2022
DOI: 10.1007/s11277-022-10098-1
|View full text |Cite
|
Sign up to set email alerts
|

A Classification of Misbehavior Detection Schemes for VANETs: A Survey

Abstract: In today's era, thinking of Vehicular Ad-hoc Network (VANET) as a midrib for the leaf of academic, social, corporate, and economic activities will not be erroneous. To avoid any panic situations like road accidents, heavy tra c jams, etc., the timely availability of correct information is compulsory. The presence of malicious nodes within the network will ruin the dream of establishing a safe, secure, and accident-free vehicular network. This objective can be ful lled only when malicious nodes within the netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 43 publications
(30 reference statements)
0
5
0
Order By: Relevance
“…[18] describes the creation of an attention-based temporal Graph Convolutional Network (GCN) method that makes use of temporal features to locate anomalous graph edges within dynamic graphs. Deep auto-encoders and clustering methods were used on network's nodes in conjunction with another dynamic graph anomaly detection method that was developed in [19]. GNNbased anomaly detection strategy was proposed in [20].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…[18] describes the creation of an attention-based temporal Graph Convolutional Network (GCN) method that makes use of temporal features to locate anomalous graph edges within dynamic graphs. Deep auto-encoders and clustering methods were used on network's nodes in conjunction with another dynamic graph anomaly detection method that was developed in [19]. GNNbased anomaly detection strategy was proposed in [20].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Using the equation v = (v1, v2, etc., vm), where h is equal to (h1, h2, hn) visible variables V are configured as follows: Vm) and the hidden variables H = (H1, H2, Hn), with (v, h) equal to 0 and 1 in m+n, and vi and hj being binary states of first visible variable Vi as well as second hidden variable Hj, eq. (19).…”
Section: Breach Detection Using Ensemble Adversarial Boltzmann Convol...mentioning
confidence: 99%
“…The primary disadvantage of cryptographic solutions is this. A robust method for detecting malicious vehicles for the Post Crash Notification application has been proposed in the study [10]. They have thought about the possibility of a false crash alert in [11] and fake vehicle position data in PCN.…”
Section: Related Workmentioning
confidence: 99%
“…(weight update). Learning rule utilized to get value for updating weights at every increment is shown in equation (10):…”
Section: Ciphertext-policy Game Theory Encryption Analysis For Smart ...mentioning
confidence: 99%
“…Sangwan et al [10] reviewed and categorized various misbehavior assaults in VANETs systems based on architecture, method, node-centricity, and data-centricity. It also discussed the significance of ML methods in the context of misbehavior detection.…”
Section: Literature Reviewmentioning
confidence: 99%