Abstract
Vehicular ad-hoc Networks (VANETs) have inherent high mobility and take data forwarding as a basic mechanism to share information among vehicles. Selective forwarding attack, in which malicious nodes deliberately drop data packets, destroys the integrity of data and hurts the validity of real VANETs applications. Because malicious nodes usually masquerade themselves as normal nodes and collude with each other whenever possible, it is hard to obtain clear and direct evidence of selective forwarding attacks. In this paper, we address the issue of detecting selective forwarding attacks by building a trust system. The proposed approach to maintain this system mainly includes (1) local and global detection of attacks based on mutual monitoring among all nodes, and (2) detection of abnormal driving patterns of malicious nodes. Since both in-band and out-band information is utilized, our approach is effective in relatively low-density road conditions and resilient to various scenarios, such as different rate of malicious occurrence or different road’s range. The extensive simulations demonstrate that our approach achieves a high fault tolerance by choosing most reliable nodes for information delivery, while at the same time identify malicious nodes with relatively high accuracy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lin, X., Lu, R., Zhang, C.: Security in vehicular ad hoc networks. In: Proceedings of the IEEE Communications Magazine, pp. 88–95 (2008)
Rahman, S.U., Hengartner, U.: Secure crash reporting in vehicular ad hoc networks. In: IEEE SecureComm, pp. 443–452 (2007)
Hartenstein, H., Laberteaux, K.P.: A tutorial survey on vehicular ad hoc networks. In: Proceedings of IEEE Communications Magazine, pp. 164–171 (2008)
Tseng, Y.T., Jan, R.H., Chen, C.: A vehicle-density-based forwarding scheme for emergency message broadcasts in VANETs. In: IEEE Mobile Adhoc and Sensor Systems (MASS), pp. 703–708, 8–12 2010
Wu, K., Li, H., Wang, L., et al.: hJam: attachment transmission in WLANs. In: IEEE Mobile Computing, pp. 2334–2345 (2013)
Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: IEEE IPDPS, pp. 25–29 (2006)
Monir, M.B., El Aziz, M.H.A., Hamid, A.A.A.: A trust-based message reporting scheme for VANET. In: Proceedings of International Journal of Emerging Technology and Advanced Engineering, pp. 276–394 (2013)
Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. In: Proceedings of IEEE Computer Communications, pp. 2883–2897 (2008)
Raya, M., Aziz, A., Hubaux, J.P.: Efficient secure aggregation in VANETs. In: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 67–75 (2006)
Wang, L., Wu, K., Xiao, J., et al.: Harnessing frequency domain for cooperative sensing and multi-channel contention in CRAHNs. In: IEEE Wireless Communications, pp. 440–449 (2014)
Sun, Y., Zhang, B., Zhao, B., et al.: Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Netw. Appl. 8(6), 1108–1121 (2015)
Acknowledgments
The authors would like to thank the anonymous reviewers for the helpful comments and suggestions. This work was supported in part by the NSF of China under grant No. 61422207, No. 61472382.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Wang, S., He, Y. (2016). A Trust System for Detecting Selective Forwarding Attacks in VANETs. In: Wang, Y., Yu, G., Zhang, Y., Han, Z., Wang, G. (eds) Big Data Computing and Communications. BigCom 2016. Lecture Notes in Computer Science(), vol 9784. Springer, Cham. https://doi.org/10.1007/978-3-319-42553-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-42553-5_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42552-8
Online ISBN: 978-3-319-42553-5
eBook Packages: Computer ScienceComputer Science (R0)