N. Bißmeyer, Klaus Henrik Schroder, J. Petit, Sebastian Mauthofer, K. Bayarou
{"title":"Short paper: Experimental analysis of misbehavior detection and prevention in VANETs","authors":"N. Bißmeyer, Klaus Henrik Schroder, J. Petit, Sebastian Mauthofer, K. Bayarou","doi":"10.1109/VNC.2013.6737612","DOIUrl":null,"url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) aim to increase, among others, traffic safety and efficiency by warning and informing the driver about road events and hazards. Due to their direct impact on drivers' safety, external and internal attacks have to be prevented. While authentication prevents most of the external attacks, internal attackers are still able to misuse the system and inject fake - but authenticated - messages. Therefore, misbehavior detection and prevention mechanisms are required to mitigate such attacks. In this paper we provide a categorization of internal attackers to identify most relevant attack variants. Instead of using simulations, as done by most related works, we use an implementation on real vehicles to demonstrate the feasibility of location-based attacks. Especially, we demonstrate that a malware application installed on a vehicle can provoke false warnings on benign vehicles that are within the attacker's communication range. This exemplary attack is possible due to insufficiently specified VANET security standards. By using our proposed countermeasures, we show that this internal attack is detected and blocked, preventing false driver warnings.","PeriodicalId":152372,"journal":{"name":"2013 IEEE Vehicular Networking Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Vehicular Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VNC.2013.6737612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Vehicular Ad-hoc Networks (VANETs) aim to increase, among others, traffic safety and efficiency by warning and informing the driver about road events and hazards. Due to their direct impact on drivers' safety, external and internal attacks have to be prevented. While authentication prevents most of the external attacks, internal attackers are still able to misuse the system and inject fake - but authenticated - messages. Therefore, misbehavior detection and prevention mechanisms are required to mitigate such attacks. In this paper we provide a categorization of internal attackers to identify most relevant attack variants. Instead of using simulations, as done by most related works, we use an implementation on real vehicles to demonstrate the feasibility of location-based attacks. Especially, we demonstrate that a malware application installed on a vehicle can provoke false warnings on benign vehicles that are within the attacker's communication range. This exemplary attack is possible due to insufficiently specified VANET security standards. By using our proposed countermeasures, we show that this internal attack is detected and blocked, preventing false driver warnings.