skip to main content
research-article

A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment

Published: 09 August 2024 Publication History

Abstract

In recent years, Autonomous Vehicle Networks (AVNs) have gained significant attention for their potential to make transportation safer and more efficient. These networks rely on Vehicle-to-Vehicle (V2V) communication to exchange critical information, such as location, speed, and driving intentions. However, V2V communication also introduces security vulnerabilities that can be exploited to compromise the safety and privacy of drivers and passengers. Malicious or selfish drivers can potentially intercept, modify, and manipulate V2V communication, causing confusion among vehicles or stealing sensitive data. Therefore, to identify and mitigate security threats that could jeopardize V2V communication in AVNs, the implementation of a threat prevention framework is imperative. This article presents a threat prevention framework that assesses security risks dynamically to facilitate secure message forwarding in V2V communication. First, we propose a dynamic risk assessment technique that utilizes the Probability-Impact-Exposure-Recovery metrics approach to evaluate the level of security threats posed to V2V communication and ultimately generate a risk score. Second, we develop a security decay assessment method that utilizes ruin theory to continuously monitor security risk within the AVNs. Third, we design a risk-aware message forwarding protocol based on coalitional game theory to facilitate secure V2V communication. Our experiments using the simulator Veins demonstrate the efficiency and scalability of the proposed framework in preventing potential damage caused by common security threats and enhancing the security of the Automated Highway System.

References

[1]
2017. A message distribution mechanism based on distributed game theory in lte-v network. Proc. Comput. Sci. 107 (2017), 590–598. ISSN1877-0509 noteAdvances in Information and Communication Technology: Proceedings of 7th International Congress of Information and Communication Technology (ICICT2017).
[2]
Zaid Abdulkader, Azizol Abdullah, M. T. Abdullah, and Z. A. Zukarnain. 2018. A survey on sybil attack detection in vehicular ad hoc networks (VANET). J. Comput. (Taiwan) 29 (042018), 1–6.
[3]
Farhan Ahmad and Asma Adnane. 2016. A novel context-based risk assessment approach in vehicular networks. In Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA’16). 466–474.
[4]
Ejaz Ahmed and Hamid Gharavi. 2018. Cooperative vehicular networking: A survey. IEEE Trans. Intell. Transport. Syst. 19, 3 (2018), 996–1014.
[5]
Ali Aliedani, Seng Loke, and Sebastien Glaser. 2020. Robust cooperative car-parking: Implications and solutions for selfish inter-vehicular social behaviour. Hum.-centric Comput. Inf. Sci. 10 (122020).
[6]
Esmaeil Amiri, Khalil Raeisi, and Emad Alizadeh. 2018. A game theory approach for data dissemination in vehicular ad-hoc network.
[7]
Anika Anwar, Talal Halabi, and Mohammad Zulkernine. 2019. Cloud-based sybil attack detection scheme for connected vehicles. In Proceedings of the 3rd Cyber Security in Networking Conference (CSNet’19). 114–121.
[8]
Ferheen Ayaz, Zhengguo Sheng, Daxin Tian, Guan Yong Liang, and Victor Leung. 2020. A voting blockchain based message dissemination in vehicular ad-hoc networks (VANETs). In Proceedings of the IEEE International Conference on Communications (ICC’20). 1–6.
[9]
Parth Bhavsar, Plaban Das, Matthew Paugh, Kakan Dey, and Mashrur Chowdhury. 2017. Risk analysis of autonomous vehicles in mixed traffic streams. Transport. Res. Rec.: J. Transport. Res. Board 2625 (012017), 51–61.
[10]
Rong Chai, Yuan Lv, Bin Yang, and Qianbin Chen. 2014. Cooperative game based relay vehicle selection algorithm for VANETs. In Proceedings of the 14th International Symposium on Communications and Information Technologies (ISCIT’14). 30–34.
[11]
Tingting Chen, Liehuang Wu, Fan Wu, and Sheng Zhong. 2011. Stimulating cooperation in vehicular ad hoc networks: A coalitional game theoretic approach. IEEE Trans. Vehic. Technol. 60, 2 (2011), 566–579.
[12]
Sanghyun Cheon. 2003. An overview of automated highway systems (AHS) and the social and institutional challenges they face.
[13]
Wei Ming Dan Chia, Cindy Goh, keoh loong, and Anna Lito Michala. 2021. Real-time recursive risk assessment framework for autonomous vehicle operations.
[14]
Derrick Dominic, Sumeet Chhawri, Ryan M. Eustice, Di Ma, and André Weimerskirch. 2016. Risk assessment for cooperative automated driving. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC’16). Association for Computing Machinery, New York, NY, 47–58. ISBNx9781450345682
[15]
Zeinab El-Rewini, Karthikeyan Sadatsharan, Daisy Flora Selvaraj, Siby Jose Plathottam, and Prakash Ranganathan. 2020. Cybersecurity challenges in vehicular communications. Vehic. Commun. 23 (2020), 100214. ISSN2214-2096
[16]
Hossam El Hussini, Chadi Assi, Bassam Moussa, Ribal Atallah, and Ali Ghrayeb. 2021. A tale of two entities: Contextualizing the security of electric vehicle charging stations on the power grid. ACM Trans. Internet Things 2, 2, Article 8 (Mar.2021), 21 pages. ISSN2691-1914
[17]
Hazem M. Fahmy, Gerd Baumann, Mohamed A. Abd El Ghany, and Hassan Mostafa. 2017. V2V-based vehicle risk assessment and control for lane-keeping and collision avoidance. In Proceedings of the 29th International Conference on Microelectronics (ICM’17). 1–5.
[18]
Ashley Fehr. 2009. Ruin Theory. Ph. D. Dissertation. West Virginia University.
[19]
Sara FTAIMI and Tomader Mazri. 2021. Risk assessment of attack in autonomous vehicle based on a decision tree. Int. J. Adv. Comput. Sci. Appl. 12 (012021).
[20]
Mevlut Turker Garip, Jonathan Lin, Peter Reiher, and Mario Gerla. 2019. SHIELDNET: An adaptive detection mechanism against vehicular botnets in VANETs. In Proceedings of the IEEE Vehicular Networking Conference (VNC’19). 1–7.
[21]
Mevlut Turker Garip, Peter Reiher, and Mario Gerla. 2016. Ghost: Concealing vehicular botnet communication in the VANET control channel. In Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC’16). 1–6.
[22]
Muhammad Ghori, Ali Sadiq, and Abdul Ghani. 2018. VANET routing protocols: Review, implementation and analysis. J. Phys.: Conf. Ser. 1049 (072018), 012064.
[23]
Amrita Ghosal, Subir Halder, and Mauro Conti. 2022. Secure over-the-air software update for connected vehicles. Comput. Netw. 218 (2022), 109394. ISSN1389-1286
[24]
Subir Halder, Amrita Ghosal, and Mauro Conti. 2020. Secure over-the-air software updates in connected vehicles: A survey. Comput. Netw. 178 (2020), 107343. ISSN1389-1286
[25]
Qiyi He, Xiaolin Meng, and Rong Qu. 2020. Towards a severity assessment method for potential cyber attacks to connected and autonomous vehicles. J. Adv. Transport. 2020 (092020), 1–15.
[26]
Zaw Htike and Fumihide Kojima. 2020. A ruin theory-inspired co-primary spectrum sharing mechanism for 5G. In Proceedings of the IEEE 91st Vehicular Technology Conference (VTC2020-Spring’20). 1–6.
[27]
Safras Iqbal, Peter Ball, Muhammad H Kamarudin, and Andrew Bradley. 2022. Simulating malicious attacks on VANETs for connected and autonomous vehicle cybersecurity: A machine learning dataset. arxiv:2202.07704 [cs.CR]
[28]
Cristhian Iza-Paredes, Ahmad Mohamad Mezher, Mónica Aguilar Igartua, and Jordi Forné. 2018. Game-theoretical design of an adaptive distributed dissemination protocol for VANETs. Sensors 18, 1 (2018). ISSN1424-8220
[29]
Auxeeliya Jesudoss, S. V. Kasmir Raja, and Ashraph Sulaiman. 2015. Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw. 24 (2015), 250–263. ISSN1570-8705
[30]
Weimin Jin, Mhafuzul Islam, and Mashrur Chowdhury. 2022. Risk-based merging decisions for autonomous vehicles. J. Safety Res. 83 (2022), 45–56. ISSN0022-4375
[31]
Dimitrios Karagiannis and Antonios Argyriou. 2018. Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Vehic. Commun. 13 (2018), 56–63. ISSN2214-2096
[32]
Zadid Khan, Sakib Mahmud Khan, Mashrur Chowdhury, Mizanur Rahman, and Mhafuzul Islam. 2020. An evaluation framework of end-to-end 5G millimeter wave communication for connected vehicle applications. eprint[arxiv]2008.06568 [cs.NI]
[33]
Hee-Kyung Kong, Myoung Hong, and Tae-Sung Kim. 2018. Security risk assessment framework for smart car using the attack tree analysis. J. Ambient Intell. Human. Comput. 9 (062018).
[34]
Hee-Kyung Kong, Tae-Sung Kim, and Myoung-Ki Hong. 2016. A security risk assessment framework for smart car. In Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’16). 102–108.
[35]
Deepak Kushwaha, Piyush Shukla, and Raju Barskar. 2014. A survey on sybil attack in vehicular ad-hoc network. Int. J. Comput. Appl. 98 (072014), 31–36.
[36]
Guofa Li, Yifan Yang, Tingru Zhang, Xingda Qu, Dongpu Cao, Bo Cheng, and Keqiang Li. 2021. Risk assessment based collision avoidance decision-making for autonomous vehicles in multi-scenarios. Transport. Res. Part C: Emerg. Technol. 122 (2021), 102820. ISSN0968-090X
[37]
Qianwen Li, Zhiwei Chen, and Xiaopeng Li. 2022. A review of connected and automated vehicle platoon merging and splitting operations. IEEE Trans. Intell. Transport. Syst. 23, 12 (2022), 22790–22806.
[38]
Xiaoqing Li, Jicheng Liu, Xuejun Li, and Weiying Sun. 2013. RGTE: A reputation-based global trust establishment in VANETs. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. 210–214.
[39]
Tom H. Luan, Yao Zhang, Lin Cai, Yilong Hui, Changle Li, and Nan Cheng. 2021. Autonomous vehicular networks: perspective and open issues. eprint[arxiv]2112.01154 [cs.NI]
[40]
Filipe Maciel Roberto, Joaquim Jr, and Henning Schulzrinne. 2011. Using a symmetric game based in volunteer’s dilemma to improve VANETs multihop broadcast communication. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’11), 777–782.
[41]
Kia Makki, Niki Pissinou, and Charles A. Kamhoua. 2011. Modeling security and cooperation in wireless networks using game theory.
[42]
Aunas Manzoor, Kitae Kim, Shashi Raj Pandey, S. M. Ahsan Kazmi, Nguyen H. Tran, Walid Saad, and Choong Seon Hong. 2021. Ruin theory for energy-efficient resource allocation in UAV-assisted cellular networks. IEEE Trans. Commun. 69, 6 (2021), 3943–3956.
[43]
Aunas Manzoor, Nguyen H. Tran, Walid Saad, S. M. Ahsan Kazmi, Shashi Raj Pandey, and Choong Seon Hong. 2019. Ruin theory for dynamic spectrum allocation in LTE-U networks. IEEE Commun. Lett. 23, 2 (2019), 366–369.
[44]
Michael Mitzenmacher and Eli Upfal. 2005. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, New York, NY. ISBNx0521835402
[45]
Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, and Ahmad Y. Javaid. 2018. Simulation and analysis of DDoS attack on connected autonomous vehicular network using OMNET++. In Proceedings of the 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON’18). 502–508.
[46]
Sharmistha Nayak, Nurzaman Ahmed, and Sudip Misra. 2021. Deep learning-based reliable routing attack detection mechanism for industrial internet of things. Ad Hoc Netw. 123 (2021), 102661. ISSN1570-8705
[47]
Anh Nguyen, Lynda Mokdad, and Jalel Othman. 2013. DJAVAN: Detecting jamming attacks in vehicle ad hoc networks. Perf. Eval. 87, 405–410.
[49]
Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, and Ardalan Amiri Sani. 2021. IoT notary: Attestable sensor data capture in IoT environments. ACM Trans. Internet Things 3, 1, Article 3 (Oct.2021), 30 pages. ISSN2691-1914
[50]
Seunghyun Park and Hyunhee Park. 2022. PIER: Cyber-resilient risk assessment model for connected and autonomous vehicles. Wireless Netw. (082022).
[51]
Zsombor Pethő, Zsolt Szalay, and Árpád Török. 2022. Safety risk focused analysis of V2V communication especially considering cyberattack sensitive network performance and vehicle dynamics factors. Vehic. Commun. 37 (2022), 100514.
[52]
Jamal Raiyn. 2018. Data and cyber security in autonomous vehicle networks. Transport Telecommun. J. 19, 4 (2018), 325–334.
[53]
Jackeline Rios-Torres and Andreas A. Malikopoulos. 2017. Automated and cooperative vehicle merging at highway on-ramps. IEEE Trans. Intell. Transport. Syst. 18, 4 (2017), 780–789.
[54]
Walid Saad, Zhu Han, Merouane Debbah, Are Hjorungnes, and Tamer Basar. 2009. Coalitional game theory for communication networks. IEEE Sign. Process. Mag. 26, 5 (2009), 77–97.
[55]
Donghoon Shin, Beomjun Kim, Kyongsu Yi, Ashwin Carvalho, and Francesco Borrelli. 2019. Human-centered risk assessment of an automated vehicle using vehicular wireless communication. IEEE Trans. Intell. Transport. Syst. 20, 2 (2019), 667–681.
[56]
Donghoon Shin and Kyongsu Yi. 2018. Human factor considered risk assessment of automated vehicle using vehicle to vehicle wireless communication. Int. J. Autom. Eng. 9, 2 (2018), 56–63.
[57]
Fei Hui Asad J. Khattak Shoucai Jing, Xiangmo Zhao and Lan Yang. 2021. Cooperative CAVs optimal trajectory planning for collision avoidance and merging in the weaving section. Transportmetr. B: Transport Dynam. 9, 1 (2021), 219–236.
[58]
Christoph Sommer, David Eckhoff, Alexander Brummer, Dominik S Buse, Florian Hagenauer, Stefan Joerer, and Michele Segata. 2019. Veins: The open source vehicular network simulation framework. In Recent Advances in Network Simulation. Springer, 215–252.
[59]
Liang Tong, Lixiang Ma, Longjiang Li, and Mao Li. 2013. A coalitional game theoretical model for content downloading in multihop VANETs. In Proceedings of the IEEE 11th International Conference on Dependable, Autonomic and Secure Computing. 627–632.
[60]
Ajay Upadhyaya and J. S. Shah. 2019. AODV routing protocol implementation in VANET. Int. J. Adv. Res. Eng. Technol. 10 (062019).
[61]
Deepika Verma and Parminder Singh. 2019. Safety message dissemination in Cloud-VANET based infrastructure through game theory. CGC Int. J. Contemp. Technol. Res. 2 (122019), 57–61.
[62]
Jixiang Wang, Haiyang Yu, Siqi Chen, Zechang Ye, and Yilong Ren. 2023. Heterogeneous traffic flow signal control and CAV trajectory optimization based on pre-signal lights and dedicated CAV lanes. Sustainability 15 (102023), 15295.
[63]
Yinghui Wang, Yunpeng Wang, Hongmao Qin, and Haojie Ji. 2019. Security risk assessment for connected vehicles based on back propagation neural network. 5733–5745.
[64]
Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji, and Yan Zhang. 2018. Computational intelligence inspired data delivery for vehicle-to-roadside communications. IEEE Trans. Vehic. Technol. 67, 12 (2018), 12038–12048.
[65]
Tianci Yang, Carlos Murguia, and Chen Lv. 2021. Risk assessment for connected vehicles under stealthy attacks on vehicle-to-vehicle networks. eprint[arxiv]2109.01553 [eess.SY]
[66]
Brandon Yoder and Kyle Haynes. 2020. Signaling under the security dilemma: An experimental analysis. J. Conflict Resol. 65 (112020), 002200272096826.
[67]
Shamim Younas, Faisal Rehman, Tahir Maqsood, Saad Mustafa, Adnan Akhunzada, and Abdullah Gani. 2022. Collaborative detection of black hole and gray hole attacks for secure data communication in VANETs. Appl. Sci. 12, 23 (2022). ISSN2076-3417

Index Terms

  1. A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Journal on Autonomous Transportation Systems
      ACM Journal on Autonomous Transportation Systems  Volume 1, Issue 4
      Special Issue on Cybersecurity and Resiliency for Transportation Cyber-Physical Systems
      December 2024
      157 pages
      EISSN:2833-0528
      DOI:10.1145/3613744
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 August 2024
      Online AM: 23 April 2024
      Accepted: 28 March 2024
      Revised: 01 February 2024
      Received: 19 May 2023
      Published in JATS Volume 1, Issue 4

      Check for updates

      Author Tags

      1. Autonomous vehicles
      2. vehicular communication
      3. security
      4. prevention
      5. risk assessment
      6. game theory

      Qualifiers

      • Research-article

      Funding Sources

      • Natural Sciences & Engineering Research Council of Canada

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 333
        Total Downloads
      • Downloads (Last 12 months)333
      • Downloads (Last 6 weeks)14
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media