From a security standpoint, VANETs (Vehicular ad hoc Networks) are vulnerable to attacks by malicious users, due to the decentralized and open nature of the wireless system. For many of these kinds of attacks detection is unfeasible, thus making it hard to produce security. Despite their characterization as dynamically reconfigurable networks, it is nonetheless essential to identify topology and population properties that can optimise mitigation protocols' deployment. In this paper, we provide an algorithmic definition and simulation of a trust and mitigation based protocol to contain a Black Hole style attack on a VANET. We experimentally show its optimal working conditions: Total connectivity, followed by a random network; connection to external networks; early deployment of the protocol and ranking of the message. We compare results with those of existing protocols and future work shall focus on repeated broadcasting, opportunistic message forwarding and testing on real data.

Simulation of a Trust and Reputation Based Mitigation Protocol for a Black Hole Style Attack on VANETs / G. Primiero, A. Martorana, J. Tagliabue - In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)[s.l] : IEEE, 2018. - ISBN 9781538654453. - pp. 127-135 (( Intervento presentato al 3. convegno EURO S and PW tenutosi a London nel 2018.

Simulation of a Trust and Reputation Based Mitigation Protocol for a Black Hole Style Attack on VANETs

G. Primiero;
2018

Abstract

From a security standpoint, VANETs (Vehicular ad hoc Networks) are vulnerable to attacks by malicious users, due to the decentralized and open nature of the wireless system. For many of these kinds of attacks detection is unfeasible, thus making it hard to produce security. Despite their characterization as dynamically reconfigurable networks, it is nonetheless essential to identify topology and population properties that can optimise mitigation protocols' deployment. In this paper, we provide an algorithmic definition and simulation of a trust and mitigation based protocol to contain a Black Hole style attack on a VANET. We experimentally show its optimal working conditions: Total connectivity, followed by a random network; connection to external networks; early deployment of the protocol and ranking of the message. We compare results with those of existing protocols and future work shall focus on repeated broadcasting, opportunistic message forwarding and testing on real data.
Settore M-FIL/02 - Logica e Filosofia della Scienza
2018
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
08406572.pdf

accesso aperto

Tipologia: Publisher's version/PDF
Dimensione 178.07 kB
Formato Adobe PDF
178.07 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/700161
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? 5
social impact