skip to main content
10.1145/3007120.3007168acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
short-paper

When Game Theory Meets VANET's Security and Privacy

Published:28 November 2016Publication History

ABSTRACT

Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.

References

  1. IEEE Standard for Message Sets for Vehicle/ Roadside Communications. 1455--1999, pp.i--130Google ScholarGoogle Scholar
  2. Moustafa and Y. Zhang (Eds.). 2009. Vehicular Networks: Techniques, Standards and Applications. Auerbach publishers, Taylor and Francis Group. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E.B. Hamida, H. Noura, H. Znaidi: Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures. Electronics 2015, 4, 380--423.Google ScholarGoogle Scholar
  4. N. S. Nafi and J.Y. Khan, A V ANET Based Intelligent Road Traffic Signaling System, IEEE Telecommunication Network and Applications Conference (ATNAC), Brisbane, QLD, pp. 1--6, 2012.Google ScholarGoogle Scholar
  5. R. Eigner and G. Lutz, Collision Avoidance in VANETs--An Application for Ontological Context Models, in Proc. Of Sixth Annual IEEE Conference on Pervasive Computing and Communications (PERCOM08), Hong Kong, pp. 412--416, March 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Eom, M. Park, S. Park, and T. Chung, A Framework of Defense System for Prevention of Insiders Malicious Behaviors, in Proceedings of the 13th International Conference on Advanced Communication Technology, Korea, pp. 982--987, 2011.Google ScholarGoogle Scholar
  7. R. Lu, X. Lin, and X. Shen, Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in INFOCOM 2010, San Diego, California, USA, March 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Bistarelli, F.Fioravanti, and P.Peretti. Defense tree for economic evaluations of security investment. In 1st International Conference on Availability, Reliability and Security (ARES06), pages 416423, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991.Google ScholarGoogle Scholar
  10. G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systemsl. NIST special publication 80030, NIST, National Institute of Standard Technology, July 2002.Google ScholarGoogle Scholar
  11. W. Sonnenreich, J. Albanese, and B. Stout. Return On Security Investment (ROSI): A practical quantitative model. In Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, pages 239252. INSTICC Press, 2005.Google ScholarGoogle Scholar
  12. M. Cremonini and P. Martini. Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA). In Fourth Work- shop on the Economics of Information Security, June 2005.Google ScholarGoogle Scholar
  13. W. Di, Z. Dongxia, L. Sun, J. Liu and L. Juanjuan, A Game based routing algorithm for Congestion Control of multimedia transmission in VANETs, International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, pp. 1--6, Nov 2011.Google ScholarGoogle ScholarCross RefCross Ref
  14. D.B. Rawat, B.B. Bista and G. Yan, CoR-- VANETs: Game Theoretic Approach for Channel and Rate Selection in Cognitive Radio VANETs. Seventh International Conference on Broadband Wireless Computing, Communication and Applications (BWCCA), Victoria, BC, pp: 94--99, Nov 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Neel, J. Reed and R. Gilles, The role of game theory in the analysis of software radio networks; SDR Forum Technical Conf., November 2002.Google ScholarGoogle Scholar
  16. A. Urpi, M. Bonuccelli, and S. Giordano, Modeling cooperation in mobile ad hoc networks: a formal description of selfishness, Proc. of the 1st Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.Google ScholarGoogle Scholar
  17. M. Felegyhazi, L. Buttyan, and J.-P. Hubaux,Nash equilibria of packet forwarding strategies in wireless ad hoc networks, to appear in IEEE Transactions on Mobile Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Michiardi and R. Molva, A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks,Proc. of the 1st Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.Google ScholarGoogle Scholar
  19. M. H. Manshae et al., "Game theory meets network security and privacy," ACM Computing Surveys, Dec. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Du et al., "An attack-and-defence game for security assessment in vehicular ad hoc networks,"Google ScholarGoogle Scholar
  21. S. Bahamou, D. El Ouadghiri and J-M. Bonnin, Vehicular Ad-hoc network Privacy Assessment Based on Attackdefense Tree. The tenth International workshop on communication technologies for vehicles (NETS4CARS, NETS4TRAINS and NETS4AIRCRAFT 2016), DonostiaSan Sebastian (Spain), June 6-7, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. Schneier. Secrets and Lies: Digital Security in a Networked World. Wiley, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Schneier. Attack trees: Modeling security threats. Dr. Dobbs journal, December 1999.Google ScholarGoogle Scholar
  24. J. Freudiger, M. Manshaei, J-P. Hubaux, Non-Cooperative Location Privacy: a game theoretic analysis, CCS'09, DC 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Bistarelli, M. Dall'Aglio, P. Peretti, Strategic Games on Defense Trees, FAST 4691: 1--15, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. AR. Beresford; F. Stajano;Location Privacy in Pervasive Computing, Pervasive Computing. IEEE 2(1), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Rios, J. Lopez, Analysis of location privacy solutions in wireless sensor networks Privacy preservation in wireless sensor networks. Iet Communications, vol.5, pp. 2518--2532, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ronal L. Krutz, Russell Dean Vines, and Edward M. Stroz. The CISSP Prep Guide: Mastering the Ten Domains of Computer Security. Wiley, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Y. Sun, "A research on variable ordering methods of binary decision diagram". Shanghai Jiao Tong University, Shanghai, 2008.Google ScholarGoogle Scholar
  30. R. Gibbons. A Primer in Game Theory. Pearson Higher Education, 1992.Google ScholarGoogle Scholar

Index Terms

  1. When Game Theory Meets VANET's Security and Privacy

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              MoMM '16: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media
              November 2016
              363 pages

              Copyright © 2016 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 28 November 2016

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper
              • Research
              • Refereed limited

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader