Skip to main content

A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET)

  • Conference paper
  • First Online:
Computational Data and Social Networks (CSoNet 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12575))

Included in the following conference series:

Abstract

In Vehicular ad-hoc network (VANET) vehicles communicate with other vehicles and with the RSU(Road Side Unit). It provides safety and other help to the drivers and the passengers of the vehicles. It is important for Intelligent Transport Systems, hence in recent years the Industrial sector and researchers give it special importance and did much research for its development. In VANET vehicle nodes exchange messages to gain information to make the travel efficient for the passengers of the vehicle. But sometimes attacker start broadcasting the fake news about the surroundings like information of fake accident of traffic jam which in turn produce a negative impact on the safety a efficiency of vehicle. In this paper, we have introduced an entropy-based approach to detect fake news. The attacker uses the spoofed IP address for broadcasting the fake news packets, so we use the entropy of the source IP address for the identification of fake news packets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hussain, M.M., Beg, M.S.: Using vehicles as fog infrastructures for transportation cyber-physical systems (t-cps): Fog computing for vehicular networks. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 11(1), 47–69 (2019)

    Article  Google Scholar 

  2. Mirsadeghi, F., Rafsanjani, M.K., et al.: A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Network. Appl., 1–17 (2020)

    Google Scholar 

  3. Kolandaisamy, R., et al.: A multivariant stream analysis approach to detect and mitigate ddos attacks in vehicular ad hoc networks. Wireless Communications and Mobile Computing 2018 (2018)

    Google Scholar 

  4. Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.: Design of 5.9 GHz dsrc-based vehicular safety communication. IEEE Wireless Commun. 13(5), 36–43 (2006)

    Article  Google Scholar 

  5. Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: Vanets and IoV. Ad Hoc Netw. 61, 33–50 (2017)

    Article  Google Scholar 

  6. Zhang, Z., Sun, R., Zhao, C., Wang, J., Chang, C.K., et al.: CyVOD: a novel trinity multimedia social network scheme. Multimedia Tools Appl. 76(18), 18513–18529 (2017)

    Google Scholar 

  7. Chaudhary, P., Gupta, B.B., Gupta, S.: Cross-site scripting (XSS) worms in Online Social Network (OSN): taxonomy and defensive mechanisms. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2131–2136. IEEE, March 2016

    Google Scholar 

  8. Xiao, Y., Liu, Y., Li, T.: Edge computing and blockchain for quick fake news detection in IoV. Sensors 20(16), 4360 (2020)

    Article  Google Scholar 

  9. Ozbay, F.A., Alatas, B.: Fake news detection within online social media using supervised artificial intelligence algorithms. Physica A: Stat. Mech. Appl. 540, 123174 (2020)

    Article  Google Scholar 

  10. Zhou, X., Wu, J., Zafarani, R.: Safe: Similarity-aware multi-modal fake news detection. arXiv preprint arXiv:2003.04981 (2020)

    Google Scholar 

  11. Raghuwanshi, V., Lilhore, U.: Neighbor trust algorithm (nta) to protect vanet from denial of service attack (dos). Int. J. Comput. Appl. 140(8), 8–12 (2016)

    Google Scholar 

  12. Khan, U., Agrawal, S., Silakari, S.: Detection of malicious nodes (dmn) in vehicular ad-hoc networks. Procedia Comput. Sci. 46, 965–972 (2015)

    Article  Google Scholar 

  13. Verma, K., Hasbullah, H., Kumar, A.: Prevention of dos attacks in vanet. Wireless personal communications 73(1), 95–126 (2013). https://doi.org/10.1007/s11277-013-1161-5

    Article  Google Scholar 

  14. Sinha, A., Mishra, S.K.: Queue limiting algorithm (qla) for protecting vanet from denial of service (dos) attack. Int. J. Comput. Appl. Technol. 86(8), 14–17 (2014)

    Google Scholar 

  15. Kumar, S., Mann, K.S.: Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in vanets. In: 2018 4th International Conference on Computing Sciences (ICCS), pp. 72–79. IEEE (2018)

    Google Scholar 

  16. Singh, A., Sharma, P.: A novel mechanism for detecting dos attack in vanet using enhanced attacked packet detection algorithm (EAPDA). In: 2015 2nd International Conference on Recent Advances in Engineering & Computational sciences (RAECS), pp. 1–5. IEEE (2015)

    Google Scholar 

  17. Quyoom, A., Ali, R., Gouttam, D.N., Sharma, H.: A novel mechanism of detection of denial of service attack (dos) in vanet using malicious and irrelevant packet detection algorithm (mipda). In: International Conference on Computing, Communication & Automation, pp. 414–419. IEEE (2015)

    Google Scholar 

  18. RoselinMary, S., Maheshwari, M., Thamaraiselvan, M.: Early detection of dos attacks in vanet using attacked packet detection algorithm (APDA). In: 2013 International Conference on Information Communication and Embedded Systems (ICICES), pp. 237–240. IEEE (2013)

    Google Scholar 

  19. Gandhi, U.D., Keerthana, R.: Request response detection algorithm for detecting dos attack in VANET. In: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), pp. 192–194. IEEE (2014)

    Google Scholar 

  20. Mokdad, L., Ben-Othman, J., Nguyen, A.T.: Djavan: detecting jamming attacks in vehicle ad hoc networks. Perform. Eval. 87, 47–59 (2015)

    Article  Google Scholar 

  21. Choudhari, D.P., Dorle, S.S.: Maximization of packet delivery ratio for DADCQ protocol after removal of eavesdropping and ddos attacks in VANET. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–8. IEEE (2019)

    Google Scholar 

  22. Mejri, M.N., Ben-Othman, J.: Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks. In: Proceedings of the 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 73–79 (2014)

    Google Scholar 

  23. Ruel, J.J., Ayres, M.P.: Jensen’s inequality predicts effects of environmental variation. Trends in Ecol. Evol. 14(9), 361–366 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Akshat Gaurav or B. B. Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gaurav, A., Gupta, B.B., Castiglione, A., Psannis, K., Choi, C. (2020). A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET). In: Chellappan, S., Choo, KK.R., Phan, N. (eds) Computational Data and Social Networks. CSoNet 2020. Lecture Notes in Computer Science(), vol 12575. Springer, Cham. https://doi.org/10.1007/978-3-030-66046-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66046-8_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66045-1

  • Online ISBN: 978-3-030-66046-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics