Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks 2004
DOI: 10.1145/1023875.1023881
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and correcting malicious data in VANETs

Abstract: In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data traffic. At the same time, the easy access to information afforded by VANETs potentially enables the difficult security goal of data validation. We propose a general approach to evaluating the validity of VANET data. In our approach a node searches for possible explanations for the data it has collected based on the fact that malicious… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
272
0
2

Year Published

2008
2008
2017
2017

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 423 publications
(274 citation statements)
references
References 10 publications
(14 reference statements)
0
272
0
2
Order By: Relevance
“…So, both models complete each other. Golle et al (2004) also verify the data, this time based on a model of the network.…”
Section: Related Workmentioning
confidence: 83%
See 1 more Smart Citation
“…So, both models complete each other. Golle et al (2004) also verify the data, this time based on a model of the network.…”
Section: Related Workmentioning
confidence: 83%
“…It is a mechanism to evaluate the sender over several interactions. Models for the second step (that is, evaluate the data with regard to the current situation) are introduced, e.g., in Golle et al (2004) and Raya et al (2008).…”
Section: The Problem Statementmentioning
confidence: 99%
“…In the case of ITS, vehicles shall own a lot of short-lifetime certificates in order to satisfy nonanonymous and end-user anonymity. In [8], it is supported that the pseudonyms are updated every minute and that 43,800 pseudonyms is used each year under the assumption that an average driving time is two hours per day. If it is deployed, the distributing size of certificates is large.…”
Section: Copyright Cmentioning
confidence: 99%
“…If a session key as the common key with authenticity of the owners is exchanged, a public key encryption must be used. The public key certificates are used in the public key encryptionbased communications [8], [9]. As the authors of [10] say, the most challenging part of cryptographic algorithms or applications in vehicular network is key management and the Vehicular Public Key Infrastructure (VPKI) is one of the most important schemes to provide key management among vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…Several techniques have been developed to detect misbehaving or fake nodes in VANETs. Gole et al [7] represented an adversial parsimony that means finding the explanation for corrupted data. Vehicles can distinguish their neighbors by using cameras or exchanging messages in infrared light spectrum.…”
Section: Introductionmentioning
confidence: 99%