from the network and so participate in it.
As discussed above, nodes exchange their GCLs.
This implies that a node can try to attack other nodes
by inserting false records in its list. Therefore we
must define a criterion for determining whether a
node must be isolated or not, according to its
appearance in the GCLs. On the one hand a
minimum number of complaints could be defined
before marking a node as selfish. That is, if X nodes
agree that a particular node is selfish, it is probably
true. On the other hand, at least two of these
complaints should have different coordinates (x,y) in
order to avoid specific problems detailed below. To
choose the minimum number of complaints about
the same node that must be recorded before marking
it like a selfish node, one possible solution would be
to set this parameter as a function of the network
size. Therefore, the larger the network, the greater
this number must be. Another strange situation
happen when a vehicle is stopped on the roadway
due to an accident, car malfunction or even a phone
conversation. In any of those situations, the
automatic mechanism will detect a vehicle at 0 km/h
on a road and send a warning about a traffic jam that
does not exist. One option to solve this problem
would be to revoke the car, which then should ask
for a new key pair after explaining what has
happened. Another solution would be to use the
above idea and only revoke a node having a record
of misconduct in more than one place from more
than one node.
A third analyzed problem comes from the use of
ACK as a cooperative mechanism. New nodes that
have not participated in any retransmission will have
no ACK to receive packets from the network. One
solution would be that the authenticator node gives
them an ACK. Another option would be to wait till
the new nodes generate own packets, and after
sharing them with other cars, they will get an ACK
and will be able to participate in the network. The
best option will be determined during the
implementation of the proposal.
6 CONCLUSIONS
This paper proposes a new vision of a VANET in
which there is no centralized authority. This would
allow addressing all the weaknesses of this type of
networks and studying whether they are viable or
not. To carry out this process certain needs or
security requirements must be met to obtain the
contribution of the nodes that participate in it. This
paper proposes cooperation tools to ensure that the
information is reliable and that the nodes cooperate
in relaying it. We propose two lists as well as
mechanisms that allow nodes automatically to detect
misbehavior. Although so far these are only ideas,
the next step is the simulation and installation of a
wireless network to study the speed of transmission
of packets and the range of the connections.
ACKNOWLEDGEMENTS
Research supported by Ministerio Español de
Educación y Ciencia and European FEDER Fund
under TIN2008-02236/TSI Project, and by Agencia
Canaria de Investigación, Innovación y Sociedad de
la Información under PI2007/005 Project.
REFERENCES
Yousefi, S., Mousavi, M. S., Fathy, M., 2006. ‘Vehicular
Ad Hoc Networks (VANETs)’, Challenges and
Perspectives, 6th Int. conference on ITS
Telecommunications. China.
Raya, M., Papadimitratos, P., Aad, I., Jungels, D.,
Hubaux, J.-P., 2007. ‘Eviction of Misbehaving and
Faulty Nodes in Vehicular Networks’. IEEE Journal
on Selected Areas in Communications, Special Issue
on Vehicular Networks
Sun, J., Fang, Y., 2008. ‘A defense technique against
misbehavior in VANETs based on threshold
authentication.’, Proc. IEEE MILCOM 2008.
Li, F., Wu, J., 2009. ‘FRAME: An Innovative Incentive
Scheme in Vehicular Networks.’ Proc. of IEEE
International Conference on Communications, (ICC).
Buttyan, L., Holczer, T., Vajda, I., 2007. ‘On the
effectiveness of changing pseudonyms to provide
location privacy in vanets ’ Proceedings of the Fourth
European Workshop on Security and Privacy in Ad
hoc and Sensor Networks (ESAS2007). Springer.
Li, F., Wu, J., 2008. ‘A Winning-Probability-based
Incentive Scheme in Vehicular Networks.’ Proc. of
IEEE International Conference on Network Protocols,
(ICNP).
COOPERATIVE APPROACH TO SELF-MANAGED VANETS
97