A Credibility Score Algorithm for Malicious Data Detection in Urban Vehicular Networks
Abstract
:1. Introduction
2. Related Works and Contribution
3. Proposed Method
3.1. Predicting Vehicle Position with Use of Cell Interval Traffic Model
3.2. Evaluation of Credibility Scores
Algorithm 1. Evaluation of credibility scores. |
Input:, |
Output: updated |
|
Algorithm 2. Detection of intersecting time-space trajectories. |
|
4. Experiments
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Bermad, N.; Zemmoudj, S.; Omar, M. Context-aware negotiation, reputation and priority traffic light management protocols for VANET-based smart cities. Telecommun. Syst. 2019, 72, 131–153. [Google Scholar] [CrossRef]
- Płaczek, B. A self-organizing system for urban traffic control based on predictive interval microscopic model. Eng. Appl. Artif. Intell. 2014, 34, 75–84. [Google Scholar] [CrossRef] [Green Version]
- Płaczek, B.; Bernas, M. Detection of malicious data in vehicular ad hoc networks for traffic signal control applications. In International Conference on Computer Networks; Springer: Cham, Switzerland, 2016; pp. 72–82. [Google Scholar]
- Gu, K.; Dong, X.; Jia, W. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-based VANETs. IEEE Trans. Cloud Comput. 2020. [Google Scholar] [CrossRef]
- Rezgui, J.; Doucet, C. Detection of malicious vehicles with demerit and reward level system. In Proceedings of the 2017 International Symposium on Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 16–18 May 2017; pp. 1–6. [Google Scholar]
- Yang, Y.; Ou, D.; Xue, L.; Dong, D. Infrastructure-based Detection Scheme of Malicious Vehicles for Urban Vehicular Network (No. 17-05475). In Proceedings of the Transportation Research Board 96th Annual Meeting, Washington, DC, USA, 8–12 January 2017. [Google Scholar]
- Arshad, M.; Ullah, Z.; Ahmad, N.; Khalid, M.; Criuckshank, H.; Cao, Y. A survey of local/cooperative-based malicious information detection techniques in VANETs. Eurasip J. Wirel. Commun. Netw. 2018, 2018, 62. [Google Scholar] [CrossRef]
- Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
- Ghosh, M.; Varghese, A.; Gupta, A.; Kherani, A.A.; Muthaiah, S.N. Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Netw. 2010, 8, 778–790. [Google Scholar] [CrossRef]
- Vulimiri, A.; Gupta, A.; Roy, P.; Muthaiah, S.N.; Kherani, A.A. Application of secondary information for misbehavior detection in VANETs. In International Conference on Research in Networking; Springer: Berlin/Heidelberg, Germany, 2010; pp. 385–396. [Google Scholar]
- Sun, M.; Li, M.; Gerdes, R. A data trust framework for VANETs enabling false data detection and secure vehicle tracking. In Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017; pp. 1–9. [Google Scholar]
- Arshad, M.; Ullah, Z.; Khalid, M.; Ahmad, N.; Khalid, W.; Shahwar, D.; Cao, Y. Beacon trust management system and fake data detection in vehicular ad-hoc networks. IET Intell. Transp. Syst. 2018, 13, 780–788. [Google Scholar] [CrossRef]
- Lim, K.; Tuladhar, K.M.; Kim, H. Detecting location spoofing using ADAS sensors in VANETs. In Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–4. [Google Scholar]
- Azuma, S.; Tsukada, M.; Nomura, T.; Sato, K. A Method of Detecting Camouflage Data with Mutual Vehicle Position Monitoring. In Proceedings of the Sixth International Conference on Advancesin Vehicular Systems, Technologies and Applications (VEHICULAR 2017), Nice, France, 6–9 June 2017. [Google Scholar]
- Van der Heijden, R.; Dietzel, S.; Kargl, F. Misbehavior detection in vehicular ad-hoc networks. In Proceedings of the 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013), Tyrol, Austria, 21–22 February 2013. [Google Scholar]
- Ghaleb, F.A.; Maarof, M.A.; Zainal, A.; Rassam, M.A.; Saeed, F.; Alsaedi, M. Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages. Veh. Commun. 2019, 20, 100186. [Google Scholar] [CrossRef] [Green Version]
- Ranaweera, M.; Seneviratne, A.; Rey, D.; Saberi, M.; Dixit, V.V. Anomalous data detection in vehicular networks using traffic flow theory. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–5. [Google Scholar]
- Van der Heijden, R.W.; Dietzel, S.; Leinmüller, T.; Kargl, F. Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun. Surv. Tutor. 2018, 21, 779–811. [Google Scholar] [CrossRef] [Green Version]
- Yavvari, C.; Duric, Z.; Wijesekera, D. Vehicular dynamics based plausibility checking. In Proceedings of the 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), Yokohama, Japan, 16–19 October 2017; pp. 1–8. [Google Scholar]
- Kerrache, C.A.; Lakas, A.; Lagraa, N.; Barka, E. UAV-assisted technique for the detection of malicious and selfish nodes in VANETs. Veh. Commun. 2018, 11, 1–11. [Google Scholar] [CrossRef]
- Lu, Z.; Wang, Q.; Qu, G.; Liu, Z. Bars: A blockchain-based anonymous reputation system for trust management in vanets. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 98–103. [Google Scholar]
- Janczykowski, M.; Turek, W.; Malawski, M.; Byrski, A. Large-scale urban traffic simulation with Scala and high-performance computing system. J. Comput. Sci. 2019, 35, 91–101. [Google Scholar] [CrossRef]
- Ruan, X.; Zhou, J.; Tu, H.; Jin, Z.; Shi, X. An improved cellular automaton with axis information for microscopic traffic simulation. Transp. Res. Part C Emerg. Technol. 2017, 78, 63–77. [Google Scholar] [CrossRef]
- Krajzewicz, D.; Erdmann, J.; Behrisch, M.; Bieker, L. Recent development and applications of SUMO-Simulation of Urban MObility. Int. J. Adv. Syst. Meas. 2013, 5, 4. [Google Scholar]
- Zaidi, A.A.; Kulcsár, B.; Wymeersch, H. Back-pressure traffic signal control with fixed and adaptive routing for urban vehicular networks. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2134–2143. [Google Scholar] [CrossRef] [Green Version]
- Lämmer, S.; Helbing, D. Self-control of traffic lights and vehicle flows in urban road networks. J. Stat. Mech. Theory Exp. 2008, 2008, P04019. [Google Scholar] [CrossRef] [Green Version]
- Bernas, M.; Płaczek, B.; Smyła, J. A neuroevolutionary approach to controlling traffic signals based on data from sensor network. Sensors 2019, 19, 1776. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Płaczek, B.; Bernas, M.; Cholewa, M. A Credibility Score Algorithm for Malicious Data Detection in Urban Vehicular Networks. Information 2020, 11, 496. https://doi.org/10.3390/info11110496
Płaczek B, Bernas M, Cholewa M. A Credibility Score Algorithm for Malicious Data Detection in Urban Vehicular Networks. Information. 2020; 11(11):496. https://doi.org/10.3390/info11110496
Chicago/Turabian StylePłaczek, Bartłomiej, Marcin Bernas, and Marcin Cholewa. 2020. "A Credibility Score Algorithm for Malicious Data Detection in Urban Vehicular Networks" Information 11, no. 11: 496. https://doi.org/10.3390/info11110496