A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior

被引:8
|
作者
Alkhalidy, Muhsen [1 ]
Al-Serhan, Atalla Fahed [2 ]
Alsarhan, Ayoub [3 ]
Igried, Bashar [1 ]
机构
[1] Hashemite Univ, Fac Prince Hussein Bin Abdallah Informat Techn 2, Dept Comp Sci & Applicat, Zarqa 13133, Jordan
[2] Al Bayt Univ, Dept Business Adm, Al Mafraq 25113, Jordan
[3] Hashemite Univ, Fac Prince Al Hussein Bin Abdallah Informat Tec 2, Dept Informat Technol, Zarqa 13133, Jordan
来源
FUTURE INTERNET | 2022年 / 14卷 / 08期
关键词
vehicular ad hoc networks; road safety; fuzzy logic; AUTHENTICATION;
D O I
10.3390/fi14080223
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may inject false emergency alerts into vehicular ad hoc networks, preventing nodes from accessing accurate road information. In order to assure the reliability and trustworthiness of information through the networks, assessing the credibility of nodes has become a critical task in vehicular ad hoc networks. A new scheme for malicious node detection is proposed in this work. Multiple factors are fed into a fuzzy logic model for evaluating the trust for each node. Vehicles are divided into clusters in our approach, and a road side unit manages each cluster. The road side unit assesses the credibility of nodes before accessing vehicular ad hoc networks. The road side unit evicts a malicious node based on trust value. Simulations are used to validate our technique. We demonstrate that our scheme can detect and evict all malicious nodes in the vehicular ad hoc network over time, lowering the ratio of malicious nodes. Furthermore, it has a positive impact on selfish node participation. The scheme increases the success rate of delivered data to the same level as the ideal cases when no selfish node is present.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Detecting Greedy Behavior By Linear Regression And Watchdog In Vehicular Ad Hoc Networks
    Mejri, Mohamed Nidhal
    Ben-Othman, Jalel
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 5032 - 5037
  • [22] Prevention of Malicious Nodes Using Genetic Algorithm in Vehicular Ad Hoc Network
    Khurana, Chetna
    Yadav, Pradeep
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 700 - 705
  • [23] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [24] Crosscheck mechanism to identify malicious nodes in ad hoc networks
    Su, Xu
    Boppana, Rajendra V.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) : 45 - 54
  • [25] Using reputations in ad hoc networks to counter malicious nodes
    Dewan, P
    Dasgupta, P
    Bhattacharya, A
    TENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 665 - 672
  • [26] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [27] Detecting Sybil attacks in vehicular ad hoc networks
    Hamdan S.
    Hudaib A.
    Awajan A.
    International Journal of Parallel, Emergent and Distributed Systems, 2021, 36 (02) : 69 - 79
  • [28] Detecting node misbehavior in ad hoc networks
    Refaei, M. Tamer
    Rong, Yanxia
    DaSilva, Luiz A.
    Choi, Hyeong-Ah
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3425 - +
  • [29] Flag-Based Vehicular Clustering Scheme for Vehicular Ad-Hoc Networks
    Samann, Fady
    Askar, Shavan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (03): : 2715 - 2734
  • [30] A reputation-based secure scheme in vehicular ad hoc networks
    Li, Xiaoqing
    Liu, Jicheng
    Li, Xuejun
    Li, Hui
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 83 - 90