Abstract
In Vehicular ad-hoc network (VANET) vehicles communicate with other vehicles and with the RSU(Road Side Unit). It provides safety and other help to the drivers and the passengers of the vehicles. It is important for Intelligent Transport Systems, hence in recent years the Industrial sector and researchers give it special importance and did much research for its development. In VANET vehicle nodes exchange messages to gain information to make the travel efficient for the passengers of the vehicle. But sometimes attacker start broadcasting the fake news about the surroundings like information of fake accident of traffic jam which in turn produce a negative impact on the safety a efficiency of vehicle. In this paper, we have introduced an entropy-based approach to detect fake news. The attacker uses the spoofed IP address for broadcasting the fake news packets, so we use the entropy of the source IP address for the identification of fake news packets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hussain, M.M., Beg, M.S.: Using vehicles as fog infrastructures for transportation cyber-physical systems (t-cps): Fog computing for vehicular networks. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 11(1), 47–69 (2019)
Mirsadeghi, F., Rafsanjani, M.K., et al.: A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Network. Appl., 1–17 (2020)
Kolandaisamy, R., et al.: A multivariant stream analysis approach to detect and mitigate ddos attacks in vehicular ad hoc networks. Wireless Communications and Mobile Computing 2018 (2018)
Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.: Design of 5.9 GHz dsrc-based vehicular safety communication. IEEE Wireless Commun. 13(5), 36–43 (2006)
Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: Vanets and IoV. Ad Hoc Netw. 61, 33–50 (2017)
Zhang, Z., Sun, R., Zhao, C., Wang, J., Chang, C.K., et al.: CyVOD: a novel trinity multimedia social network scheme. Multimedia Tools Appl. 76(18), 18513–18529 (2017)
Chaudhary, P., Gupta, B.B., Gupta, S.: Cross-site scripting (XSS) worms in Online Social Network (OSN): taxonomy and defensive mechanisms. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2131–2136. IEEE, March 2016
Xiao, Y., Liu, Y., Li, T.: Edge computing and blockchain for quick fake news detection in IoV. Sensors 20(16), 4360 (2020)
Ozbay, F.A., Alatas, B.: Fake news detection within online social media using supervised artificial intelligence algorithms. Physica A: Stat. Mech. Appl. 540, 123174 (2020)
Zhou, X., Wu, J., Zafarani, R.: Safe: Similarity-aware multi-modal fake news detection. arXiv preprint arXiv:2003.04981 (2020)
Raghuwanshi, V., Lilhore, U.: Neighbor trust algorithm (nta) to protect vanet from denial of service attack (dos). Int. J. Comput. Appl. 140(8), 8–12 (2016)
Khan, U., Agrawal, S., Silakari, S.: Detection of malicious nodes (dmn) in vehicular ad-hoc networks. Procedia Comput. Sci. 46, 965–972 (2015)
Verma, K., Hasbullah, H., Kumar, A.: Prevention of dos attacks in vanet. Wireless personal communications 73(1), 95–126 (2013). https://doi.org/10.1007/s11277-013-1161-5
Sinha, A., Mishra, S.K.: Queue limiting algorithm (qla) for protecting vanet from denial of service (dos) attack. Int. J. Comput. Appl. Technol. 86(8), 14–17 (2014)
Kumar, S., Mann, K.S.: Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in vanets. In: 2018 4th International Conference on Computing Sciences (ICCS), pp. 72–79. IEEE (2018)
Singh, A., Sharma, P.: A novel mechanism for detecting dos attack in vanet using enhanced attacked packet detection algorithm (EAPDA). In: 2015 2nd International Conference on Recent Advances in Engineering & Computational sciences (RAECS), pp. 1–5. IEEE (2015)
Quyoom, A., Ali, R., Gouttam, D.N., Sharma, H.: A novel mechanism of detection of denial of service attack (dos) in vanet using malicious and irrelevant packet detection algorithm (mipda). In: International Conference on Computing, Communication & Automation, pp. 414–419. IEEE (2015)
RoselinMary, S., Maheshwari, M., Thamaraiselvan, M.: Early detection of dos attacks in vanet using attacked packet detection algorithm (APDA). In: 2013 International Conference on Information Communication and Embedded Systems (ICICES), pp. 237–240. IEEE (2013)
Gandhi, U.D., Keerthana, R.: Request response detection algorithm for detecting dos attack in VANET. In: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), pp. 192–194. IEEE (2014)
Mokdad, L., Ben-Othman, J., Nguyen, A.T.: Djavan: detecting jamming attacks in vehicle ad hoc networks. Perform. Eval. 87, 47–59 (2015)
Choudhari, D.P., Dorle, S.S.: Maximization of packet delivery ratio for DADCQ protocol after removal of eavesdropping and ddos attacks in VANET. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–8. IEEE (2019)
Mejri, M.N., Ben-Othman, J.: Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks. In: Proceedings of the 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 73–79 (2014)
Ruel, J.J., Ayres, M.P.: Jensen’s inequality predicts effects of environmental variation. Trends in Ecol. Evol. 14(9), 361–366 (1999)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gaurav, A., Gupta, B.B., Castiglione, A., Psannis, K., Choi, C. (2020). A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET). In: Chellappan, S., Choo, KK.R., Phan, N. (eds) Computational Data and Social Networks. CSoNet 2020. Lecture Notes in Computer Science(), vol 12575. Springer, Cham. https://doi.org/10.1007/978-3-030-66046-8_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-66046-8_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66045-1
Online ISBN: 978-3-030-66046-8
eBook Packages: Computer ScienceComputer Science (R0)