Detecting and correcting malicious data in VANETs
Top Cited Papers
- 1 October 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data traffic. At the same time, the easy access to information afforded by VANETs potentially enables the difficult security goal of data validation. We propose a general approach to evaluating the validity of VANET data. In our approach a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present. Explanations that are consistent with the node's model of the VANET are scored and the node accepts the data as dictated by the highest scoring explanations. Our techniques for generating and scoring explanations rely on two assumptions: 1) nodes can tell "at least some" other nodes apart from one another and 2) a parsimony argument accurately reflects adversarial behavior in a VANET. We justify both assumptions and demonstrate our approach on specific VANETs.Keywords
This publication has 6 references indexed in Scilit:
- The sybil attack in sensor networksPublished by Association for Computing Machinery (ACM) ,2004
- Packet leashes: a defense against wormhole attacks in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Secure routing in wireless sensor networks: attacks and countermeasuresPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Secure verification of location claimsPublished by Association for Computing Machinery (ACM) ,2003
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Location-based authentication: Grounding cyberspace for better securityComputer Fraud & Security, 1996