2007
DOI: 10.1109/jsac.2007.071006
|View full text |Cite
|
Sign up to set email alerts
|

Eviction of Misbehaving and Faulty Nodes in Vehicular Networks

Abstract: Abstract-Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the lifecritical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an omnipresen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
208
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 330 publications
(208 citation statements)
references
References 30 publications
0
208
0
Order By: Relevance
“…We extracted 5 000 vehicle traces around the city of Cologne (Germany) from the "TAPAS Cologne" project [32]. To emulate vehicles, we assigned a thread to each one of the traces and assumed a pseudonym request policy of 10 pseudonyms every 10 minutes (i.e., pseudonym lifetime of 1 minute [33]). Figure 7 depicts the observed latency for a simulation interval of 1 hour: the system response time is around 100 ms (on average).…”
Section: B Pseudonym Requestmentioning
confidence: 99%
“…We extracted 5 000 vehicle traces around the city of Cologne (Germany) from the "TAPAS Cologne" project [32]. To emulate vehicles, we assigned a thread to each one of the traces and assumed a pseudonym request policy of 10 pseudonyms every 10 minutes (i.e., pseudonym lifetime of 1 minute [33]). Figure 7 depicts the observed latency for a simulation interval of 1 hour: the system response time is around 100 ms (on average).…”
Section: B Pseudonym Requestmentioning
confidence: 99%
“…Due to the dynamic nature of traffic, even if there are transient obstructions, the line of sight will eventually be restored. In accord with other VANET researchers [8], we assume that the majority of cars (about 85%) are honest players.…”
Section: A Active Location Integritymentioning
confidence: 96%
“…Raya et al [22], [23] proposed an eviction technique consisting of the following components: centralized revocation of a node by the CA, localized misbehavior detection system (MDS), and local eviction of attackers by voting evaluators (LEAVE). In the centralized revocation of a node by the CA, two techniques were proposed: 1) revocation using compressed CRLs, where the traditional CRLs issued by the CA are adopted; however, a CRL is compressed using Bloom filters prior to broadcasting it; and 2) revocation of the tamper-proof device, which is used in the case in which all the certificates of a vehicle are to be revoked.…”
Section: Related Workmentioning
confidence: 99%
“…The details of the voting scheme are not in the scope of this paper. However, the proposed protocol has a modular nature that makes it integrable with any voting scheme, e.g., the voting scheme proposed in [22]. When the voting exceeds a predefined threshold, the misbehaving vehicle should be revoked.…”
Section: ) When a Vehicle Exhibits A Misbehavior Its Neighbors Votementioning
confidence: 99%