A distributed detection and prevention scheme from malicious nodes in vehicular networks

被引:28
|
作者
Bouali, Tarek [1 ]
Senouci, Sidi-Mohammed [1 ]
Sedjelmaci, Hichem [1 ]
机构
[1] Univ Bourgogne Franche Comte, DRIVE EA1859, F-58000 Nevers, France
关键词
VANET; routing; prediction; security; Kalman filter; EFFICIENT; VERIFICATION;
D O I
10.1002/dac.3106
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able to predict vehicles behavior. This mechanism is based on a Kalman filter to predict the future vehicles' behavior and classify them into three categories (white, gray, and black) based on their expected trustworthiness. The main concerns of this work are to prevent from various attacks, namely, DoS, false alert, and Sybil, and deal with oscillating vehicles. Therefore, IPDS treats these latter in a different way where they are introduced into a gray list and used for routing purposes until they persist in their attacks. Simulations performed using ns3 simulator highlight IPDS accuracy regarding the detection rate of malicious nodes and its good impact on the network applications performances. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1683 / 1704
页数:22
相关论文
共 50 条
  • [1] A Distributed Prevention Scheme from Malicious Nodes in VANETs' Routing Protocols
    Bouali, Tarek
    Sedjelmaci, Hichem
    Senouci, Sidi-Mohammed
    [J]. 2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [2] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [3] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [4] A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
    Alkhalidy, Muhsen
    Al-Serhan, Atalla Fahed
    Alsarhan, Ayoub
    Igried, Bashar
    [J]. FUTURE INTERNET, 2022, 14 (08):
  • [5] Blockchain scheme for anti malicious nodes in distributed machine learning
    Liu, Yuanzhen
    Yang, Yanbo
    Zhang, Jiawei
    Li, Baoshan
    Ma, Jianfeng
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 178 - 187
  • [6] On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks
    Liu, Guandong
    Fan, Na
    Wu, Chase Q.
    Zou, Xiaomin
    [J]. SENSORS, 2022, 22 (14)
  • [7] Removing Malicious Nodes from Networks
    Yu, Sixie
    Vorobeychik, Yevgeniy
    [J]. AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 314 - 322
  • [8] Prevention of Malicious Nodes Using Genetic Algorithm in Vehicular Ad Hoc Network
    Khurana, Chetna
    Yadav, Pradeep
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 700 - 705
  • [9] Detection and Prevention From Misbehaving Intruders in Vehicular Networks
    Sedjelmaci, Hichem
    Bouali, Tarek
    Senouci, Sidi Mohammed
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 39 - 44
  • [10] A Novel Detection Scheme for Malicious Nodes in Smart Meter System
    Wen, Hong
    Zhang, Xiaochun
    Cai, Lei
    Tang, Jie
    Zhu, Xiping
    Jiang, Yixin
    Guo, Xiaobin
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 379 - +