A Reputation Management Scheme for Identifying Malicious Nodes in VANET

被引:11
作者
Gong, Changhui [1 ]
Xu, Changgiao [1 ]
Zhou, Zan [1 ]
Zhang, Tao [1 ]
Yang, Shulie [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
来源
2019 IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR) | 2019年
基金
中国国家自然科学基金;
关键词
vehicular ad-hoc network; reputation management; malicious nodes identification;
D O I
10.1109/hpsr.2019.8808102
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In vehicular ad-hoc network (VANET), vehicles exchange information on road conditions which guarantees safety. However, there exists malicious nodes which interfere the communication between vehicles. Thus, it is vital to identify malicious vehicles in VANET. Reputation-based schemes are one of the most promising schemes to identify malicious nodes in time. However, existing methods can only identify malicious nodes of a specific attack. Additionally, the efficiency and effectiveness of existing work in solving advanced attacks are unsatisfactory. In this paper, we propose a scheme to identify malicious nodes in VANET based on collaborative filtration. Distinguished from the existing solutions, we consider a variety of attacks in VANET, instead of a specific attack. In addition, our scheme updates the reputation of nodes in time according to the result of each communication, which brings better efficiency and effectiveness. The superiority of our proposed scheme has been demonstrated through simulation experiments.
引用
收藏
页数:6
相关论文
共 15 条
[1]  
Baiad R, 2014, INT WIREL COMMUN, P863, DOI 10.1109/IWCMC.2014.6906469
[2]   Reputation-based framework for high integrity sensor networks [J].
Ganeriwal, Saurabh ;
Balzano, Laura K. ;
Srivastava, Mani B. .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)
[3]  
Hussain S, 2018, 2018 IEEE INT C COMM, P1, DOI DOI 10.1109/ICC.2018.8422980
[4]  
Kerr C, 2017, PORTL INT CONF MANAG
[5]   ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks [J].
Li, Wenjia ;
Song, Houbing .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (04) :960-969
[6]  
Mitra S., 2016, 2016 INT C COMP EL C, P1
[7]  
Nema P, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, AND SYSTEMS (ICCCS), P1, DOI 10.1109/CCOMS.2015.7562842
[8]  
Nugraha MA, 2017, INT CONF ELECT ENG, P1, DOI 10.1109/ICELTICS.2017.8253251
[9]   A Trust Management System for Securing Data Plane of Ad-Hoc Networks [J].
Tan, Shuaishuai ;
Li, Xiaoping ;
Dong, Qingkuan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (09) :7579-7592
[10]  
Tangade S, 2017, PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), P741, DOI 10.1109/SmartTechCon.2017.8358469