Analysis and comparison of secure localization schemes for intelligent transportation systems

Bhaswati Deka, Ryan Gerdes, Ming Li, Kevin Heaslip

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work, we employ distance bounding (DB) and verifiable trilateration (VT) for secure localization in an intelligent transportation system (ITS). We first demonstrate several possible attack scenarios, and then establish an analytical framework to evaluate the security of these schemes. Results are derived in terms of the probability of a given position being spoofed by maliciously-controlled vehicles assuming randomly distributed colluding attackers. The results show that while VT outperforms DB, both methods have a high probability of being spoofed. Copyright is held by the author/owner(s).

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1424-1426
Number of pages3
ISBN (Print)9781450329576
DOIs
StatePublished - Nov 3 2014
Externally publishedYes
Event21st ACM Conference on Computer and Communications Security, CCS 2014 - Scottsdale, United States
Duration: Nov 3 2014Nov 7 2014

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference21st ACM Conference on Computer and Communications Security, CCS 2014
Country/TerritoryUnited States
CityScottsdale
Period11/3/1411/7/14

Keywords

  • Intelligent transportation systems
  • Secure localization

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Cite this