Abstract
In this paper we explore the prospect of using friendly jamming for the secure localization of vehicles. In friendly jamming confidential information is obscured from eavesdroppers through the use of opportunistic jamming on the part of the parties engaged in communication. We analyze the effectiveness of friendly jamming and compare it to the traditional localization approaches of distance bounding and verifiable trilateration for similar highway infrastructures. We present our results in terms of the probability of spoofing a given position by maliciously-controlled vehicles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Unsal, C.: Intelligent navigation of autonomous vehicles in an automated highway system: learning methods and interacting vehicles approach. Ph.D. Dissertation, Virginia Tech, Blacksburg, Virginia (1997)
U. D. of Transportation: Faq: Intelligent transportation systems joint program office (2012). http://www.its.dot.gov/faqs.htm. Accessed December 05, 2013
Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
Capkun, S., Hubaux, J.-P.: Secure positioning in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 221–232 (2006)
Capkun, S., Rasmussen, K., Cagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mobile Comput. 7(4), 470–483 (2008)
Fiore, M., Casetti, C., Chiasserini, C.-F., Papadimitratos, P.: Secure neighbor position discovery in vehicular network. In: IEEE/IFIP MedHocNet 2011 (2011)
Zeng, Y., Cao, J., Hong, J., Zhang, S., Xie, L.: Secure localization and location verification in wireless sensor networks: a survey. J. Supercomputing 64(3), 685–701 (2013). doi:10.1007/s11227-010-0501-4
Chang, C., University, N.C.S.: Secure localization and tracking in sensor networks. Ph.D. Dissertation, North Carolina State University (2008)
Zeng, Y., Cao, J., Hong, J., Zhang, S., Xie, L.: Secmcl: A secure monte carlo localization algorithm for mobile sensor networks. In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009. MASS 2009, pp. 1054–1059, October 2009
Vilela, J.P., Bloch, M., Barros, J., McLaughlin, S.W.: Wireless secrecy regions with friendly jamming. IEEE Trans. Inf. Forensics Secur. 6(2), 256–266 (2011)
Kim, Y.S., Tague, P., Lee, H., Kim, H.: Carving secure wi-fi zones with defensive jamming. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS 2012, pp. 53–54. ACM, New York (2012)
Huang, D., Misra, S., Verma, M., Xue, G.: Pacp: an efficient pseudonymous authentication-based conditional privacy protocol for vanets. IEEE Trans. Intell. Transp. Syst. 12(3), 736–746 (2011)
Halton, J.H.: Sigma-algebra theorems. Monte Carlo Methods and Appl. 14(2), 171–189 (2008)
Deka, B., Gerdes, R.M., Li, M., Heaslip, K.: Methods for secure localization in vehicular transportation (2014). http://sats.engr.usu.edu/sites/default/files/transloc.pdf
Tippenhauer, N., Malisa, L., Ranganathan, A., Capkun, S.: On limitations of friendly jamming for confidentiality. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 160–173 (2013)
Wang, J., Hassanieh, H., Katabi, D., Kohno, T.: Securing deployed rfids by randomizing the modulation and the channel. In: Technical report (2013). Accessed April 03, 2015
Acknowledgements
This work was supported in part by the Mountain Plains Consortium under Grant No. MPC-435 and the National Science Foundation under Grant No. 1410000.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Deka, B., Gerdes, R.M., Li, M., Heaslip, K. (2015). Friendly Jamming for Secure Localization in Vehicular Transportation. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-319-23829-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-23829-6_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23828-9
Online ISBN: 978-3-319-23829-6
eBook Packages: Computer ScienceComputer Science (R0)