IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs

Several studies investigating data validity and security against malicious data injection attacks in vehicular ad hoc networks (VANETs) have focused on trust establishment based on cryptology. However, the current researching suffers from two problems: (P1) it is difficult to distinguish an authoriz...

Full description

Saved in:
Bibliographic Details
Main Authors: Nan Ding, Guozhen Tan, Wei Zhang
Format: Article
Language:English
Published: Wiley 2016-05-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2016/5159739
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849401851393343488
author Nan Ding
Guozhen Tan
Wei Zhang
author_facet Nan Ding
Guozhen Tan
Wei Zhang
author_sort Nan Ding
collection DOAJ
description Several studies investigating data validity and security against malicious data injection attacks in vehicular ad hoc networks (VANETs) have focused on trust establishment based on cryptology. However, the current researching suffers from two problems: (P1) it is difficult to distinguish an authorized attacker from other participators; (P2) the large scale of the system and high mobility set up an obstacle in key distribution with a security-based approach. In this paper, we develop a data-centric trust mechanism based on traffic flow theory expanding the notion of trust from intrusion-rejecting to intrusion-tolerant. First, we use catastrophe theory to describe traffic flow according to noncontinuous, catastrophic characteristics. Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA 2 P, without any security codes or authentication. Finally, we simulate two kinds of malicious data injection attack scenarios and evaluate IA 2 P based on real traffic flow data from Zhongshan Road in Dalian, China, over 24 hours. Evaluation results show that our method can achieve a 94% recognition rate in the majority of cases.
format Article
id doaj-art-8bfd35d47c3f4d2793d36c3ea92fd817
institution Kabale University
issn 1550-1477
language English
publishDate 2016-05-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-8bfd35d47c3f4d2793d36c3ea92fd8172025-08-20T03:37:41ZengWileyInternational Journal of Distributed Sensor Networks1550-14772016-05-011210.1155/2016/5159739IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETsNan DingGuozhen TanWei ZhangSeveral studies investigating data validity and security against malicious data injection attacks in vehicular ad hoc networks (VANETs) have focused on trust establishment based on cryptology. However, the current researching suffers from two problems: (P1) it is difficult to distinguish an authorized attacker from other participators; (P2) the large scale of the system and high mobility set up an obstacle in key distribution with a security-based approach. In this paper, we develop a data-centric trust mechanism based on traffic flow theory expanding the notion of trust from intrusion-rejecting to intrusion-tolerant. First, we use catastrophe theory to describe traffic flow according to noncontinuous, catastrophic characteristics. Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA 2 P, without any security codes or authentication. Finally, we simulate two kinds of malicious data injection attack scenarios and evaluate IA 2 P based on real traffic flow data from Zhongshan Road in Dalian, China, over 24 hours. Evaluation results show that our method can achieve a 94% recognition rate in the majority of cases.https://doi.org/10.1155/2016/5159739
spellingShingle Nan Ding
Guozhen Tan
Wei Zhang
IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
International Journal of Distributed Sensor Networks
title IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
title_full IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
title_fullStr IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
title_full_unstemmed IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
title_short IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
title_sort iap intrusion tolerant malicious data injection attack analysis and processing in traffic flow data collection based on vanets
url https://doi.org/10.1155/2016/5159739
work_keys_str_mv AT nanding iapintrusiontolerantmaliciousdatainjectionattackanalysisandprocessingintrafficflowdatacollectionbasedonvanets
AT guozhentan iapintrusiontolerantmaliciousdatainjectionattackanalysisandprocessingintrafficflowdatacollectionbasedonvanets
AT weizhang iapintrusiontolerantmaliciousdatainjectionattackanalysisandprocessingintrafficflowdatacollectionbasedonvanets