From a security standpoint, VANETs (Vehicular ad hoc Networks) are vulnerable to attacks by malicious users, due to the decentralized and open nature of the wireless system. For many of these kinds of attacks detection is unfeasible, thus making it hard to produce security. Despite their characterization as dynamically reconfigurable networks, it is nonetheless essential to identify topology and population properties that can optimise mitigation protocols' deployment. In this paper, we provide an algorithmic definition and simulation of a trust and mitigation based protocol to contain a Black Hole style attack on a VANET. We experimentally show its optimal working conditions: Total connectivity, followed by a random network; connection to external networks; early deployment of the protocol and ranking of the message. We compare results with those of existing protocols and future work shall focus on repeated broadcasting, opportunistic message forwarding and testing on real data.
Simulation of a Trust and Reputation Based Mitigation Protocol for a Black Hole Style Attack on VANETs / G. Primiero, A. Martorana, J. Tagliabue - In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)[s.l] : IEEE, 2018. - ISBN 9781538654453. - pp. 127-135 (( Intervento presentato al 3. convegno EURO S and PW tenutosi a London nel 2018.
Simulation of a Trust and Reputation Based Mitigation Protocol for a Black Hole Style Attack on VANETs
G. Primiero;
2018
Abstract
From a security standpoint, VANETs (Vehicular ad hoc Networks) are vulnerable to attacks by malicious users, due to the decentralized and open nature of the wireless system. For many of these kinds of attacks detection is unfeasible, thus making it hard to produce security. Despite their characterization as dynamically reconfigurable networks, it is nonetheless essential to identify topology and population properties that can optimise mitigation protocols' deployment. In this paper, we provide an algorithmic definition and simulation of a trust and mitigation based protocol to contain a Black Hole style attack on a VANET. We experimentally show its optimal working conditions: Total connectivity, followed by a random network; connection to external networks; early deployment of the protocol and ranking of the message. We compare results with those of existing protocols and future work shall focus on repeated broadcasting, opportunistic message forwarding and testing on real data.File | Dimensione | Formato | |
---|---|---|---|
08406572.pdf
accesso aperto
Tipologia:
Publisher's version/PDF
Dimensione
178.07 kB
Formato
Adobe PDF
|
178.07 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.