Skip to main content
Erschienen in: Mobile Networks and Applications 6/2013

01.12.2013

Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set

verfasst von: Chi Lin, Guowei Wu, Feng Xia, Lin Yao

Erschienen in: Mobile Networks and Applications | Ausgabe 6/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the node compromise attack, the adversary physically captures nodes and extracts the cryptographic keys from the memories, which destroys the security, reliability and confidentiality of the networks. Due to the dynamical network topology, designing an efficient node compromise attack algorithm is challenging, because it is difficult to model the attack or to enhance the attacking efficiency. In this paper, a general algorithm for modeling the node compromise attack in VANET is proposed, which promotes the attacking efficiency by destroying the network backbone. The backbone is constructed using the connected dominating set of the network, which has relevant to the intermeeting time between the vehicles. Then two attacking algorithms are proposed based on the general model, which destroy the network in a centralized and distributed version while maximizing the destructiveness. Simulations are conducted to show the advantages of our scheme. Simulation results reveal that our scheme enhances the attacking efficiency in different mobility models and different applications, which is suitable for modeling the node compromise attack in VANET. At last, discussions are presented to the illustrate the influences of the characteristics to the attacking efficiency with respect to vehicle speed, communication range and key sharing probability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef
2.
Zurück zum Zitat Almahorg K, Basir O (2008) Simulation-based performance comparison of vanets backbone formation algorithms. In: Proceedings of the 2008 12th IEEE/ACM international symposium on distributed simulation and real-time applications. IEEE Computer Society, pp 236–242 Almahorg K, Basir O (2008) Simulation-based performance comparison of vanets backbone formation algorithms. In: Proceedings of the 2008 12th IEEE/ACM international symposium on distributed simulation and real-time applications. IEEE Computer Society, pp 236–242
3.
Zurück zum Zitat Aziz A, Sanwal K, Singhal V, Brayton R (2000) Model-checking continuous-time markov chains. ACM Trans Comput Logic (TOCL) 1(1):162–170MathSciNetCrossRef Aziz A, Sanwal K, Singhal V, Brayton R (2000) Model-checking continuous-time markov chains. ACM Trans Comput Logic (TOCL) 1(1):162–170MathSciNetCrossRef
4.
Zurück zum Zitat Bettstetter C, Hartenstein H, Pérez-Costa X (2004) Stochastic properties of the random waypoint mobility model. Wirel Netw 10(5):555–567CrossRef Bettstetter C, Hartenstein H, Pérez-Costa X (2004) Stochastic properties of the random waypoint mobility model. Wirel Netw 10(5):555–567CrossRef
5.
Zurück zum Zitat Bonaci T, Bushnell L, Poovendran R (2010) Node capture attacks in wireless sensor networks: a system theoretic approach. In: 2010 49th IEEE conference on decision and control (CDC). IEEE, pp 6765–6772 Bonaci T, Bushnell L, Poovendran R (2010) Node capture attacks in wireless sensor networks: a system theoretic approach. In: 2010 49th IEEE conference on decision and control (CDC). IEEE, pp 6765–6772
6.
Zurück zum Zitat Bonaci T, Bushnell L, Poovendran R (2010) Probabilistic analysis of covering and compromise in node capture attacks. Network Security Lab (NSL), Seattle. Techical Report 1 Bonaci T, Bushnell L, Poovendran R (2010) Probabilistic analysis of covering and compromise in node capture attacks. Network Security Lab (NSL), Seattle. Techical Report 1
7.
Zurück zum Zitat Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings. 2003 symposium on security and privacy, 2003. IEEE, pp 97–213 Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings. 2003 symposium on security and privacy, 2003. IEEE, pp 97–213
8.
Zurück zum Zitat Chan K, Fekri F (2007) Node compromise attacks and network connectivity. In: Defense and security symposium, pp 65,780W–65,780W. International Society for Optics and Photonics Chan K, Fekri F (2007) Node compromise attacks and network connectivity. In: Defense and security symposium, pp 65,780W–65,780W. International Society for Optics and Photonics
9.
Zurück zum Zitat Chi Lin GW (2013) Enhancing the attacking efficiency of the node capture attack in wsn: a matrix approach. J Supercomput Chi Lin GW (2013) Enhancing the attacking efficiency of the node capture attack in wsn: a matrix approach. J Supercomput
10.
Zurück zum Zitat Dai F, Wu J (2004) An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans Parallel Distrib Syst 15(10):908–920CrossRef Dai F, Wu J (2004) An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans Parallel Distrib Syst 15(10):908–920CrossRef
11.
Zurück zum Zitat De P, Liu Y, Das SK (2006) Modeling node compromise spread in wireless sensor networks using epidemic theory. In: Proceedings of the 2006 international symposium on on world of wireless, mobile and multimedia networks. IEEE Computer Society, pp 237–243 De P, Liu Y, Das SK (2006) Modeling node compromise spread in wireless sensor networks using epidemic theory. In: Proceedings of the 2006 international symposium on on world of wireless, mobile and multimedia networks. IEEE Computer Society, pp 237–243
12.
Zurück zum Zitat De P, Liu Y, Das SK (2009) Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans Sens Netw (TOSN) 5(3):23–50 De P, Liu Y, Das SK (2009) Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans Sens Netw (TOSN) 5(3):23–50
13.
Zurück zum Zitat Ergun M, Levi A, Savas E (2011) Increasing resiliency in multi-phase wireless sensor networks: generationwise key predistribution approach. Comput J 54(4):602–616CrossRef Ergun M, Levi A, Savas E (2011) Increasing resiliency in multi-phase wireless sensor networks: generationwise key predistribution approach. Comput J 54(4):602–616CrossRef
14.
Zurück zum Zitat Fasolo E, Zanella A, Zorzi M (2006) An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In: IEEE international conference on communications, 2006. ICC’06, vol 9. IEEE, pp 3960–3965 Fasolo E, Zanella A, Zorzi M (2006) An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In: IEEE international conference on communications, 2006. ICC’06, vol 9. IEEE, pp 3960–3965
15.
Zurück zum Zitat Felice MD, Bedogni L, Bononi L (2012) Group communication on highways: an evaluation study of geocast protocols and applications. Ad Hoc Netw 11(7):818–832 Felice MD, Bedogni L, Bononi L (2012) Group communication on highways: an evaluation study of geocast protocols and applications. Ad Hoc Netw 11(7):818–832
16.
Zurück zum Zitat Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in vanets. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks. ACM, pp 29–37 Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in vanets. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks. ACM, pp 29–37
17.
Zurück zum Zitat Guette G, Ducourthial B (2007) On the sybil attack detection in vanet. In: IEEE internatonal conference on mobile adhoc and sensor systems, 2007. MASS 2007. IEEE, pp 1–6 Guette G, Ducourthial B (2007) On the sybil attack detection in vanet. In: IEEE internatonal conference on mobile adhoc and sensor systems, 2007. MASS 2007. IEEE, pp 1–6
18.
Zurück zum Zitat Haerri J, Filali F, Bonnet C (2006) Performance comparison of aodv and olsr in vanets urban environments under realistic mobility patterns. In: Proc. of 5th IFIP mediterranean ad-hoc networking workshop (Med-Hoc-Net-2006), Lipari Haerri J, Filali F, Bonnet C (2006) Performance comparison of aodv and olsr in vanets urban environments under realistic mobility patterns. In: Proc. of 5th IFIP mediterranean ad-hoc networking workshop (Med-Hoc-Net-2006), Lipari
19.
Zurück zum Zitat Hao Y, Cheng Y, Ren K (2008) Distributed key management with protection against rsu compromise in group signature based vanets. In: Global telecommunications conference, 2008. IEEE GLOBECOM 2008. IEEE, pp 1–5 Hao Y, Cheng Y, Ren K (2008) Distributed key management with protection against rsu compromise in group signature based vanets. In: Global telecommunications conference, 2008. IEEE GLOBECOM 2008. IEEE, pp 1–5
20.
Zurück zum Zitat Hasbullah H, Ahmed Soomro I, Ab Manan Jl (2010) Denial of service (dos) attack and its possible solutions in vanet. World Acad Sci Eng Technol (WASET) 65:411–415 Hasbullah H, Ahmed Soomro I, Ab Manan Jl (2010) Denial of service (dos) attack and its possible solutions in vanet. World Acad Sci Eng Technol (WASET) 65:411–415
21.
Zurück zum Zitat Husain A, Kumar B, Doegar A (2011) Performance evaluation of routing protocols in vehicular ad hoc networks. Int J Internet Protocol Technol 6(1):38–45CrossRef Husain A, Kumar B, Doegar A (2011) Performance evaluation of routing protocols in vehicular ad hoc networks. Int J Internet Protocol Technol 6(1):38–45CrossRef
22.
Zurück zum Zitat Isaac JT, Zeadally S, Cámara JS (2010) Security attacks and solutions for vehicular ad hoc networks. IET Commun 4(7):894–903MATHMathSciNetCrossRef Isaac JT, Zeadally S, Cámara JS (2010) Security attacks and solutions for vehicular ad hoc networks. IET Commun 4(7):894–903MATHMathSciNetCrossRef
23.
Zurück zum Zitat Karnadi FK, Mo ZH, Lan KC (2007) Rapid generation of realistic mobility models for vanet. In: IEEE Wireless communications and networking conference, 2007. WCNC 2007. IEEE, pp 2506–2511 Karnadi FK, Mo ZH, Lan KC (2007) Rapid generation of realistic mobility models for vanet. In: IEEE Wireless communications and networking conference, 2007. WCNC 2007. IEEE, pp 2506–2511
24.
Zurück zum Zitat Khairnar VD, Pradhan S (2011) Mobility models for vehicular ad-hoc network simulation. In: 2011 IEEE symposium on computers & informatics (ISCI). IEEE, pp 460–465 Khairnar VD, Pradhan S (2011) Mobility models for vehicular ad-hoc network simulation. In: 2011 IEEE symposium on computers & informatics (ISCI). IEEE, pp 460–465
25.
Zurück zum Zitat Kim DS, Suh YK, Park JS (2007) Toward assessing vulnerability and risk of sensor networks under node compromise. In: 2007 international conference on computational intelligence and security. IEEE, pp 740–744 Kim DS, Suh YK, Park JS (2007) Toward assessing vulnerability and risk of sensor networks under node compromise. In: 2007 international conference on computational intelligence and security. IEEE, pp 740–744
26.
Zurück zum Zitat Laurendeau C, Barbeau M (2006) Threats to security in dsrc/wave. In: Ad-hoc, mobile, and wireless networks. Springer, pp 266–279 Laurendeau C, Barbeau M (2006) Threats to security in dsrc/wave. In: Ad-hoc, mobile, and wireless networks. Springer, pp 266–279
27.
Zurück zum Zitat Leinmuller T, Schmidt RK, Schoch E, Held A, Schafer G (2008) Modeling roadside attacker behavior in vanets. In: 2008 IEEE GLOBECOM workshops. IEEE, pp 1–10 Leinmuller T, Schmidt RK, Schoch E, Held A, Schafer G (2008) Modeling roadside attacker behavior in vanets. In: 2008 IEEE GLOBECOM workshops. IEEE, pp 1–10
28.
Zurück zum Zitat Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X (2008) Security in vehicular ad hoc networks. IEEE Commun Mag 46(4):88–95CrossRef Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X (2008) Security in vehicular ad hoc networks. IEEE Commun Mag 46(4):88–95CrossRef
29.
Zurück zum Zitat Lo NW, Tsai HC (2007) Illusion attack on vanet applications-a message plausibility problem. In: 2007 IEEE Globecom Workshops. IEEE, pp 1–8 Lo NW, Tsai HC (2007) Illusion attack on vanet applications-a message plausibility problem. In: 2007 IEEE Globecom Workshops. IEEE, pp 1–8
30.
Zurück zum Zitat Martinez FJ, Toh CK, Cano JC, Calafate CT, Manzoni P (2011) A survey and comparative study of simulators for vehicular ad hoc networks (vanets). Wirel Commun Mob Comput 11(7):813–828CrossRef Martinez FJ, Toh CK, Cano JC, Calafate CT, Manzoni P (2011) A survey and comparative study of simulators for vehicular ad hoc networks (vanets). Wirel Commun Mob Comput 11(7):813–828CrossRef
31.
Zurück zum Zitat Mishra AK, Turuk AK (2011) Adversary information gathering model for node capture attack in wireless sensor networks. In: 2011 international conference on devices and communications (ICDeCom). IEEE, pp 1–5 Mishra AK, Turuk AK (2011) Adversary information gathering model for node capture attack in wireless sensor networks. In: 2011 international conference on devices and communications (ICDeCom). IEEE, pp 1–5
32.
Zurück zum Zitat Saha AK, Johnson DB (2004) Modeling mobility for vehicular ad-hoc networks. In: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. ACM, pp 91–92 Saha AK, Johnson DB (2004) Modeling mobility for vehicular ad-hoc networks. In: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. ACM, pp 91–92
33.
Zurück zum Zitat Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: robust location privacy scheme for vanet. IEEE J Select Areas Commun 25(8):1569–1589CrossRef Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: robust location privacy scheme for vanet. IEEE J Select Areas Commun 25(8):1569–1589CrossRef
34.
Zurück zum Zitat Samuel H, Zhuang W, Preiss B (2009) Dtn based dominating set routing for manet in heterogeneous wireless networking. Mob Netw Appl 14(2):154–164CrossRef Samuel H, Zhuang W, Preiss B (2009) Dtn based dominating set routing for manet in heterogeneous wireless networking. Mob Netw Appl 14(2):154–164CrossRef
35.
Zurück zum Zitat Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801–814CrossRef Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801–814CrossRef
36.
Zurück zum Zitat Tague P, Poovendran R (2008) Modeling node capture attacks in wireless sensor networks. In: 2008 46th annual Allerton conference on communication, control, and computing. IEEE, pp 1221–1224 Tague P, Poovendran R (2008) Modeling node capture attacks in wireless sensor networks. In: 2008 46th annual Allerton conference on communication, control, and computing. IEEE, pp 1221–1224
37.
Zurück zum Zitat Tague P, Slater D, Rogers J, Poovendran R (2008) Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. In: IEEE INFOCOM 2008. The 27th conference on computer communications. IEEE, pp 161–165 Tague P, Slater D, Rogers J, Poovendran R (2008) Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. In: IEEE INFOCOM 2008. The 27th conference on computer communications. IEEE, pp 161–165
38.
Zurück zum Zitat Tague P, Slater D, Rogers J, Poovendran R (2009) Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans Depend Secure Comput 6(2):111–123CrossRef Tague P, Slater D, Rogers J, Poovendran R (2009) Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans Depend Secure Comput 6(2):111–123CrossRef
39.
Zurück zum Zitat Tomandl A, Scheuer F, Federrath H (2012) Simulation-based evaluation of techniques for privacy protection in vanets. In: 2012 IEEE 8th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 165–172 Tomandl A, Scheuer F, Federrath H (2012) Simulation-based evaluation of techniques for privacy protection in vanets. In: 2012 IEEE 8th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 165–172
40.
Zurück zum Zitat Wan PJ, Alzoubi KM, Frieder O (2002) Distributed construction of connected dominating set in wireless ad hoc networks. In: INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1597–1604. IEEE Wan PJ, Alzoubi KM, Frieder O (2002) Distributed construction of connected dominating set in wireless ad hoc networks. In: INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1597–1604. IEEE
41.
Zurück zum Zitat Wu G, Chen X, Obaidat MS, Lin C (2012) A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Secur Commun Netw Wu G, Chen X, Obaidat MS, Lin C (2012) A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Secur Commun Netw
42.
Zurück zum Zitat Yan G, Olariu S, Weigle MC (2008) Providing vanet security through active position detection. Comput Commun 31(12):2883–2897CrossRef Yan G, Olariu S, Weigle MC (2008) Providing vanet security through active position detection. Comput Commun 31(12):2883–2897CrossRef
43.
Zurück zum Zitat Yang S, Wu J, Dai F (2008) Efficient directional network backbone construction in mobile ad hoc networks. IEEE Trans Parallel Distrib Syst 19(12):1601–1613CrossRef Yang S, Wu J, Dai F (2008) Efficient directional network backbone construction in mobile ad hoc networks. IEEE Trans Parallel Distrib Syst 19(12):1601–1613CrossRef
44.
Zurück zum Zitat Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30CrossRef Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30CrossRef
Metadaten
Titel
Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set
verfasst von
Chi Lin
Guowei Wu
Feng Xia
Lin Yao
Publikationsdatum
01.12.2013
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 6/2013
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-013-0469-4

Weitere Artikel der Ausgabe 6/2013

Mobile Networks and Applications 6/2013 Zur Ausgabe

Neuer Inhalt