A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior

被引:8
|
作者
Alkhalidy, Muhsen [1 ]
Al-Serhan, Atalla Fahed [2 ]
Alsarhan, Ayoub [3 ]
Igried, Bashar [1 ]
机构
[1] Hashemite Univ, Fac Prince Hussein Bin Abdallah Informat Techn 2, Dept Comp Sci & Applicat, Zarqa 13133, Jordan
[2] Al Bayt Univ, Dept Business Adm, Al Mafraq 25113, Jordan
[3] Hashemite Univ, Fac Prince Al Hussein Bin Abdallah Informat Tec 2, Dept Informat Technol, Zarqa 13133, Jordan
来源
FUTURE INTERNET | 2022年 / 14卷 / 08期
关键词
vehicular ad hoc networks; road safety; fuzzy logic; AUTHENTICATION;
D O I
10.3390/fi14080223
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may inject false emergency alerts into vehicular ad hoc networks, preventing nodes from accessing accurate road information. In order to assure the reliability and trustworthiness of information through the networks, assessing the credibility of nodes has become a critical task in vehicular ad hoc networks. A new scheme for malicious node detection is proposed in this work. Multiple factors are fed into a fuzzy logic model for evaluating the trust for each node. Vehicles are divided into clusters in our approach, and a road side unit manages each cluster. The road side unit assesses the credibility of nodes before accessing vehicular ad hoc networks. The road side unit evicts a malicious node based on trust value. Simulations are used to validate our technique. We demonstrate that our scheme can detect and evict all malicious nodes in the vehicular ad hoc network over time, lowering the ratio of malicious nodes. Furthermore, it has a positive impact on selfish node participation. The scheme increases the success rate of delivered data to the same level as the ideal cases when no selfish node is present.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] An efficient scheme for detecting malicious nodes in mobile ad hoc networks
    Choi, Jongoh
    Cha, Si-Ho
    Song, JooSeok
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
  • [2] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [3] On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks
    Liu, Guandong
    Fan, Na
    Wu, Chase Q.
    Zou, Xiaomin
    SENSORS, 2022, 22 (14)
  • [4] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [5] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
  • [6] Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly
    Byeon, Haewon
    Seno, Mohammed E.
    Srivastava, Ajeet Kumar
    Alghamdi, Azzah
    Keshta, Ismail
    Soni, Mukesh
    Prasad, K. D. V.
    Abdurakhimova, Dilora
    Bhatt, Mohammed Wasim
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (04):
  • [7] Security scheme for malicious node detection in mobile ad hoc networks
    Rathod, P
    Mody, N
    Gada, D
    Gogri, R
    Dedhia, Z
    Sanyal, S
    Abraham, A
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542
  • [8] A Novel Fuzzy Logic-Based Scheme for Malicious Node Eviction in a Vehicular Ad Hoc Network
    Igried, Bashar
    Alsarhan, Ayoub
    Al-Khawaldeh, Igried
    AL-Qerem, Ahmad
    Aldweesh, Amjad
    ELECTRONICS, 2022, 11 (17)
  • [9] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
    Singh, Yuvraj
    Jena, Sanjay Kumar
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419
  • [10] Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes
    E. Yu. Pavlenko
    M. A. Pakhomov
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1318 - 1325