Defending against Roadside Attackers

نویسندگان

  • Robert K. Schmidt
  • Tim Leinmüller
  • Albert Held
چکیده

Communication between vehicles is a very promising technology to reduce fatalities and injuries in road traffic. Vehicles spontaneously form communication networks where they exchange messages to warn surrounding vehicles. Theoretically, this system is open to any communication node that is equipped with the required communication technology. This openness demands appropriate security mechanisms in order to protect against attacks and misuse. In this work, we present a mechanism to protect the system against a particular kind of attacker, the socalled roadside attacker. First, we explain the abilities of such an attacker. Then, we introduce a defense mechanism that is based on the fact that the roadside attacker can only move barely compared to a vehicle. The idea is to build up trust relations to vehicles that have been neighbors for a certain time and thus proofed their movement. This property can not be achieved by a roadside attacker. We show how to realize such a mechanism and discuss its limitations. We further show how to integrate such a mechanism into a security system that we refer to as vehicle behavior evaluation framework.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the...

متن کامل

Defending against Sybil Nodes in BitTorrent

BitTorrent and its derivatives contribute a major portion of Internet traffic due to their simple and scalable operation. However, the lack of security mechanisms makes them vulnerable to attacks such as file piece pollution, connection slot consumption, and bandwidth exhaustion. These effects are made worse by the ability of attackers to manufacture new identities, or Sybil nodes, at will. The...

متن کامل

Defending against multiple different attackers

One defender defends, and multiple heterogeneous attackers attack, an asset. Three scenarios are considered: the agents move simultaneously; the defender moves first; or the attackers move first. We show how the agents’ unit costs of defense and attack, their asset evaluations, and the number of attackers influence their investments, profits, and withdrawal decisions. Withdrawal does not occur ...

متن کامل

TCP/IP Data Normalization

Defending networks against today's attackers is especially challenging for modern intrusion detection/prevention systems for two reasons: the sheer amount of state they must maintain, and the possibility of resource exhaustion attacks on the defense system itself. Our work shows how to cope with these challenges in the context of a TCP stream normalizer whose job is to detect all instances of i...

متن کامل

S a Arunmozhi and Y Venkataramani: Resilient Scheme against Reduction of Quality (roq) Distributed Denial of Service Attack in Manet

Defending against denial-of-service attacks (DoS) in a mobile ad hoc network (MANET) is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ) Distributed Denial of Service (DDoS) attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS) to end systems ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009