2010
DOI: 10.1007/978-3-642-12963-6_31
|View full text |Cite
|
Sign up to set email alerts
|

Application of Secondary Information for Misbehavior Detection in VANETs

Abstract: Safety applications designed for Vehicular Ad Hoc Networks (VANETs) can be compromised by participating vehicles transmitting false or inaccurate information. Design of mechanisms that detect such misbehaving nodes is an important problem in VANETs. In this paper, we investigate the use of correlated information, called "secondary alerts", generated in response to another alert, called as the "primary alert" to verify the truth or falsity of the primary alert received by a vehicle. We first propose a framework… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…The main drawback of these schemes are when malicious nodes increase than honest nodes which creates a false result [3]. In VANETs, low density of vehicles also decreases the performance of cooperative detection schemes [9, 65,68] as shown in Table 2.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The main drawback of these schemes are when malicious nodes increase than honest nodes which creates a false result [3]. In VANETs, low density of vehicles also decreases the performance of cooperative detection schemes [9, 65,68] as shown in Table 2.…”
Section: Discussionmentioning
confidence: 99%
“…The degree of belief which is 0 shows a false event; however, the performance of this scheme degraded due to high speed. The minimum density of nodes also effect truism of the scheme [68].…”
Section: • Secondary Information Based Detection (Sibd)mentioning
confidence: 99%
“…Thus, this provides scope for better observations and decision making. Decision Parameter, D P is calculated for all the nodes considered for verifier selection by taking into account the load, distance and distrust value of the node by the following equation (2).…”
Section: Area (V N ) = T R (V N ) P L (Smx -Smn )mentioning
confidence: 99%
“…Vulimiri et al [5] have advised a probabilistic wrongdoing detection approach that is depend on the secondary data. These alerts square measure build correspondence to primary alerts.…”
Section: Daeinabi A[2] the Detection Of Malicious Vehicles (Dmv)mentioning
confidence: 99%
“…Of attacks like part, timing, illusion, DOS [10], Sybil that not solely influences the vehicles and deriver's privacy however additionally affects the traffic safety [1][13]. In some cases, it's going to ends up in loss of life to confirm the traffic safety the VANET wants some appropriate security techniques that may assure protection across distinct misbehaviours and malicious nodes that influence the protection of the VANET [5] [7].…”
Section: Introductionmentioning
confidence: 99%