UAV-assisted technique for the detection of malicious and selfish nodes in VANETs

被引:47
作者
Kerrache, Chaker Abdelaziz [1 ,2 ]
Lakas, Abderrahmane [3 ]
Lagraa, Nasreddine [1 ]
Barka, Ezedin [3 ]
机构
[1] Univ Laghouat, Lab Informat & Math, BP 37G,Route Ghardaia, Laghouat, Algeria
[2] Univ Ghardaia, Ghardaia, Algeria
[3] UAE Univ, CIT, Al Ain, U Arab Emirates
关键词
UAV; Trust management; VANETs; Pseudonyms changing; AD-HOC NETWORKS; INTRUSION DETECTION; VEHICULAR NETWORKS; TRUST MANAGEMENT; FRAMEWORK; ARCHITECTURE; MODEL;
D O I
10.1016/j.vehcom.2017.12.001
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative solution since it is less costly than cryptography-based solution in terms of computation delay and mobility support. However, the existing solutions assume that, in general, the attackers have always a dishonest behavior that persists over time. This assumption may be misleading, as the attackers can behave intelligently to avoid being detected. Moreover, pseudonyms changing strategies to preserve vehicles' privacy are another issue to take into account. In this paper, a new solution for the detection of intelligent malicious behaviors based on the adaptive detection threshold is proposed. In addition to the detection of malicious nodes, our solution relies on Unmanned Aerial Vehicles to face the negative impact of pseudonym changes on the detection process. Our solution also incites attackers to behave well since any malicious behavior will be immediately detected thanks to the adaptive detection threshold adopted. Simulation results depict the high efficiency of our proposal at ensuring high ratios for both detection and packet delivery. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 30 条
[1]  
[Anonymous], 2002, Proc. 4th Middle East. Model. Simulat. MultiConf. (MESM)
[2]  
[Anonymous], 2013, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics)
[3]  
[Anonymous], 27 C COMP COMM INFOC
[4]  
Behrisch L., 2011, P SIMUL 3 INT C ADV, P1
[5]  
Ding Q., 2010, Wireless Communications and Signal Processing (W C SP), 2010 International Conference on, P1, DOI DOI 10.1109/ICMULT.2010.5632149
[6]   An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks [J].
Feeney, LM .
MOBILE NETWORKS & APPLICATIONS, 2001, 6 (03) :239-249
[7]  
Fogue M., 2012, P 5 INT ICST C SIMUL, P37
[8]  
Glade D., 2000, TECH REP
[9]  
Golle P., 2004, VANET 04, P29, DOI [10.1145/1023875.1023881, DOI 10.1145/1023875.1023881]
[10]   A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks [J].
Haddadou, Nadia ;
Rachedi, Abderrezak ;
Ghamri-Doudane, Yacine .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) :3657-3674