Abstract
Vehicular Ad-hoc Networks (VANETs) aim to increase, among others, traffic safety and efficiency by warning and informing the driver about road events and hazards. Due to their direct impact on drivers' safety, external and internal attacks have to be prevented. While authentication prevents most of the external attacks, internal attackers are still able to misuse the system and inject fake - but authenticated - messages. Therefore, misbehavior detection and prevention mechanisms are required to mitigate such attacks. In this paper we provide a categorization of internal attackers to identify most relevant attack variants. Instead of using simulations, as done by most related works, we use an implementation on real vehicles to demonstrate the feasibility of location-based attacks. Especially, we demonstrate that a malware application installed on a vehicle can provoke false warnings on benign vehicles that are within the attacker's communication range. This exemplary attack is possible due to insufficiently specified VANET security standards. By using our proposed countermeasures, we show that this internal attack is detected and blocked, preventing false driver warnings.
Original language | Undefined |
---|---|
Title of host publication | Fifth IEEE Vehicular Networking Conference, VNC 2013 |
Place of Publication | USA |
Publisher | IEEE |
Pages | 198-201 |
Number of pages | 4 |
ISBN (Print) | 978-1-4799-2687-9 |
DOIs | |
Publication status | Published - Dec 2013 |
Event | IEEE Vehicular Networking Conference, VNC 2013 - Boston, United States Duration: 16 Dec 2013 → 18 Dec 2013 http://www.ieee-vnc.org/2013/ |
Publication series
Name | |
---|---|
Publisher | IEEE Communications Society |
Conference
Conference | IEEE Vehicular Networking Conference, VNC 2013 |
---|---|
Abbreviated title | VNC |
Country/Territory | United States |
City | Boston |
Period | 16/12/13 → 18/12/13 |
Internet address |
Keywords
- METIS-303566
- IR-89717
- EWI-24593