ABSTRACT
Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.
- IEEE Standard for Message Sets for Vehicle/ Roadside Communications. 1455--1999, pp.i--130Google Scholar
- Moustafa and Y. Zhang (Eds.). 2009. Vehicular Networks: Techniques, Standards and Applications. Auerbach publishers, Taylor and Francis Group. Google ScholarDigital Library
- E.B. Hamida, H. Noura, H. Znaidi: Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures. Electronics 2015, 4, 380--423.Google Scholar
- N. S. Nafi and J.Y. Khan, A V ANET Based Intelligent Road Traffic Signaling System, IEEE Telecommunication Network and Applications Conference (ATNAC), Brisbane, QLD, pp. 1--6, 2012.Google Scholar
- R. Eigner and G. Lutz, Collision Avoidance in VANETs--An Application for Ontological Context Models, in Proc. Of Sixth Annual IEEE Conference on Pervasive Computing and Communications (PERCOM08), Hong Kong, pp. 412--416, March 2008. Google ScholarDigital Library
- J. Eom, M. Park, S. Park, and T. Chung, A Framework of Defense System for Prevention of Insiders Malicious Behaviors, in Proceedings of the 13th International Conference on Advanced Communication Technology, Korea, pp. 982--987, 2011.Google Scholar
- R. Lu, X. Lin, and X. Shen, Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in INFOCOM 2010, San Diego, California, USA, March 2010. Google ScholarDigital Library
- S. Bistarelli, F.Fioravanti, and P.Peretti. Defense tree for economic evaluations of security investment. In 1st International Conference on Availability, Reliability and Security (ARES06), pages 416423, 2006. Google ScholarDigital Library
- D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991.Google Scholar
- G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systemsl. NIST special publication 80030, NIST, National Institute of Standard Technology, July 2002.Google Scholar
- W. Sonnenreich, J. Albanese, and B. Stout. Return On Security Investment (ROSI): A practical quantitative model. In Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, pages 239252. INSTICC Press, 2005.Google Scholar
- M. Cremonini and P. Martini. Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA). In Fourth Work- shop on the Economics of Information Security, June 2005.Google Scholar
- W. Di, Z. Dongxia, L. Sun, J. Liu and L. Juanjuan, A Game based routing algorithm for Congestion Control of multimedia transmission in VANETs, International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, pp. 1--6, Nov 2011.Google ScholarCross Ref
- D.B. Rawat, B.B. Bista and G. Yan, CoR-- VANETs: Game Theoretic Approach for Channel and Rate Selection in Cognitive Radio VANETs. Seventh International Conference on Broadband Wireless Computing, Communication and Applications (BWCCA), Victoria, BC, pp: 94--99, Nov 2012. Google ScholarDigital Library
- J. Neel, J. Reed and R. Gilles, The role of game theory in the analysis of software radio networks; SDR Forum Technical Conf., November 2002.Google Scholar
- A. Urpi, M. Bonuccelli, and S. Giordano, Modeling cooperation in mobile ad hoc networks: a formal description of selfishness, Proc. of the 1st Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.Google Scholar
- M. Felegyhazi, L. Buttyan, and J.-P. Hubaux,Nash equilibria of packet forwarding strategies in wireless ad hoc networks, to appear in IEEE Transactions on Mobile Computing. Google ScholarDigital Library
- P. Michiardi and R. Molva, A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks,Proc. of the 1st Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.Google Scholar
- M. H. Manshae et al., "Game theory meets network security and privacy," ACM Computing Surveys, Dec. 2011. Google ScholarDigital Library
- S. Du et al., "An attack-and-defence game for security assessment in vehicular ad hoc networks,"Google Scholar
- S. Bahamou, D. El Ouadghiri and J-M. Bonnin, Vehicular Ad-hoc network Privacy Assessment Based on Attackdefense Tree. The tenth International workshop on communication technologies for vehicles (NETS4CARS, NETS4TRAINS and NETS4AIRCRAFT 2016), DonostiaSan Sebastian (Spain), June 6-7, 2016. Google ScholarDigital Library
- B. Schneier. Secrets and Lies: Digital Security in a Networked World. Wiley, 2000. Google ScholarDigital Library
- B. Schneier. Attack trees: Modeling security threats. Dr. Dobbs journal, December 1999.Google Scholar
- J. Freudiger, M. Manshaei, J-P. Hubaux, Non-Cooperative Location Privacy: a game theoretic analysis, CCS'09, DC 2009. Google ScholarDigital Library
- S. Bistarelli, M. Dall'Aglio, P. Peretti, Strategic Games on Defense Trees, FAST 4691: 1--15, 2007. Google ScholarDigital Library
- AR. Beresford; F. Stajano;Location Privacy in Pervasive Computing, Pervasive Computing. IEEE 2(1), 2003. Google ScholarDigital Library
- R. Rios, J. Lopez, Analysis of location privacy solutions in wireless sensor networks Privacy preservation in wireless sensor networks. Iet Communications, vol.5, pp. 2518--2532, 2011.Google ScholarCross Ref
- Ronal L. Krutz, Russell Dean Vines, and Edward M. Stroz. The CISSP Prep Guide: Mastering the Ten Domains of Computer Security. Wiley, August 2001. Google ScholarDigital Library
- Y. Sun, "A research on variable ordering methods of binary decision diagram". Shanghai Jiao Tong University, Shanghai, 2008.Google Scholar
- R. Gibbons. A Primer in Game Theory. Pearson Higher Education, 1992.Google Scholar
Index Terms
- When Game Theory Meets VANET's Security and Privacy
Recommendations
When game theory meets security and privacy related risk assessment of vehicular networks (VANET)
Vehicular ad-hoc networks faces numerous challenges, in particular Security and Privacy issues. Here, security assessment, risk evaluation and many other security features/ calculations are based generally on theoretical ideas, that may project in ...
Seamless VANET Connectivity through Heterogeneous Wireless Network on Rural Highways
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesVehicular Ad hoc Networks (VANETs) is a subclass of Mobile Ad hoc Networks where moving nodes are vehicles that move with very high speed on roads. The continuous availability of the network for efficient and reliable communication is the major ...
A sybil attack detection approach using neighboring vehicles in VANET
SIN '11: Proceedings of the 4th international conference on Security of information and networksVehicular Ad Hoc Network (VANET) is vulnerable to many security threats. One severe attack is Sybil attack, in which a malicious node forges a large number of fake identities in order to disrupt the proper functioning of VANET applications. In this ...
Comments