Skip to main content
Log in

An attack-and-defence game for security assessment in vehicular ad hoc networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Recently, there is an increasing interest in Security and Privacy issues in Vehicular ad hoc networks (or VANETs). However, the existing security solutions mainly focus on the preventive solutions while lack a comprehensive security analysis. The existing risk analysis solutions may not work well to evaluate the security threats in vehicular networks since they fail to consider the attack and defense costs and gains, and thus cannot appropriately model the mutual interaction between the attacker and defender. In this study, we consider both of the rational attacker and defender who decide whether to launch an attack or adopt a countermeasure based on its adversary’s strategy to maximize its own attack and defense benefits. To achieve this goal, we firstly adopt the attack-defense tree to model the attacker’s potential attack strategies and the defender’s corresponding countermeasures. To take the attack and defense costs into consideration, we introduce Return On Attack and Return on Investment to represent the potential gain from launching an attack or adopting a countermeasure in vehicular networks. We further investigate the potential strategies of the defender and the attacker by modeling it as an attack-defense game. We then give a detailed analysis on its Nash Equilibrium. The rationality of the proposed game-theoretical model is well illustrated and demonstrated by extensive analysis in a detailed case study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Lin X, Lu R, Zhang C, Zhu H, Ho P-H, Shen X (2008) Security in vehicular Ad Hoc networks. IEEE Commun Mag 46(4):88–95

    Article  Google Scholar 

  2. Zhu H, Lu R, Lin X, Shen X (2009) Security in service-oriented vehicular networks. IEEE Wirel Commun Mag 16(4):16–22

    Google Scholar 

  3. Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11. Shanghai, China, 10–15 April 2011

  4. Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B, Lyer A (2011) Flooding-resilient broadcast authentication for vanets. In: Proc. ACM MOBICOM’11

  5. Han Q, Du S, Ren D, Zhu H (2010) SAS: a secure data aggregation scheme in vehicular sensing networks. In: International Conference on Communications (IEEE ICC’10). Cape Town, South Africa, 23–27 May 2010

  6. Reidt S, Srivatsa M, Balfe S (2009) The Fable of the bees: incentivizing robust revocation decision making in ad hoc networks. In: Proc. ACM CCS’09

  7. Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. JCS-SASN

  8. Hoeper K, Gong G (2006) Bootstrapping security in mobile Ad Hoc networks using identity-based schemes with key revocation. Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada

  9. Matt BJ (2004) Toward hierarchical identity-based cryptography for tactical networks. In: Proceedings of the 2004 Military Communications conference (MILCOM 2003), IEEE Computer Society, pp 727–735

  10. Zhang Y, Liu W, Lou W, Fang Y, Kwon Y (2005) AC-PKI: anonymous and certificateless public key infrastructure for mobile ad hoc networks. In: Proceedings of the International Conference on Communications (ICC 2005). IEEE Computer Society, pp 3515–3519

  11. Luo J, Hubaux J-P, Eugster PT (2005) DICTATE: distributed certification authority with probabilistic freshness for Ad Hoc networks. IEEE TDSC 2(4):311–323

    Google Scholar 

  12. Clulow J, Moore T (2006) Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS Operating Systems Review 40(3):18–21

    Article  Google Scholar 

  13. Anderson R, Moore T, Clulow J, Nagaraja S (2007) New strategies for revocation in Ad-Hoc networks. In: Proceedings of the 4th European workshop on security and privacy in ad hoc and sensor networks (ESAS 2007). Springer, pp 232–246

  14. Moore T, Raya M, Clulow J, Papadimitratos P, Anderson R, Hubaux J-P (2008) Fast exclusion of errant devices from vehicular networks. In: Proceedings of the 5th conference on sensor, mesh and ad hoc communications and networks (SECON 2008), pp 135–143

  15. Raya M, Hossein Manshaei M, Felegyhazi M, Hubaux J-P (2008) Revocation games in ephemeral networks. In: Proceedings of the 15th ACM conference on computer and communications security. ACM, pp 199–210

  16. Freudiger J, Manshaei M, Hubaux J-P, Parkes DC (2009) On non-cooperative location privacy: a game-theoretic analysis. CCS’09, 2009

  17. Beresford AR, Stajano F (2003) Location privacy in pervasive computing. Pervasive computing. IEEE 2(1):46–55

    Article  Google Scholar 

  18. Bistarelli S, Dall’Aglio M, Peretti P (2007) Strategic games on defense trees. FAST 4691:1–15

    Google Scholar 

  19. Ren D, Du S, Zhu H (2011) A novel attack tree based risk assessment approach for location privacy preservation in the VANETs. In: Proc. of ICC 2011

  20. Kordy B, Mauw S, Melissen M, Schweitzer P (2010) Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. GameSec 6442:245–256

    Google Scholar 

Download references

Acknowledgements

This research was supported by National Natural Science Foundation of China (Grant No.61003218, 70971086), and Doctoral Fund of Ministry of Education of China (Grant No.20100073120065).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haojin Zhu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Du, S., Li, X., Du, J. et al. An attack-and-defence game for security assessment in vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 7, 215–228 (2014). https://doi.org/10.1007/s12083-012-0127-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-012-0127-9

Keywords

Navigation