Skip to main content

A Honeypot Scheme to Detect Selfish Vehicles in Vehicular Ad-hoc Network

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 12))

Abstract

Vehicular ad hoc network (VANET) has been emerged as a prominent technology for intelligent transportation systems. A VANET consists of a number of vehicles equipped together for communication on road side. VANETs are used to fulfill many requirements such as drivers’ safety, data transformation and traffic control, and so on. In VANET, each vehicle behaves independently and as a result, some vehicles might behave selfishly to save their resources. This issue can induce network latency, network break down, security breach, and other issues. In this paper, we address this issue by proposing a honeypot detection approach which endeavors to mitigate selfish vehicles from the network. For experimental results, proposed scheme is incorporated with AODV protocol. We present the behavior of selfish vehicles based on energy constraints. Simulation results under various network parameters depict that the proposed approach provide more robust and secured routing among the vehicles in VANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wahab OA, Otrok H, Mourad A (2014) A cooperative watchdog model based on Dempster–Shafer for detecting misbehaving vehicles. Comput Commun 41:43–54

    Google Scholar 

  2. Jhaveri RH, Patel NM (2015) A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wirel Netw 21(8):2781–2798

    Article  Google Scholar 

  3. Lipiński B, Mazurczyk W, Szczypiorski K, Śmietanka P (2015) Towards effective security framework for vehicular ad-hoc networks. J Adv Comput Netw 3(2)

    Google Scholar 

  4. Liang W, Li Z, Zhang H, Wang S, Bie R (2014) Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. Int J Distrib Sens Netw

    Google Scholar 

  5. Ostroukh AV, Elhadi H (2015) Comparative study of routing protocols in vehicular ad-hoc networks (VANETS). Int J Adv Stud 4(2):9–14

    Google Scholar 

  6. Helen D, Arivazhagan D (2014) Applications, advantages and challenges of ad hoc networks. JAIR 2(8):453–457

    Google Scholar 

  7. Younes MB, Boukerche A (2015) Scool: a secure traffic congestion control protocol for VANETs. In: Wireless communications and networking conference (WCNC). IEEE, pp 1960–1965

    Google Scholar 

  8. http://eprints.utm.my/33353/2/MahmoudAhmadSalemMFSKSM2012CHAP1.pdf

  9. Agarwal D, Rout RR, Ravichandra S (2015) Detection of node-misbehavior using overhearing and autonomous agents in wireless ad-hoc networks. In: Applications and innovations in mobile computing (AIMoC). IEEE, pp 152–157

    Google Scholar 

  10. Mittal S (2015) Identification technique for all passive selfish node attacks in a mobile network. Int J 3(4)

    Google Scholar 

  11. Yang Y, Gao Z, Qiu X, Liu Q, Hao Y, Zheng J (2015) A hierarchical reputation evidence decision system (REDS) in VANETs. Int J Distrib Sens Netw 501:341579

    Google Scholar 

  12. Song J, He CJ, Yang F, Zhang HG (2015) A privacy‐preserving distance‐based incentive scheme in opportunistic VANETs. Secur Commun Netw

    Google Scholar 

  13. Zhou A, Li J, Sun Q, Fan C, Lei T, Yang F (2015) A security authentication method based on trust evaluation in VANETs. EURASIP J Wirel Commun Netw 2015(1):1–8

    Google Scholar 

  14. Khan U, Agrawal S, Silakari S (2015) Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Proc Comput Sci 46:965–972

    Google Scholar 

  15. JesudossA, Raja SVK, SulaimanA (2015) Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw 24:250–263

    Google Scholar 

  16. Das D, Majumder K, Dasgupta A (2015) Selfish node detection and low cost data transmission in MANET using game theory. Proc Comput Sci 54:92–101

    Google Scholar 

  17. Altayeb M, Mahgoub Imad (2013) A survey of vehicular ad hoc networks routing protocols. Int J Innov Appl Stud 3(3):829–846

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priya Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Patel, P., Jhaveri, R. (2017). A Honeypot Scheme to Detect Selfish Vehicles in Vehicular Ad-hoc Network. In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3935-5_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3934-8

  • Online ISBN: 978-981-10-3935-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics