Abstract
In Vehicular ad hoc networks (VANETs), vehicles are allowed to broadcast messages for informing nearby vehicles about road condition and emergent events, such as traffic congestion or accident. It leaves a backdoor in which inside attackers can launch false information attacks by injecting bogus emergency messages to mislead other vehicles, and potential threats on road safety can be caused. This paper presents a multi-source information fusion approach to detect bogus emergency messages, in which each vehicle uses its on-board sensor data and received beacon messages to perceive the traffic condition and calculates its belief on credibility for received emergency messages. Moreover, the proposed approach provides enhanced robustness against collusion attacks by integrating an outlier detection mechanism in which a clustering algorithm is performed to filter out the colluder whose behavior deviates largely from others. The simulation results show validity of our approach, higher significantly detection rate can be achieved comparing to the existing threshold based scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hartenstein, H.: VANET: Vehicular Applications and Inter-Networking Technologies. Wiley, Chichester (2010)
De Fabritiis, C., Ragona, R., Valenti, G.: Traffic estimation and prediction based on real time floating car data. In: Proceedings of the 11th International IEEE Conference on IEEE Intelligent Transportation Systems, pp. 197–203 (2008)
Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw. 15(1), 39–68 (2007)
IEEE Std. 1609.2-2013: IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, April 2013. http://standards.ieee.org/ndstds/standard/1609.2-2013.html
Thajchayapong, S., Garcia-Trevino, E.S., Barria, J.A.: Distributed classification of traffic anomalies using microscopic traffic variables. IEEE Trans. Intell. Transp. Syst. 14(1), 448–458 (2013)
Pan, T.L., Sumalee, A., Zhong, R.X.: Short-term traffic state prediction based on temporal-spatial correlation. IEEE Trans. Intell. Transp. Syst. 14(3), 1242–1254 (2013)
Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29–37. ACM (2004)
Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Netw. 8(7), 778–790 (2010)
Abumansoor, O., Boukerche, A.: Towards a secure trust model for vehicular ad hoc networks services. In: Proceedings of the Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5. IEEE (2011)
Wu, Q., Domingo-Ferrer, J., Gonzalez-Nicolas, U.: Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans. Veh. Technol. 59(2), 559–573 (2010)
Raya, M., Papadimitratos, P., Aad, I., Jungels, D.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007)
Chen, L., Ng, S.L., Wang, G.: Threshold anonymous announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3), 605–615 (2011)
Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: Proceedings of the 2011 IEEE Vehicular Technology Conference, pp. 1–5. IEEE (2011)
Wu, A., Ma, J., Zhang, S.: RATE: a RSU-aided scheme for data-centric trust establishment in VANETs. In: Proceedings of the 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1–6. IEEE (2011)
Li, Q., Malip, A., Martin, K.M., Siaw, N.G., Zhang, J.: A reputation-based announcement scheme for VANETs. IEEE Trans. Veh. Technol. 61(9), 4095–4108 (2012)
Dhurandher, S.K., Obaidat, M.S., Jaiswal, A., Tiwari, A., Tyagi, A.: Vehicular security through reputation and plausibility checks. IEEE Syst. J. 8(2), 384–394 (2014)
Sedjelmaci, H., Senouci, S.M.: A new intrusion detection framework for vehicular networks. In: Proceedings of the 2014 IEEE International Conference on Communications (ICC), pp. 538–543. IEEE (2014)
Dietzel, S., Gürtler, J., Heijden, R.V.D., et al.: Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes. In: Vehicular Networking Conference, pp. 135–142. IEEE (2014)
Wang, J., Zhang, Y., Wang, Y., et al.: RPRep: a robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. Int. J. Distrib. Sens. Netw. 12(3), 1–15 (2016)
Al Falasi, H., Mohamed, N., El-Syed, H.: Similarity-based trust management system: data validation scheme. In: Abraham, A., Han, S.Y., Al-Sharhan, S.A., Liu, H. (eds.) Hybrid Intelligent Systems. AISC, vol. 420, pp. 141–153. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-27221-4_12
Mahler, R.P.S.: Statistical Multi Source-Multi Target Information Fusion. Artech House Inc., Norwood (2007)
Jousselme, A.L., Grenier, D., Bossé, É.: A new distance between two bodies of evidence. Inf. Fusion 2(2), 91–101 (2001)
Birant, D., Kut, A.: ST-DBSCAN: an algorithm for clustering spatial–temporal data. Data Knowl. Eng. 60(1), 208–221 (2007)
Acknowledgement
This work was partially supported by Chinese National Natural Science Foundation (U1504614) and Key Research Project of Higher Education of Henan Province (18A520052).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, J., Pan, H., Zhang, J., Zhang, Q., Zheng, Q. (2018). Detecting Bogus Messages in Vehicular Ad-Hoc Networks: An Information Fusion Approach. In: Li, J., et al. Wireless Sensor Networks. CWSN 2017. Communications in Computer and Information Science, vol 812. Springer, Singapore. https://doi.org/10.1007/978-981-10-8123-1_17
Download citation
DOI: https://doi.org/10.1007/978-981-10-8123-1_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8122-4
Online ISBN: 978-981-10-8123-1
eBook Packages: Computer ScienceComputer Science (R0)