Exploiting Vehicles’ Reputation to Mitigate DoS Attack

Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci


Recently the convergence of safety and security needs in automotive systems is one of the main challenges of the research community. However, the different nature of safety and security metrics suggests that no individual assessment technique is sufficient, in isolation, to validate large systems that are intended to be both safe and secure. The introduction of new generation ICT systems into vehicles makes them potentially vulnerable to security attacks that may impact on the safety of passengers, pedestrians, and vehicle itself. Hence, entities involved in a communication have to be evaluated trustable by means of specific mechanisms of the vehicle or infrastructure system. This work aims at proposing an algorithm for the calculation of reputation of vehicles in a Vehicular Ad Hoc Network (VANET) based on the type and number of exchanged messages. The ultimate goal is to mitigate the Denial of Service (DoS) attack in such kind of communication by acting as a firewall with respect to not trustable vehicles. Indeed, the DoS is a security attack that affects the availability of network bandwidth. This may have an impact on safety of drivers and vehicles since it may prevent the communication and spread of important information for, e.g., human life.


  1. Bella, G., Bistarelli, S., and Massacci, F. (2005). Retaliation: Can we live with flaws? In WORKSHOP ON INFORMATION SECURITY ASSURANCE AND SECURITY.
  2. Bella, G., Costantino, G., and Riccobene, S. (2008). Managing reputation over manets. In Rak, M., Abraham, A., and Casola, V., editors, Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pages 255-260. IEEE Computer Society.
  3. Chen, L., Ng, S.-L., and Wang, G. (2011). Threshold anonymous announcement in vanets. Selected Areas in Communications, IEEE Journal on, 29(3):605-615.
  4. Chou, C.-M., Li, C.-Y., Chien, W.-M., and Lan, K.- c. (2009). A feasibility study on vehicle-toinfrastructure communication: Wifi vs. wimax. In Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09. Tenth International Conference on, pages 397-398. IEEE.
  5. Deng, H., Li, W., and Agrawal, D. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10):70-75.
  6. IET, The Institution of Engineering and Technology (2014). Automotive Cyber Security: An IET/KTN Thought Leadership Review of risk perspective for connected vehicles.
  7. Leinmüller, T., Buttyan, L., Hubaux, J.-P., Kargl, F., Kroh, R., Papadimitratos, P., Raya, M., and Schoch, E. (2006). Sevecom-secure vehicle communication. In IST Mobile and Wireless Communication Summit, number LCA-POSTER-2008-005.
  8. Leinmüller, T., Schmidt, R. K., and Held, A. (2010). Cooperative position verification-defending against roadside attackers 2.0. In Proceedings of 17th ITS World Congress.
  9. Malip, A., Ng, S.-L., and Li, Q. (2014). A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Security and Communication Networks, 7(3):588-601.
  10. National Highway Traffic Safety Administration and others (2005). Vehicle safety communications project task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc. DOT HS S09 S, 59.
  11. Papadimitratos, P., Buttyan, L., Holczer, T. S., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., and Hubaux, J.-P. (2008). Secure vehicular communication systems: design and architecture. Communications Magazine, IEEE, 46(11):100-109.
  12. Qian, Y. and Moayeri, N. (2008). Design of secure and application-oriented vanets. In Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, pages 2794-2799. IEEE.
  13. Raya, M. and Hubaux, J.-P. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pages 11-21. ACM.
  14. Razzaque, M., Salehi, A., and Cheraghi, S. M. (2013). Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In Wireless Networks and Security, pages 107-132. Springer.
  15. Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W. R., Jha, S., Peyrin, T., Poschmann, A., and Chakraborty, S. (2013). Security challenges in automotive hardware/software architecture design. In Proceedings of the Conference on Design, Automation and Test in Europe, pages 458-463. EDA Consortium.
  16. Stakhanova, N., Ferrero, S., Wong, J. S., and Cai, Y. (2004). A reputation-based trust management in peer-to-peer network systems. In Bader, D. A. and Khokhar, A. A., editors, Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, September 15-17, 2004, The Canterbury Hotel, San Francisco, California, USA, pages 510-515. ISCA.
  17. Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaaˆniche, M., and Laarouchi, Y. (2013). Survey on security threats and protection mechanisms in embedded automotive networks. In Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on, pages 1-12. IEEE.
  18. Wang, C. and Thompson, J. (1997). Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network. US Patent 5,613,039.
  19. Wiedersheim, B., Sall, M., and Reinhard, G. (2009). Sevecom-security and privacy in car2car ad hoc networks. In Intelligent Transport Systems Telecommunications,(ITST), 2009 9th International Conference on, pages 658-661. IEEE.

Paper Citation

in Harvard Style

Costantino G., Costantino G., Martinelli F., Martinelli F., Matteucci I. and Matteucci I. (2016). Exploiting Vehicles’ Reputation to Mitigate DoS Attack . In Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn - Volume 1: AMARETTO, (MODELSWARD 2016) ISBN 978-989-758-166-3, pages 75-82. DOI: 10.5220/0005844500750082

in Bibtex Style

author={Gianpiero Costantino and Gianpiero Costantino and Fabio Martinelli and Fabio Martinelli and Ilaria Matteucci and Ilaria Matteucci},
title={Exploiting Vehicles’ Reputation to Mitigate DoS Attack},
booktitle={Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn - Volume 1: AMARETTO, (MODELSWARD 2016)},

in EndNote Style

JO - Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn - Volume 1: AMARETTO, (MODELSWARD 2016)
TI - Exploiting Vehicles’ Reputation to Mitigate DoS Attack
SN - 978-989-758-166-3
AU - Costantino G.
AU - Costantino G.
AU - Martinelli F.
AU - Martinelli F.
AU - Matteucci I.
AU - Matteucci I.
PY - 2016
SP - 75
EP - 82
DO - 10.5220/0005844500750082