2013
DOI: 10.1109/tvt.2012.2236117
|View full text |Cite
|
Sign up to set email alerts
|

Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols

Abstract: Vehicular networks (VANETs) are a growing research area with a large number of use cases. Foreseen applications include safety applications, traffic efficiency enhancements, and infotainment services. To make future deployment successful, it is imperative that all applications are matched with proper security mechanisms. Current proposals mostly focus on entity authorization by establishing a public key infrastructure. Such proactive security efficiently excludes nonauthorized entities from the network. Howeve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(34 citation statements)
references
References 28 publications
0
34
0
Order By: Relevance
“…11,59 Under this approach, trust is ensured on the information itself rather than on the information source. 64 Data consistency verification mechanisms could take advantage of three main sources: 12,61 physical models, to compare claimed information against known models such as the physical behavior of vehicles; local sensors, to verify information received from vehicles in direct vicinity; and redundancy, to exploit the fact that messages are often delivered via multiple routes and observed by multiple vehicles.…”
Section: Limitations Of the Entity-centric Security Approachmentioning
confidence: 99%
“…11,59 Under this approach, trust is ensured on the information itself rather than on the information source. 64 Data consistency verification mechanisms could take advantage of three main sources: 12,61 physical models, to compare claimed information against known models such as the physical behavior of vehicles; local sensors, to verify information received from vehicles in direct vicinity; and redundancy, to exploit the fact that messages are often delivered via multiple routes and observed by multiple vehicles.…”
Section: Limitations Of the Entity-centric Security Approachmentioning
confidence: 99%
“…However, there is not much exploration on the internal attacks in HWMNs, particularly on the security and privacy protection based routing protocol for HWMNs. We focus on two most common internal attacks that are launched by an adversary appearing to be a legitimate participant in the network [16]:…”
Section: Adversary Modelmentioning
confidence: 99%
“…In [33], a data-centric approach for detecting insider attacks using graph-based metric in VANETs is proposed. As it was a data -centric approach, the correctness of the received data is verified by checking the data consistency from sender to receiver.…”
Section: Intrusion Detection Mechanismsmentioning
confidence: 99%
“…After the completion of clusteringTime, the cluster-head announce its ID within the cluster (lines [31][32][33][34][35]. The leader nodes also announce themselves as leaders to other cluster members and update their cluster-head ID (CID) to the ID of the new cluster-head (lines 38 to 45).…”
Section: Leadership Formationmentioning
confidence: 99%