Skip to main content

Detecting Bogus Messages in Vehicular Ad-Hoc Networks: An Information Fusion Approach

  • Conference paper
  • First Online:
Wireless Sensor Networks (CWSN 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 812))

Included in the following conference series:

Abstract

In Vehicular ad hoc networks (VANETs), vehicles are allowed to broadcast messages for informing nearby vehicles about road condition and emergent events, such as traffic congestion or accident. It leaves a backdoor in which inside attackers can launch false information attacks by injecting bogus emergency messages to mislead other vehicles, and potential threats on road safety can be caused. This paper presents a multi-source information fusion approach to detect bogus emergency messages, in which each vehicle uses its on-board sensor data and received beacon messages to perceive the traffic condition and calculates its belief on credibility for received emergency messages. Moreover, the proposed approach provides enhanced robustness against collusion attacks by integrating an outlier detection mechanism in which a clustering algorithm is performed to filter out the colluder whose behavior deviates largely from others. The simulation results show validity of our approach, higher significantly detection rate can be achieved comparing to the existing threshold based scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hartenstein, H.: VANET: Vehicular Applications and Inter-Networking Technologies. Wiley, Chichester (2010)

    Book  Google Scholar 

  2. De Fabritiis, C., Ragona, R., Valenti, G.: Traffic estimation and prediction based on real time floating car data. In: Proceedings of the 11th International IEEE Conference on IEEE Intelligent Transportation Systems, pp. 197–203 (2008)

    Google Scholar 

  3. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw. 15(1), 39–68 (2007)

    Google Scholar 

  4. IEEE Std. 1609.2-2013: IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages, April 2013. http://standards.ieee.org/ndstds/standard/1609.2-2013.html

  5. Thajchayapong, S., Garcia-Trevino, E.S., Barria, J.A.: Distributed classification of traffic anomalies using microscopic traffic variables. IEEE Trans. Intell. Transp. Syst. 14(1), 448–458 (2013)

    Article  Google Scholar 

  6. Pan, T.L., Sumalee, A., Zhong, R.X.: Short-term traffic state prediction based on temporal-spatial correlation. IEEE Trans. Intell. Transp. Syst. 14(3), 1242–1254 (2013)

    Article  Google Scholar 

  7. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29–37. ACM (2004)

    Google Scholar 

  8. Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Netw. 8(7), 778–790 (2010)

    Article  Google Scholar 

  9. Abumansoor, O., Boukerche, A.: Towards a secure trust model for vehicular ad hoc networks services. In: Proceedings of the Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5. IEEE (2011)

    Google Scholar 

  10. Wu, Q., Domingo-Ferrer, J., Gonzalez-Nicolas, U.: Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans. Veh. Technol. 59(2), 559–573 (2010)

    Article  Google Scholar 

  11. Raya, M., Papadimitratos, P., Aad, I., Jungels, D.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007)

    Article  Google Scholar 

  12. Chen, L., Ng, S.L., Wang, G.: Threshold anonymous announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3), 605–615 (2011)

    Article  Google Scholar 

  13. Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: Proceedings of the 2011 IEEE Vehicular Technology Conference, pp. 1–5. IEEE (2011)

    Google Scholar 

  14. Wu, A., Ma, J., Zhang, S.: RATE: a RSU-aided scheme for data-centric trust establishment in VANETs. In: Proceedings of the 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1–6. IEEE (2011)

    Google Scholar 

  15. Li, Q., Malip, A., Martin, K.M., Siaw, N.G., Zhang, J.: A reputation-based announcement scheme for VANETs. IEEE Trans. Veh. Technol. 61(9), 4095–4108 (2012)

    Article  Google Scholar 

  16. Dhurandher, S.K., Obaidat, M.S., Jaiswal, A., Tiwari, A., Tyagi, A.: Vehicular security through reputation and plausibility checks. IEEE Syst. J. 8(2), 384–394 (2014)

    Article  Google Scholar 

  17. Sedjelmaci, H., Senouci, S.M.: A new intrusion detection framework for vehicular networks. In: Proceedings of the 2014 IEEE International Conference on Communications (ICC), pp. 538–543. IEEE (2014)

    Google Scholar 

  18. Dietzel, S., Gürtler, J., Heijden, R.V.D., et al.: Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes. In: Vehicular Networking Conference, pp. 135–142. IEEE (2014)

    Google Scholar 

  19. Wang, J., Zhang, Y., Wang, Y., et al.: RPRep: a robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. Int. J. Distrib. Sens. Netw. 12(3), 1–15 (2016)

    Google Scholar 

  20. Al Falasi, H., Mohamed, N., El-Syed, H.: Similarity-based trust management system: data validation scheme. In: Abraham, A., Han, S.Y., Al-Sharhan, S.A., Liu, H. (eds.) Hybrid Intelligent Systems. AISC, vol. 420, pp. 141–153. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-27221-4_12

    Chapter  Google Scholar 

  21. Mahler, R.P.S.: Statistical Multi Source-Multi Target Information Fusion. Artech House Inc., Norwood (2007)

    Google Scholar 

  22. Jousselme, A.L., Grenier, D., Bossé, É.: A new distance between two bodies of evidence. Inf. Fusion 2(2), 91–101 (2001)

    Article  Google Scholar 

  23. Birant, D., Kut, A.: ST-DBSCAN: an algorithm for clustering spatial–temporal data. Data Knowl. Eng. 60(1), 208–221 (2007)

    Article  Google Scholar 

Download references

Acknowledgement

This work was partially supported by Chinese National Natural Science Foundation (U1504614) and Key Research Project of Higher Education of Henan Province (18A520052).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jizhao Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Pan, H., Zhang, J., Zhang, Q., Zheng, Q. (2018). Detecting Bogus Messages in Vehicular Ad-Hoc Networks: An Information Fusion Approach. In: Li, J., et al. Wireless Sensor Networks. CWSN 2017. Communications in Computer and Information Science, vol 812. Springer, Singapore. https://doi.org/10.1007/978-981-10-8123-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8123-1_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8122-4

  • Online ISBN: 978-981-10-8123-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics