2018
DOI: 10.1186/s13638-018-1064-y
|View full text |Cite
|
Sign up to set email alerts
|

A survey of local/cooperative-based malicious information detection techniques in VANETs

Abstract: Vehicular ad hoc networks (VANETs) are emerged technology where vehicles and roadside units (RSUs) communicate with each other. VANETs can be categorized as a subbranch of mobile ad hoc networks (MANETs). VANETs help to improve traffic efficiency and safety and provide infotainment facility as well. The dissemination of messages must be relayed through nodes in VANETs. However, it is possible that a node may propagate false information in a network due to its malicious behaviour or selfishness. False informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(37 citation statements)
references
References 91 publications
(84 reference statements)
0
37
0
Order By: Relevance
“…Moreover, this would lead to nodes unavailability, low packet delivery ratio and bogus messages in DTNs. However, the trivial mitigation algorithms in VANETs [65]- [69], Mobile Ad-hoc NETworks (MANETs) [70]- [73], Wireless Sensor Networks (WSNs) [74]- [77], TCP/IP [78]- [82] and UWSNs [83]- [86] are not applicable in DTNs, due to long delay and frequent intermittent connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, this would lead to nodes unavailability, low packet delivery ratio and bogus messages in DTNs. However, the trivial mitigation algorithms in VANETs [65]- [69], Mobile Ad-hoc NETworks (MANETs) [70]- [73], Wireless Sensor Networks (WSNs) [74]- [77], TCP/IP [78]- [82] and UWSNs [83]- [86] are not applicable in DTNs, due to long delay and frequent intermittent connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…2) Sybil Attacks: This is a well-known harmful attack in wireless vehicular networks where a vehicle pretends to have more than one identify (e.g., multiple certified key-pairs) either at the same time or in succession [64]. Sybil attackers may also launch DoS attacks, waste network bandwidth, destabilize the overall network and pose threats to safety [57], [65]. For instance, if a malicious vehicle changes its identity, it may use multiple pseudonyms to appear as a different, moving vehicle or make it appear that the road is congested (even though it is not) and send incorrect information about the road conditions to neighbouring vehicles/RSUs.…”
Section: B V2x Attack Classificationsmentioning
confidence: 99%
“…P(y = 0jX ) and P(y = 1jX ) can be calculated by equation (3). For the upstream and downstream segments, two probabilities, P up (yjX ) and P down (yjX ), can be obtained.…”
Section: Bayesian Inferencementioning
confidence: 99%
“…In the detecting process, the PDFs can be used by vehicles to calculate the conditional probability p(X jy = 0) and p(X jy = 1) using their observed density X as inputs. Furthermore, the likelihood of each traffic patterns p(yjX ) can be evaluated using equation (3). In summary, the detailed description of the proposed algorithm is given in Algorithm 1.…”
Section: Inferring the Traffic Conditionmentioning
confidence: 99%
See 1 more Smart Citation