Abstract
Recently, there is an increasing interest in Security and Privacy issues in Vehicular ad hoc networks (or VANETs). However, the existing security solutions mainly focus on the preventive solutions while lack a comprehensive security analysis. The existing risk analysis solutions may not work well to evaluate the security threats in vehicular networks since they fail to consider the attack and defense costs and gains, and thus cannot appropriately model the mutual interaction between the attacker and defender. In this study, we consider both of the rational attacker and defender who decide whether to launch an attack or adopt a countermeasure based on its adversary’s strategy to maximize its own attack and defense benefits. To achieve this goal, we firstly adopt the attack-defense tree to model the attacker’s potential attack strategies and the defender’s corresponding countermeasures. To take the attack and defense costs into consideration, we introduce Return On Attack and Return on Investment to represent the potential gain from launching an attack or adopting a countermeasure in vehicular networks. We further investigate the potential strategies of the defender and the attacker by modeling it as an attack-defense game. We then give a detailed analysis on its Nash Equilibrium. The rationality of the proposed game-theoretical model is well illustrated and demonstrated by extensive analysis in a detailed case study.
Similar content being viewed by others
References
Lin X, Lu R, Zhang C, Zhu H, Ho P-H, Shen X (2008) Security in vehicular Ad Hoc networks. IEEE Commun Mag 46(4):88–95
Zhu H, Lu R, Lin X, Shen X (2009) Security in service-oriented vehicular networks. IEEE Wirel Commun Mag 16(4):16–22
Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11. Shanghai, China, 10–15 April 2011
Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B, Lyer A (2011) Flooding-resilient broadcast authentication for vanets. In: Proc. ACM MOBICOM’11
Han Q, Du S, Ren D, Zhu H (2010) SAS: a secure data aggregation scheme in vehicular sensing networks. In: International Conference on Communications (IEEE ICC’10). Cape Town, South Africa, 23–27 May 2010
Reidt S, Srivatsa M, Balfe S (2009) The Fable of the bees: incentivizing robust revocation decision making in ad hoc networks. In: Proc. ACM CCS’09
Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. JCS-SASN
Hoeper K, Gong G (2006) Bootstrapping security in mobile Ad Hoc networks using identity-based schemes with key revocation. Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada
Matt BJ (2004) Toward hierarchical identity-based cryptography for tactical networks. In: Proceedings of the 2004 Military Communications conference (MILCOM 2003), IEEE Computer Society, pp 727–735
Zhang Y, Liu W, Lou W, Fang Y, Kwon Y (2005) AC-PKI: anonymous and certificateless public key infrastructure for mobile ad hoc networks. In: Proceedings of the International Conference on Communications (ICC 2005). IEEE Computer Society, pp 3515–3519
Luo J, Hubaux J-P, Eugster PT (2005) DICTATE: distributed certification authority with probabilistic freshness for Ad Hoc networks. IEEE TDSC 2(4):311–323
Clulow J, Moore T (2006) Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS Operating Systems Review 40(3):18–21
Anderson R, Moore T, Clulow J, Nagaraja S (2007) New strategies for revocation in Ad-Hoc networks. In: Proceedings of the 4th European workshop on security and privacy in ad hoc and sensor networks (ESAS 2007). Springer, pp 232–246
Moore T, Raya M, Clulow J, Papadimitratos P, Anderson R, Hubaux J-P (2008) Fast exclusion of errant devices from vehicular networks. In: Proceedings of the 5th conference on sensor, mesh and ad hoc communications and networks (SECON 2008), pp 135–143
Raya M, Hossein Manshaei M, Felegyhazi M, Hubaux J-P (2008) Revocation games in ephemeral networks. In: Proceedings of the 15th ACM conference on computer and communications security. ACM, pp 199–210
Freudiger J, Manshaei M, Hubaux J-P, Parkes DC (2009) On non-cooperative location privacy: a game-theoretic analysis. CCS’09, 2009
Beresford AR, Stajano F (2003) Location privacy in pervasive computing. Pervasive computing. IEEE 2(1):46–55
Bistarelli S, Dall’Aglio M, Peretti P (2007) Strategic games on defense trees. FAST 4691:1–15
Ren D, Du S, Zhu H (2011) A novel attack tree based risk assessment approach for location privacy preservation in the VANETs. In: Proc. of ICC 2011
Kordy B, Mauw S, Melissen M, Schweitzer P (2010) Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. GameSec 6442:245–256
Acknowledgements
This research was supported by National Natural Science Foundation of China (Grant No.61003218, 70971086), and Doctoral Fund of Ministry of Education of China (Grant No.20100073120065).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Du, S., Li, X., Du, J. et al. An attack-and-defence game for security assessment in vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 7, 215–228 (2014). https://doi.org/10.1007/s12083-012-0127-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-012-0127-9