size-fits-all solution. In this paper, we present a flexible framework that can combine a range of different misbehavior detection mechanisms by modeling their outputs using subjective logic. We demonstrate the feasibility of our framework by using a combination of existing detection mechanisms to increase their misbehavior detection results.
Original language | English |
---|---|
Title of host publication | IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014 |
Publisher | IEEE |
Pages | 513-516 |
Number of pages | 6 |
ISBN (Print) | 978-1-4799-4785-0 |
DOIs | |
Publication status | Published - Jun 2014 |
Event | IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014 - Sydney, Australia Duration: 16 Jun 2014 → 19 Jun 2014 Conference number: 15 |
Conference
Conference | IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014 |
---|---|
Abbreviated title | WoWMoM 2014 |
Country/Territory | Australia |
City | Sydney |
Period | 16/06/14 → 19/06/14 |
Keywords
- SCS-Cybersecurity
- vehicle to vehicle communication
- vehicular ad hoc networks
- logic based framework
- message integrity protection
- cryptographic signatures
- world model
- V2V networks
- Uncertainty
- Vehicles
- Cryptography
- Misbehavior Detection
- Detectors
- Roads
- vehicle to infrastructure communication