A survey of local/cooperative-based malicious information detection techniques in VANETs

被引:46
作者
Arshad, Muhammad [1 ]
Ullah, Zahid [1 ]
Ahmad, Naveed [2 ]
Khalid, Muhammad [3 ]
Criuckshank, Haithiam [4 ]
Cao, Yue [3 ]
机构
[1] Inst Management Sci, Dept Comp Sci, Peshawar, Pakistan
[2] Univ Peshawar, Dept Comp Sci, Peshawar, Pakistan
[3] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[4] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
关键词
VANETs; MANETs; Misbehaviour; False message detection; Security; TRUST MANAGEMENT; INTRUSION DETECTION; SECURITY; PROTOCOL; AUTHENTICATION; SCHEME; VERIFICATION; MISBEHAVIOR; CHALLENGES; EFFICIENT;
D O I
10.1186/s13638-018-1064-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular ad hoc networks (VANETs) are emerged technology where vehicles and roadside units (RSUs) communicate with each other. VANETs can be categorized as a subbranch of mobile ad hoc networks (MANETs). VANETs help to improve traffic efficiency and safety and provide infotainment facility as well. The dissemination of messages must be relayed through nodes in VANETs. However, it is possible that a node may propagate false information in a network due to its malicious behaviour or selfishness. False information in VANETs can change drivers' behaviour and create disastrous consequences in the network. Therefore, sometimes false safety messages may endanger human life. To avoid any lass, it is more important to detect and avoid false messages. This paper has explained some important algorithms that can detect false messages in VANETs. The categorization of false message detection schemes based on local and cooperative behaviour has been presented in this article. The limitations and consequences of existing schemes as well as future work has been discussed.
引用
收藏
页数:17
相关论文
共 104 条
  • [1] Abdulkader ZA., 2017, MODERN APPL SCI, V11, P1, DOI [10.5539/mas.v11n5p30, DOI 10.5539/MAS.V11N5P30]
  • [2] Ahmad N, 2011, ANN CONF PRIV SECUR, P1, DOI 10.1109/PST.2011.5971956
  • [3] Ahmed SA., 2016, World Bank: Policy Research Working Paper, WPS7893, P1, DOI [10.1596/1813-9450-7893, DOI 10.1596/1813-9450-7893]
  • [4] Similarity-Based Trust Management System: Data Validation Scheme
    Al Falasi, Hind
    Mohamed, Nader
    El-Syed, Hesham
    [J]. HYBRID INTELLIGENT SYSTEMS, HIS 2015, 2016, 420 : 141 - 153
  • [5] A comprehensive survey on vehicular Ad Hoc network
    Al-Sultan, Saif
    Al-Doori, Moath M.
    Al-Bayatti, Ali H.
    Zedan, Hussien
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 : 380 - 392
  • [6] Altayeb Marwa, 2013, International Journal of Innovation and Applied Studies, V3, P829
  • [7] [Anonymous], 2017, ADV MOBILE CLOUD COM
  • [8] [Anonymous], IEEE T INTELL TRANSP
  • [9] [Anonymous], AS PAC WEB C
  • [10] [Anonymous], IEEE COMMUN SURV TUT