Weitere Artikel dieser Ausgabe durch Wischen aufrufen
A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital signature. In attributing an attack message to its perpetrator by localizing the signal source, we can make no presumptions regarding the type of radio equipment used by a malicious transmitter, including the transmitting power utilized to carry out an exploit. Hyperbolic position bounding (HPB) provides a mechanism to probabilistically estimate the candidate location of an attack message's originator using received signal strength (RSS) reports, without assuming knowledge of the transmitting power. We specialize the applicability of HPB into the realm of vehicular networks and provide alternate HPB algorithms to improve localization precision and computational efficiency. We extend HPB for tracking the consecutive locations of a mobile attacker. We evaluate the localization and tracking performance of HPB in a vehicular scenario featuring a variable number of receivers and a known navigational layout. We find that HPB can position a transmitting device within stipulated guidelines for emergency services localization accuracy.
IEEE Intelligent Transportation Systems Committee : IEEE Trial-Use Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management Messages. IEEE Std 1609.2-2006, July 2006
Anderson R, Bond M, Clulow J, Skorobogatov S: Cryptographic processors—a survey. Proceedings of the IEEE 2006, 94(2):357-369. CrossRef
Anderson R, Kuhn M: Tamper resistance: a cautionary note. Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, Oakland, Calif, USA 1-11.
National Institute of Standards and Technology : Security Requirements for Cryptographic Modules. Federal Information Processing Standards 140-2, NIST, May 2001
IBM : IBM 4764 PCI-X Cryptographic Coprocessor. http://www.ibm.com
Williams DE: A Concept for Universal Identification. White paper, SANS Institute, December 2001
SeVeCom : Security architecture and mechanisms for V2V/V2I, deliverable 2.1. Tech. Rep. D2.1, Secure Vehicle Communication, Paris, France; August 2007.
Laurendeau C, Barbeau M: Insider attack attribution using signal strength-based hyperbolic location estimation. Security and Communication Networks 2008, 1(4):337-349. 10.1002/sec.35 CrossRef
Laurendeau C, Barbeau M: Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks. Proceedings of the 2nd IEEE LCN Workshop on User MObility and VEhicular Networks (ON-MOVE '08), October 2008, Montreal, Canada 600-607.
Boukerche A, Oliveira HABF, Nakamura EF, Loureiro AAF: Vehicular ad hoc networks: a new challenge for localization-based systems. Computer Communications 2008, 31(12):2838-2849. 10.1016/j.comcom.2007.12.004 CrossRef
Parker R, Valaee S: Vehicular node localization using received-signal-strength indicator. IEEE Transactions on Vehicular Technology 2007, 56(6, part 1):3371-3380. CrossRef
Hubaux J-P, Čapkun S, Luo J: The security and privacy of smart vehicles. IEEE Security & Privacy 2004, 2(3):49-55. CrossRef
Čapkun S, Hubaux J-P: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications 2006, 24(2):221-232. CrossRef
Brands S, Chaum D: Distance-bounding protocols. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT '94), May 1994, Perugia, Italy, Lecture Notes in Computer Science. Volume 765. Springer; 344-359.
Xiao B, Yu B, Gao C: Detection and localization of sybil nodes in VANETs. Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS '06), September 2006, Los Angeles, Calif, USA 1-8.
Leinmüller T, Schoch E, Kargl F: Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications 2006, 13(5):16-21. CrossRef
Douceur JR: The Sybil attack. In Peer-to-Peer Systems, Lecture Notes in Computer Science. Volume 2429. Springer, Berlin, Germany; 2002:251-260.
Tang L, Hong X, Bradford PG: Privacy-preserving secure relative localization in vehicular networks. Security and Communication Networks 2008, 1(3):195-204. 10.1002/sec.31 CrossRef
Yan G, Olariu S, Weigle MC: Providing VANET security through active position detection. Computer Communications 2008, 31(12):2883-2897. 10.1016/j.comcom.2008.01.009 CrossRef
Mirmotahhary N, Kohansal A, Zamiri-Jafarian H, Mirsalehi M: Discrete mobile user tracking algorithm via velocity estimation for microcellular urban environment. Proceedings of the 67th IEEE Vehicular Technology Conference (VTC '08), May 2008, Singapore 2631-2635.
Zaidi ZR, Mark BL: Real-time mobility tracking algorithms for cellular networks based on Kalman filtering. IEEE Transactions on Mobile Computing 2005, 4(2):195-208. CrossRef
Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice-Hall, Upper Saddle River, NJ, USA; 2002.
Laurendeau C, Barbeau M: Probabilistic evidence aggregation for malicious node position bounding in wireless networks. Journal of Networks 2009, 4(1):9-18. CrossRef
Chen Y, Kleisouris K, Li X, Trappe W, Martin RP: The robustness of localization algorithms to signal strength attacks: a comparative study. In Proceedings of the 2nd IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '06), June 2006, San Francisco, Calif, USA, Lecture Notes in Computer Science. Volume 4026. Springer; 546-563.
American National Standards Institute : Programming Language FORTRAN. ANSI Standard X3.9-1978, 1978
Liechty LC: Path loss measurements and model analysis of a 2.4 GHz wireless network in an outdoor environment, M.S. thesis. Georgia Institute of Technology, Atlanta, Ga, USA; August 2007.
Liechty LC, Reifsnider E, Durgin G: Developing the best 2.4 GHz propagation model from active network measurements. Proceedings of the 66th IEEE Vehicular Technology Conference (VTC '07), September-October 2007, Baltimore, Md, USA 894-896.
Federal Communications Commission 911 Service, FCC Code of Federal Regulations, Title 47, Part 20, Section 20.18, October 2007
- Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks
- Springer International Publishing
EURASIP Journal on Wireless Communications and Networking
Elektronische ISSN: 1687-1499
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com