A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior

被引:8
|
作者
Alkhalidy, Muhsen [1 ]
Al-Serhan, Atalla Fahed [2 ]
Alsarhan, Ayoub [3 ]
Igried, Bashar [1 ]
机构
[1] Hashemite Univ, Fac Prince Hussein Bin Abdallah Informat Techn 2, Dept Comp Sci & Applicat, Zarqa 13133, Jordan
[2] Al Bayt Univ, Dept Business Adm, Al Mafraq 25113, Jordan
[3] Hashemite Univ, Fac Prince Al Hussein Bin Abdallah Informat Tec 2, Dept Informat Technol, Zarqa 13133, Jordan
来源
FUTURE INTERNET | 2022年 / 14卷 / 08期
关键词
vehicular ad hoc networks; road safety; fuzzy logic; AUTHENTICATION;
D O I
10.3390/fi14080223
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may inject false emergency alerts into vehicular ad hoc networks, preventing nodes from accessing accurate road information. In order to assure the reliability and trustworthiness of information through the networks, assessing the credibility of nodes has become a critical task in vehicular ad hoc networks. A new scheme for malicious node detection is proposed in this work. Multiple factors are fed into a fuzzy logic model for evaluating the trust for each node. Vehicles are divided into clusters in our approach, and a road side unit manages each cluster. The road side unit assesses the credibility of nodes before accessing vehicular ad hoc networks. The road side unit evicts a malicious node based on trust value. Simulations are used to validate our technique. We demonstrate that our scheme can detect and evict all malicious nodes in the vehicular ad hoc network over time, lowering the ratio of malicious nodes. Furthermore, it has a positive impact on selfish node participation. The scheme increases the success rate of delivered data to the same level as the ideal cases when no selfish node is present.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] A QoS Based Adaptive Backoff Scheme for Vehicular Ad Hoc Networks
    Zhang, Tianjiao
    Zhu, Qi
    SENSORS, 2018, 18 (12)
  • [32] A lightweight authentication scheme for vehicular ad hoc networks based on MSR
    Yang, Xu
    Yi, Xun
    Khalil, Ibrahim
    Zeng, Yali
    Huang, Xinyi
    Nepal, Surya
    Yang, Xuechao
    Cui, Hui
    VEHICULAR COMMUNICATIONS, 2019, 15 : 16 - 27
  • [33] Group signature scheme for vehicular Ad Hoc networks based on blockchain
    Wu Y.-L.
    Zhu Z.-Q.
    Huang M.-B.
    Zhao X.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (05): : 1161 - 1167
  • [34] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [35] A Universal Geocast Scheme for Vehicular Ad Hoc Networks
    Nekoui, Mohammad
    Pishro-Nik, Hossein
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 792 - 796
  • [36] An improved EAAP scheme for vehicular ad hoc networks
    Gu, Tianlong
    Yuan, Bin
    Liu, Yining
    Wang, Peng
    Li, Long
    Chang, Liang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (06)
  • [37] QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks
    Fatemidokht, Hamideh
    Rafsanjani, Marjan Kuchaki
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 165
  • [38] QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks
    Fatemidokht, Hamideh
    Kuchaki Rafsanjani, Marjan
    Journal of Systems and Software, 2020, 165
  • [39] DSVL: Detecting Selfish Node In Vehicular Ad-hoc Networks (VANET) by Learning Automata
    Nobahari, Ainaz
    Mirabedini, Seyed Javad
    AD HOC & SENSOR WIRELESS NETWORKS, 2022, 53 (1-2) : 1 - 27
  • [40] An Approach towards Identification of Malicious Nodes in Mobile Ad Hoc Networks
    Thakurta, Parag Kumar Guha
    Sett, Sujoy
    2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 1016 - 1019