Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that VANETs (vehicular ad hoc networks) must rely heavily on node-to-node communication, thus allowing for malicious data traffic. At the same time, the easy access to information afforded by VANETs potentially enables the difficult security goal of data validation. We propose a general approach to evaluating the validity of VANET data. In our approach a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present. Explanations that are consistent with the node's model of the VANET are scored and the node accepts the data as dictated by the highest scoring explanations. Our techniques for generating and scoring explanations rely on two assumptions: 1) nodes can tell "at least some" other nodes apart from one another and 2) a parsimony argument accurately reflects adversary behavior in a VANET. We justify both assumptions and demonstrate our approach on specific VANETs.
- download PDF (163K)
Golle, P. ; Greene, D. H. ; Staddon, J. Detecting and correcting malicious data in VANETs. Proceedings of the First ACM Workshop on Vehicular Ad Hoc Networks; 2004 October 1; Philadelphia; PA. NY: ACM; 2004; 29-37.
Copyright © ACM, 2004. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Workshop on Vehicular Ad Hoc Networks http://doi.acm.org/10.1145/1023875.1023881