Sunteți pe pagina 1din 5

2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP)

June 9 11, 2013, Beijing, China

Analysis of VANET Security


Based on Routing Protocol Information
Lu Chen, Hongbo Tang, Junfei Wang

ABSTRACTVANET is new kind of Ad hoc. It is widely used moving outdoor communication network, also known as
in ITS (Intelligent Transportation Systems), which has many SOTIS (self-organizing traffic information system) [4]. In
characteristics as large scale network, fast moving nodes, the VANET, the moving vehicles can constitute a network
frequently changing topological structure and easily divided communication by exchanging the speed and position
networks. Therefore, routing protocol design must fully
information for another. Each node in the network has the
consider of this characteristics with much node information
that bring a great challenge to the security of VANET. In this ability to find the path, which adopted the multi-hop to
paper, we divide the information type into four categories based deliver the information sent out from the source node finally
on different content, and analyze the security threats in to the destination node place through a series of forwarding.
different information type, then summarize the existing security The network communication is made up of two parts:
technologies and give the possible research directions. vehicle to vehicle (V2V) communication and vehicle to
infrastructure (V2I) communication. As shown in figure 1,
.Introduction vehicle global positioning services (GPS, global positioning

T he Vehicle Ad hoc Network (VANET) is a new kind of


network, which developed from Mobility Ad hoc
Network. It is widely used in Intelligent Transportation
System (ITS) [1] that provide strong technical supports for
vehicles using the wireless channel to deliver traffic safety
informations, road status information large scale network,
fast moving nodes, the frequently changing topological
structure, node shift Dynamic regularity enhancement, and
easily divided networks [2]. Because of the characteristics
and demands to VANET network, some new routing
protocol arises at the historic moment. However, with the
development of technology application, some potential
safety problems appeared at the same time.
In this paper, we analyzed the features of the informations Figure 1 VANET Architecture
carried by the existing routing protocols applied in VANET, system) and digital multimedia services (DMB, digital
presented the possible security problems according to the multimedia broad - casting) can provide by satellite
type of informations and provides the existing security communication system. Different from the traditional Ad
mechanisms. This organization is as follows: the next section hoc network, the VANET communication can be provided
introduces the main architecture of VANET, the major with more nodes information with the aid of the whole
routing protocols and the classification of the information communication system. Detailed information not only
carried by existing routing protocols. The third quarter brought communication convenient but also the hidden
argues the possible security issues due to the classified danger of the network safety at the same time. In this paper,
information. The fourth quarter states feasible VANET we discussed the classification of VANET routing protocols
security mechanism. Finally, the future work is summarized on carried information and the security problems between
and prospected. vehicle-to-vehicle communications.
Since VANET has many characteristics as large scale
. VANET Architecture and Major Routing Protocol network, fast moving nodes, the frequently changing
topological structure and easily divided networks, the
The Vehicle Ad hoc network [3] is defined as a fast designing on routing protocol should adjust measures to
local conditions, grasp and reasonable use of these
Supported by the Major State Basic Research Development Program of
characteristics [5]. The existing VANET routing protocol
China (973 Program) (No.2012CB315901) and the National High
Technology Research and Development Program of China (863 can be roughly divided into three categories:
Program)(No.2011AA010604). TBR, topology-based routing
Lu Chen is with the National Digital Switching System Engineering PBR, position-based routing
Technological R&D Center . China( e-mail: Gwendolyn0530@yahoo.cn) .
Hongbo Tang is with the National Digital Switching System Engineering Hybrid routing
Technological R&D Center . China( e-mail: thb@ndsc.com.cn ) . Among them, the routing protocol based on topology
Junfei Wang is with the Information Engineering University . should be divided into pre-active routing protocols and
China( e-mail: Wangjunfei628@yahoo.cn) .
reactive routing protocols, as fig.2 described.

978-1-4673-6249-8/13/$31.00 2013 IEEE 134


APath Information
Path information records the node which can reach or the
information node have experienced. The routing protocols
which build routing table in the communication in advance
or record node ID during forwarding process way will carry
path information. Tempering the path information by
attacker may cause preventing routing establishment or
appearing routing loop eventually lead to packet
Figure 2 VANET Routing Protocol Classification transmission failure.
The designing on VANET routing protocol referenced the When a node joining in the network, DSDV will trigger
Ad hoc working group on the traditional network DSDV and information notice to tell the new node routing information
AODV [6]and other network protocol, and made the and in turn transfer to other node. If the malicious nodes
comprehensive use of position or velocity information and modified the updating information, this will lead the correct
put forward the GPSR[7], GPCR[8] and GeoDTN + Nav routing to a new node not deliver to the rest node in the
[9]routing protocols. network that could stop establish the new routing. Whilst,
Its very important to select and maintain routing, and the malicious nodes may modify the information notice in
according to the choice of routing forwarding data for the which the next hop is itself, so as to cheat data information
guarantee of normal communication in the dynamic network in the network.
topology. Due to the different routing protocol based on In GeoDTN + Nav, when normal forwarding mode
different information, the way to select next hop in routing hindered, the protocol will turn to VCLCR mode. Because of
protocol is endless also and same. According to the three GPCR selecting the intersection nodes preferentially, it is
routing strategy, we can consider the information carried by essential to avoid routing loops. In VCLCR [11] mode, if an
the following four kind of routing protocols can divided into attacker changed the record in packet, the mistakes inpath
four categories: path information, distance information, information will lead to emerging routing loops. As shown
azimuth information and moving direction information in figure 3, when node A is suffered a modified path
TABLE I information attack, the transmission from source node S to
THE INFORMATION CARRIED BY ROUTING PROTOCOLS
the destination node D will form routing loops in A - D - C -
Routing Moving B or A - B - F - E as a result of wrong path record
PATH Distance Azimuth
Protocol Direction
information, give rise to data transmission timeout and
DSDV YES YES YES NO
AODV NO YES NO NO transmission failure.
GPCR NO YES YES NO
GeoDTN
YES YES YES YES
+Nav
From table 1, a certain routing protocol can carry more
than one kind of node information. Each kind of information
may bring various security risks. In next part, we will give a
statement of security issues may bring out by different types
of node information separately.

. Security Issues in Routing Protocol Information


Safety problem is one of the most important parts in
VANET network routing protocol research. The destruction
in the routing protocol layer could do make the whole
network collapse. Therefore, the designing on protocol
should be considered all kinds of possible attack in the Figure 3 Path Information Modified Lead to Routing Loop
network. We divided the type of attack into two categories
[10]: active attack and passive attack. In active attack the BDistance Information
attacker participated in routing protocol actively, tempered The distance between adjacent nodes and the destination
the content in transmission to prevent routing establishment node is an important measure to select next hop in routing
and changed the transfer direction or used of false protocol. The distance information was carried by most of
information to swindle network license, etc. In passive attack routing protocol in VANET. Therefore the changing to
the attacker was not directly involved in the implementation distance information will bring the entire network
process of routing protocol, but monitoring routing communication enormous damage.
information to get the useful information, and thus for the In protocols, the recent node is usually choosing the
malicious attacks. We analyze the security issues may bring nearest neighbor one to destination one as forwarding node.
by active attack towards path information, distance Malicious node makes the distance from itself to the
information, azimuth information and moving direction destination node less than the rest of the adjacent nodes by
information below. modifying its distance information to the destination node.

135
The recent node will select the malicious nodes as the next disorder. It increases the network unnecessary costs and
hop. Actually, the distance between malicious nodes and the affects the data transfer process. As in figure 5(a), normally,
destination node is far outweighing the rest of the neighbor when the source node S send information to the destination
node. Malicious nodes destroy the network communication node D, it will be forwarding in accordance with the law of
in two aspects: on one hand, the involvement of malicious the right hand in S - A - B - C - D node order. When the
nodes influent the original communication process, that lead malicious nodes E and C tempers the azimuth information as
to some of the network node inaccessible or some node link figure 5(b) E 'and' C respectively, the forwarding path will
in idle, the malicious nodes in routing process will increase become S - A - E - B - F - C - D. This not only increases the
the unnecessary costs and make the transmission load number of routing and transport costs, but also increases the
increase at the same time. On the other hand, malicious transmission delay and packet loss. It offers a convenient
nodes could do data content analysis, take data tempered or manipulation for malicious nodes to diddle data information
even discarded in the cheated packed by modified distance and make analyze data content.
information, which cause packet transmission failure and
make the network data loss eventually damaging the DMoving Direction Information
information security. VANET network is different from traditional mobile Ad
When the source node A sending data to destination hoc network. It has the characteristics as high node
node D, we assumed the distance node B to the destination movement speed, the unevenly network node distribution
node D for d1, the distance between malicious nodes C to the and a certain regularity node mobility. It puts forward new
destination node D for d2. Malicious node C argues that its difficulties for the establishment of the routing, but also
distance to destination is minimum of the neighbor node provides new solutions.
within the scope of A communication, namely d2 < d1. At The particularity of network application environment
this time, source node A will choose C as the next hop. In determines the difficulties in building routing. In the
this way, the malicious node C increased the network routing intelligent transportation system, due to the few vehicles in
overhead, and could cheat data information to malicious night or fast vehicle speed may result in network
attacks.
CAzimuth Information
The traditional mobile Ad hoc routing protocol was not
carrying adjacent nodes azimuth information, which adopted
spending large broadcast ways to establish and maintain
routing. Deficiency in information increase delay and cost
during route setup process. If there are azimuth information
instructions in FIG. 3, the possibility against modified
distance information can reduce greatly. (a) The Edge of the Right Hand Rule Forwarding
VANET GPCR and GeoDTN+Nav are both to carrying
the node azimuth information. They have brought
convenient for the practical application in urban

(b) Azimuth Information Modified Path Forwarding


Figure 5 Azimuth information modified Lead to Costs Increase
segmentation. In this case, source node couldn't find the
right forwarding node which can lead to transmission failure.
Figure 4 Distance Information Modified Lead to Costs Increased The GeoDTN+Nav uses the regularity of VANET node
environment, but also brought new safety problems. Once mobility, which according to the position of the node and
the destination node azimuth was made direction mistaken, it movement direction information to select the forwarding
will get the network communications disastrous failure. In nodes to overcome network segmentation problem. The
GPCR, the node transmits the data accordance with the moving direction information is the direction to which the
greedy forwarding mode. When this mode is suffocated, it neighbor node is moving, it is different from the azimuth
will transmit data according to the right hand side which information. The changing of the direction in moving
takes edge forwarding mode. In the decision process of the direction information may make packet transfer occurred at
right hand side of the method, it requires that between cross purposes phenomenon, which make the transmission
current node and the previous node and the connections direction and the destination node apart from each other
between source node and destination node can not have cross more and more far, and can not to overcome network
[12]. If the azimuth information happens to change, the segmentation problem very well. In addition, in the special
judgment for next hop in the process of forward edge will be

136
environment of VANET, the correctness of the direction of broadcasted in large VANET is enough to cause major
moving information has great significance for the driver and delays, which lead that part of the vehicle is unable to obtain
passenger's safety. If the malicious node changes the vehicle the correct information.
moving direction from turning right to going straight, the
rear of the vehicle need to turn right would consider that the CIntrusion Detection
road ahead is unimpeded and relaxes driving vigilance. Until One of the most important remedy in network security
to find the vehicle ahead turning right, it will probably too protection is intrusion detection [15], which analyzes the
late to take measures and cause traffic accidents. Particularly, collected related information in network to check whether
owing to the direction of the mobile node influence by the the network exists the network threat security or the signs of
artificial factor, the network node movement direction may attack, thus provide protection for the network information
change in a short time. Hence the success of the network security. In cable network, intrusion detection depends on
communications depends on the tolerable delay constraints the flow analysis on the switches and routers gateway nodes.
and the correct data transmission. In the information security But VANET is a no center and in organization network,
mechanism, it comes up higher request with the speed in which can't provide monitory point for monitoring network
data encryption/decryption. data flow. Meanwhile, due to the network characteristics as
Therefore, protection the integrity and accuracy of the strong mobility and node uneven distribution, it is difficult to
information in routing protocol takes the significance for division network normal or proposed a abnormal threshold.
correct data transmission and network safety. We must take Therefore it brings new challenges for the application of
effective way to prevent malicious nodes attack. intrusion detection technology.

. VANET Security Mechanism . Conclusion


The integrity, reliability and confidentiality of network With the rapid development of automobile industry,
information is of great significance for network security. In intelligent transportation system will get more widely used.
VANET, the nodes will exchange a lot of network topology Because VANET has many characteristics as large scale
information between each other, whilst information network, fast moving nodes, the frequently changing
disclosure, manipulation, insert or recording replay will give topological structure and easily divided networks, its routing
normal communication with all kinds of safety problem. It protocol design must fully consider of this characteristics
need a series of security mechanism to protect the integrity with much node information. This article from point of view
and consistency of network information to ensure the normal on the different information carried by protocols, analyzed
operation of the network. From the present study, the main the network security problems brought by attacked and
research direction includes data encryption, security modified the all kinds of information. Then, we provide
authentication and intrusion detection. some security mechanism deal with VANET and questions
to be resolve in the future. Through the research we can see,
AData Encryption the current routing protocol mostly judge the next hop based
The most commonly and simply way used to protect data on just a certain few information, lacking of integrated
information is data encryption. In IEEE P1609.2 provides information treatment to select routing. Therefore, we should
the application relevant VANET network and management consider from the integrated point of view the problem of
of the security mechanism, from which proposed the elliptic network security and routing protocol design. Wish
curve encryption algorithm [13] which using the length of intelligent transportation system a better future for the
256 bits. The proposed algorithm has a better effect than the public.
RSA encryption algorithm, and is considered to be the
general next generation public key cryptosystem. But the REFERENCE
speed of this encryption algorithm signature authentication [1] Machida, Mamoru. "Intelligent transport (IT) system using wireless
and encryption is low, and it will bring the influence of time communication between a roadside device and an in-vehicle device."
U.S. Patent No. 8,179,280. 15 May 2012.
delay in the large scale network applications.
[2] Blum J, Eskandarian A, Hoffmman L. "Challenges of inter vehicle ad
hoc networks,". IEEE Trans on Intelligent Transportation Systems,
BSecurity Authentication 2004, 5(4): 347 - 351.
Security authentication mechanism is used to prevent and [3] CHRISTIAN C, MORETTI L, TIAN J."Communication architecture
detect a series of sabotage during accessing network by of CarTalk2000". The 10th World Congress and Exhibition on
malicious nodes [14]. Digital signature technology is good Intelligent Transport Systems and Services [C]. Madrid, Spain, 2003.
for security authentication service. But it may reveal the [4] CHANG Cu-yu, XIANG Yong, SHI Mei-lin. "The Present Situation
and Development of VANET."Journal on
identity of the node, such as privacy information and Communications,2007,28(11):116-126
position information at the same time. In order to solve the [5] Krishnaveni, V. "Survey of Routing Protocols in Vehicular Ad-Hoc
problem, the researchers proposed anonymous signature Network."IJECCE 1.2 (2012): 110-114.
authentication scheme based on group and anonymous [6] Lal A, Sipi Dubey M, Pesswani B. "Reliability of MANET through
signature authentication scheme based on alias for VANET the Performance Evaluation of AODV, DSDV, DSR, " International
Journal, 2012, 2(5).
network. But there are some shortcomings in the
[7] Meng C U I, Dong L I. "A Speed-based Routing Protocol
authentication cost, communication cost and certificate Improvement on Vehicular Ad Hoc Networks in City Scenarios, ".
revocation. Only the identity revocation announcements Intelligent Computer and Applications, 2012, 3: 004.

137
[8] Mohammadzadeh H, Bigdello S J. "UTCARP: Urban Traffic Control
Aware Routing Protocol, ". International Journal, 2013.
[9] Paul B, Ibrahim M, Bikas M, et al. "VANET Routing Protocols: Pros
and Cons, " arXiv preprint arXiv:1204.1201, 2012.
[10] LIU Zheng, XIANG Yong, SUN Wei-Zhen. "The contrast analysis on
VANET unicast routing protocols, " Computer Engineering and
Design, 2011, Vol.32, No.11
[11] Lee K C, Cheng P-C, Weng J-T, et al. " VCLCR: a practical
geographic routing protocol in urban scenarios, " Los Angeles, CA:
UCLA, Boelter Hall, 2008.
[12] KevinC. Lee, Pei-Chun Cheng, Jui-Ting Weng, Lung-CHih Tung,
Mario Gerla. VCLCR: AP ractical Geogrophic Routing Protocol in
Urban Scenarios, UCLACSDT Technical Report: TR080009, March
26, 2008
[13] Enge, Andreas. "Elliptic curve cryptographic systems." Handbook of
Finite Fields (2013).
[14] Li C, Wang Z.Location-based Security Authentication Mechanism for
Ad hoc Network[J]. parameters, 2012, 1: 2.
[15] Hoh B, Gruteser M, Herring R, et al. Virtual trip lines for distributed
privacy-preserving traffic monitoring [C]. In MobiSys 08: Proceeding
of the 6th international conference on Mobile systems, applications,
and services. New York, NY,USA, 2008: 1528.

138

S-ar putea să vă placă și