[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3007120.3007168acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
short-paper

When Game Theory Meets VANET's Security and Privacy

Published: 28 November 2016 Publication History

Abstract

Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.

References

[1]
IEEE Standard for Message Sets for Vehicle/ Roadside Communications. 1455--1999, pp.i--130
[2]
Moustafa and Y. Zhang (Eds.). 2009. Vehicular Networks: Techniques, Standards and Applications. Auerbach publishers, Taylor and Francis Group.
[3]
E.B. Hamida, H. Noura, H. Znaidi: Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures. Electronics 2015, 4, 380--423.
[4]
N. S. Nafi and J.Y. Khan, A V ANET Based Intelligent Road Traffic Signaling System, IEEE Telecommunication Network and Applications Conference (ATNAC), Brisbane, QLD, pp. 1--6, 2012.
[5]
R. Eigner and G. Lutz, Collision Avoidance in VANETs--An Application for Ontological Context Models, in Proc. Of Sixth Annual IEEE Conference on Pervasive Computing and Communications (PERCOM08), Hong Kong, pp. 412--416, March 2008.
[6]
J. Eom, M. Park, S. Park, and T. Chung, A Framework of Defense System for Prevention of Insiders Malicious Behaviors, in Proceedings of the 13th International Conference on Advanced Communication Technology, Korea, pp. 982--987, 2011.
[7]
R. Lu, X. Lin, and X. Shen, Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in INFOCOM 2010, San Diego, California, USA, March 2010.
[8]
S. Bistarelli, F.Fioravanti, and P.Peretti. Defense tree for economic evaluations of security investment. In 1st International Conference on Availability, Reliability and Security (ARES06), pages 416423, 2006.
[9]
D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991.
[10]
G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systemsl. NIST special publication 80030, NIST, National Institute of Standard Technology, July 2002.
[11]
W. Sonnenreich, J. Albanese, and B. Stout. Return On Security Investment (ROSI): A practical quantitative model. In Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, pages 239252. INSTICC Press, 2005.
[12]
M. Cremonini and P. Martini. Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA). In Fourth Work- shop on the Economics of Information Security, June 2005.
[13]
W. Di, Z. Dongxia, L. Sun, J. Liu and L. Juanjuan, A Game based routing algorithm for Congestion Control of multimedia transmission in VANETs, International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, pp. 1--6, Nov 2011.
[14]
D.B. Rawat, B.B. Bista and G. Yan, CoR-- VANETs: Game Theoretic Approach for Channel and Rate Selection in Cognitive Radio VANETs. Seventh International Conference on Broadband Wireless Computing, Communication and Applications (BWCCA), Victoria, BC, pp: 94--99, Nov 2012.
[15]
J. Neel, J. Reed and R. Gilles, The role of game theory in the analysis of software radio networks; SDR Forum Technical Conf., November 2002.
[16]
A. Urpi, M. Bonuccelli, and S. Giordano, Modeling cooperation in mobile ad hoc networks: a formal description of selfishness, Proc. of the 1st Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.
[17]
M. Felegyhazi, L. Buttyan, and J.-P. Hubaux,Nash equilibria of packet forwarding strategies in wireless ad hoc networks, to appear in IEEE Transactions on Mobile Computing.
[18]
P. Michiardi and R. Molva, A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks,Proc. of the 1st Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.
[19]
M. H. Manshae et al., "Game theory meets network security and privacy," ACM Computing Surveys, Dec. 2011.
[20]
S. Du et al., "An attack-and-defence game for security assessment in vehicular ad hoc networks,"
[21]
S. Bahamou, D. El Ouadghiri and J-M. Bonnin, Vehicular Ad-hoc network Privacy Assessment Based on Attackdefense Tree. The tenth International workshop on communication technologies for vehicles (NETS4CARS, NETS4TRAINS and NETS4AIRCRAFT 2016), DonostiaSan Sebastian (Spain), June 6-7, 2016.
[22]
B. Schneier. Secrets and Lies: Digital Security in a Networked World. Wiley, 2000.
[23]
B. Schneier. Attack trees: Modeling security threats. Dr. Dobbs journal, December 1999.
[24]
J. Freudiger, M. Manshaei, J-P. Hubaux, Non-Cooperative Location Privacy: a game theoretic analysis, CCS'09, DC 2009.
[25]
S. Bistarelli, M. Dall'Aglio, P. Peretti, Strategic Games on Defense Trees, FAST 4691: 1--15, 2007.
[26]
AR. Beresford; F. Stajano;Location Privacy in Pervasive Computing, Pervasive Computing. IEEE 2(1), 2003.
[27]
R. Rios, J. Lopez, Analysis of location privacy solutions in wireless sensor networks Privacy preservation in wireless sensor networks. Iet Communications, vol.5, pp. 2518--2532, 2011.
[28]
Ronal L. Krutz, Russell Dean Vines, and Edward M. Stroz. The CISSP Prep Guide: Mastering the Ten Domains of Computer Security. Wiley, August 2001.
[29]
Y. Sun, "A research on variable ordering methods of binary decision diagram". Shanghai Jiao Tong University, Shanghai, 2008.
[30]
R. Gibbons. A Primer in Game Theory. Pearson Higher Education, 1992.

Cited By

View all
  • (2022)Merging Attack-Defense Tree and Game Theory to Analyze Vehicular Ad Hoc Network SecurityComputational Intelligence in Recent Communication Networks10.1007/978-3-030-77185-0_5(69-81)Online publication date: 21-Feb-2022
  • (2021)Applications of Game Theory in Vehicular Networks: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.310846623:4(2660-2710)Online publication date: Dec-2022
  • (2021)Adversarial Online Learning With Variable Plays in the Pursuit-Evasion Game: Theoretical Foundations and Application in Connected and Automated Vehicle CybersecurityIEEE Access10.1109/ACCESS.2021.31207009(142475-142488)Online publication date: 2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM '16: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media
November 2016
363 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • @WAS: International Organization of Information Integration and Web-based Applications and Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Attack Tree
  2. Game Theory
  3. Location Privacy
  4. Privacy
  5. Risk Analysis
  6. Security
  7. Vehicular ad hoc networks

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

MoMM '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)2
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Merging Attack-Defense Tree and Game Theory to Analyze Vehicular Ad Hoc Network SecurityComputational Intelligence in Recent Communication Networks10.1007/978-3-030-77185-0_5(69-81)Online publication date: 21-Feb-2022
  • (2021)Applications of Game Theory in Vehicular Networks: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.310846623:4(2660-2710)Online publication date: Dec-2022
  • (2021)Adversarial Online Learning With Variable Plays in the Pursuit-Evasion Game: Theoretical Foundations and Application in Connected and Automated Vehicle CybersecurityIEEE Access10.1109/ACCESS.2021.31207009(142475-142488)Online publication date: 2021
  • (2020)Predictive model for multistage cyber-attack simulationInternational Journal of System Assurance Engineering and Management10.1007/s13198-020-00952-5Online publication date: 3-Feb-2020
  • (2020)An evolutionary game theory–based security model in vehicular ad hoc networksInternational Journal of Communication Systems10.1002/dac.429033:6Online publication date: 14-Jan-2020
  • (2019)Cyber Security Game for Intelligent Transportation SystemsIEEE Network10.1109/MNET.2018.180027933:4(216-222)Online publication date: Jul-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media