The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - February (2011 vol.10)
pp: 280-290
Tansu Alpcan , Technische Universität, Berlin
Sonja Buchegger , Technische Universität, Berlin
ABSTRACT
Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoretic framework where defensive measures are optimized with respect to threats posed by malicious attackers. The formulations are chosen to be abstract on purpose in order to maximize applicability of the models and solutions to future systems. The security games proposed for vehicular networks take as an input centrality measures computed by mapping the centrality values of the car networks to the underlying road topology. The resulting strategies help locating most valuable or vulnerable points (e.g., against jamming) in vehicular networks. Thus, optimal deployment of traffic control and security infrastructure is investigated both in the static (e.g., fixed roadside units) and dynamic cases (e.g., mobile law enforcement units). Multiple types of security games are studied under varying information availability assumptions for the players, leading to fuzzy game and fictitious play formulations in addition to classical zero-sum games. The effectiveness of the security game solutions is evaluated numerically using realistic simulation data obtained from traffic engineering systems.
INDEX TERMS
Vehicular networks, security, game theory, optimization.
CITATION
Tansu Alpcan, Sonja Buchegger, "Security Games for Vehicular Networks", IEEE Transactions on Mobile Computing, vol.10, no. 2, pp. 280-290, February 2011, doi:10.1109/TMC.2010.146
REFERENCES
[1] P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "Securing Vehicular Communications—Assumptions, Requirements, and Principles," Proc. Workshop Embedded Security Cars (ESCAR), 2006.
[2] M. Raya and J.-P. Hubaux, "The Security of Vehicular Ad Hoc Networks," Proc. Workshop Security Ad Hoc Sensor Networks (SASN), pp. 11-21, 2005.
[3] J. Grossklags, N. Christin, and J. Chuang, "Secure or Insure? A Game-Theoretic Analysis of Information Security Games," Proc. 17th Int'l Conf. World Wide Web (WWW '08), pp. 209-218, 2008.
[4] J. Grossklags, N. Christin, and J. Chuang, "Predicted and Observed User Behavior in the Weakest-Link Security Game," Proc. First Conf. Usability, Psychology, and Security (UPSEC '08), pp. 1-6, 2008.
[5] L. Buttyan and J.-P. Hubaux, Security and Cooperation in Wireless Networks, http:/secowinet.epfl.ch. Cambridge Univ. Press, 2007.
[6] S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications. Cambridge Univ. Press, 1994.
[7] Y. Do, S. Buchegger, T. Alpcan, and J.-P. Hubaux, "Centrality Analysis in Vehicular Ad-Hoc Networks," technical report, EPFL/T-Labs, 2008.
[8] P. Sommer, "Design and Analysis of Realistic Mobility Model for Wireless Mesh Networks," master's thesis, ETH Zürich, 2007.
[9] T. Başar and G.J. Olsder, Dynamic Noncooperative Game Theory, second ed. SIAM, 1999.
[10] L. Campos, "Fuzzy Linear Programming Models to Solve Fuzzy Matrix Games," Fuzzy Sets and Systems, vol. 32, no. 3, pp. 275-289, 1989.
[11] J.C.D. Garagic, "An Approach to Fuzzy Noncooperative Nash Games," J. Optimization Theory Applications, vol. 118, no. 3, pp. 475-491, 2003.
[12] A. Abebe, V. Guinot, and D. Solomatine, "Fuzzy Alpha-Cut vs. Monte Carlo Techniques in Assessing Uncertainty in Model Parameters," Proc. Fourth Int'l Conf. Hydroinformatics, July 2000.
[13] J. Shamma and G. Arslan, "Unified Convergence Proofs of Continuous-Time Fictitious Play," IEEE Trans. Automatic Control, vol. 49, no. 7, pp. 1137-1141, July 2004.
[14] G. Marfia, G. Pau, E. Giordano, E. De Sena, and M. Gerla, "Vanet: On Mobility Scenarios and Urban Infrastructure. A Case Study," Proc. 2007 Mobile Networking Vehicular Environments, 2007.
[15] K. Nagel, "Realistic Vehicular Traces," http://lst.inf.ethz.ch/ad- hoccar-traces , 2010.
[16] M. Kafsi, O. Dousse, P. Papadimitratos, T. Alpcan, and J.-P. Hubaux, "VANET Connectivity Analysis," technical report, EPFL/T-Labs, 2008.
[17] P. Crucitti, V. Latora, and S. Porta, "Centrality Measures in Spatial Networks of Urban Streets," Physical Rev. E (Statistical, Nonlinear, and Soft Matter Physics), vol. 73, no. 3, 2006.
[18] C. Lochert, B. Scheuermann, and C. Wewetzer, "Data Aggregation and Roadside Unit Placement for a Vanet Traffic Information System," Proc. Fifth ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET), Sept. 2008.
[19] C. Lochert, B. Scheuermann, M. Caliskan, and M. Mauve, "The Feasibility of Information Dissemination in Vehicular Ad-Hoc Networks," Proc. Fourth Ann. Conf. Wireless Demand Network Systems and Services (WONS), Jan. 2007.
[20] T. Alpcan and T. Başar, "A Game Theoretic Analysis of Intrusion Detection in Access Control Systems," Proc. 43rd IEEE Conf. Decision and Control, pp. 1568-1573, Dec. 2004.
[21] T. Alpcan and T. Başar, "An Intrusion Detection Game with Limited Observations," Proc. 12th Int'l Symp. Dynamic Games and Applications, July 2006.
[22] M. Bloem, T. Alpcan, and T. Başar, "Intrusion Response as a Resource Allocation Problem," Proc. 45th IEEE Conf. Decision and Control, pp. 6283-6288, Dec. 2006.
[23] M. Raya, M.H. Manshaei, M. Felegyhazi, and J.-P. Hubaux, "Revocation Games in Ephemeral Networks," Proc. ACM Conf. Computer Security (CCS), Oct. 2008.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool