On a security scheme against collusive attacks in vehicular ad hoc networks

被引:0
|
作者
Fan, Na [1 ]
Wu, Chase [2 ]
Benabdallah, Slimane [1 ]
Li, Jialong [1 ]
Gao, Yuxin [1 ]
Wang, Qinglong [1 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian 710064, Shaanxi, Peoples R China
[2] New Jersey Inst Technol, Dept Data Sci, Newark, NJ 07102 USA
关键词
Vehicular networks; Security scheme; Collusive attacks; Incentive model;
D O I
10.1016/j.vehcom.2024.100821
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Vehicular Ad Hoc Networks (VANETs) offer a promising solution to bring drivers comfortable driving experiences and also improve road safety in intelligent transportation systems, but also faces many security issues. Collusive attack is one of the most challenging threats in VANETs because it violates the fundamental assumption made by VANET-based applications that all received information be correct and trustworthy. Collusive attackers can not only generate and send false or forged messages, but also purposely manipulate the reputation value of normal or malicious vehicular nodes. To address these issues, we analyze the behaviors characteristics of collusive attacks and propose a generic, lightweight, and fully distributed detection scheme against collusive attacks in VANETs. This scheme integrates two methods to identify different collusive attacks for fraud reputation and fraud message, respectively, as well as an incentive method to restrain collusive nodes. Simulation-based experiments are conducted and the results illustrate the superiority of the proposed security scheme over state -of -the -art methods.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Security attacks and solutions for vehicular ad hoc networks
    Isaac, J. T.
    Zeadally, S.
    Camara, J. S.
    IET COMMUNICATIONS, 2010, 4 (07) : 894 - 903
  • [2] Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs)
    Al-kahtani, Mohammed Saeed
    6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
  • [3] A SIMPLE AND EFFICIENT SECURITY SCHEME FOR VEHICULAR AD HOC NETWORKS
    Wang, Jian
    Jiang, Nan
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 591 - +
  • [4] Certificateless aggregate signcryption scheme against forgery attacks for vehicular ad-hoc networks
    Pan S.
    Wang S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 169 - 177
  • [5] Security in vehicular ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 88 - 95
  • [6] A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks
    Mary Anita, E.A.
    Lakshmi, S.
    Jenefa, J.
    International Journal of Wireless and Mobile Computing, 2021, 21 (01) : 59 - 65
  • [7] Security Mechanism against Flood Attacks in Ad Hoc Networks
    Wang, Xi-Jie
    Hu, Shun-Yi
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5902 - 5905
  • [8] A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)
    Sheikh, Muhammad Sameer
    Liang, Jun
    Wang, Wensong
    SENSORS, 2019, 19 (16)
  • [9] Security Threats in Vehicular Ad Hoc Networks
    Al Hasani, Ahmed Shoeb
    Hossain, Md. Shohrab
    Atiquzzaman, Mohammed
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 404 - 411
  • [10] Security methods against Black Hole attacks in Vehicular Ad-Hoc Network
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,