Proceedings of the Fifth International Conference on Security of Information and Networks 2012
DOI: 10.1145/2388576.2388583
|View full text |Cite
|
Sign up to set email alerts
|

Detection of incorrect position information using speed and time span verification in VANET

Abstract: Security issues in Vehicular Ad-Hoc Networks (VANETs) are important because of its diverse implications in safety related and congestion avoidance applications. A critical security problem in VANET is injection of false data, i.e. an attacker propagates false information to disrupt the behavior of drivers. Most of VANET applications are time critical and depend on the reliable position information in the safety messages received from the neighboring nodes. Disseminating incorrect position information in the sa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Consider an example traffic scenario where the vehicles travel at a rate of 80 km/h, and the transmission range of RSU is 500 m. Then, the maximum time for which a vehicle stays in the range of an RSU is 22.50 s. 34 To determine the actual computation time required by our approach in such a scenario, we performed a series of simulation experiments with realistic traffic data. From the results of the simulation shown in Figure 9, it is evident that our approach can detect the Sybil attacker within a minimum observation time of 2 s at a 500-m transmission range.…”
Section: Computation Time Required In a Realistic Vehicular Trafficmentioning
confidence: 99%
“…Consider an example traffic scenario where the vehicles travel at a rate of 80 km/h, and the transmission range of RSU is 500 m. Then, the maximum time for which a vehicle stays in the range of an RSU is 22.50 s. 34 To determine the actual computation time required by our approach in such a scenario, we performed a series of simulation experiments with realistic traffic data. From the results of the simulation shown in Figure 9, it is evident that our approach can detect the Sybil attacker within a minimum observation time of 2 s at a 500-m transmission range.…”
Section: Computation Time Required In a Realistic Vehicular Trafficmentioning
confidence: 99%
“…In VANETs, vehicle are equipped with an OBU. The RSU is deployed on roadside to monitor network nodes' behaviour information [15] and provide Internet facility access to pasenger on wheels. The CAs distribute security-related information through RSU like public key, private key and privacy-related information in VANETs (Fig.…”
Section: Vehicular Ad Hoc Networkmentioning
confidence: 99%
“…This detection scheme minimizes overhead on other mobile vehicles in the network. For safety alerts, position verification is important, and vehicle will wait for RSU response which creates more latency [15].…”
Section: Fig 3 Malicious Information Detection Schemes In Vanetsmentioning
confidence: 99%
See 1 more Smart Citation
“…The nodes in the network may act as routers and play a key role in establishing and maintaining routes between communicating nodes. Vehicles in VANET can communicate with each other directly forming what is known as Vehicle to Vehicle (V2V) communication (Al-Sultan et al, 2014), or can communicate with Road Side Units (RSUs) forming Vehicle to Infrastructure (V2I) communication (Grover et al, 2012). The communication is established between vehicles based on the Dedicated Short Range Communication (DSRC) which utilizes the IEEE 802.11p (Gerla and Kleinrock, 2011).…”
Section: Introductionmentioning
confidence: 99%