Abstract
Vehicular ad hoc network (VANET) has been emerged as a prominent technology for intelligent transportation systems. A VANET consists of a number of vehicles equipped together for communication on road side. VANETs are used to fulfill many requirements such as drivers’ safety, data transformation and traffic control, and so on. In VANET, each vehicle behaves independently and as a result, some vehicles might behave selfishly to save their resources. This issue can induce network latency, network break down, security breach, and other issues. In this paper, we address this issue by proposing a honeypot detection approach which endeavors to mitigate selfish vehicles from the network. For experimental results, proposed scheme is incorporated with AODV protocol. We present the behavior of selfish vehicles based on energy constraints. Simulation results under various network parameters depict that the proposed approach provide more robust and secured routing among the vehicles in VANETs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wahab OA, Otrok H, Mourad A (2014) A cooperative watchdog model based on Dempster–Shafer for detecting misbehaving vehicles. Comput Commun 41:43–54
Jhaveri RH, Patel NM (2015) A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wirel Netw 21(8):2781–2798
Lipiński B, Mazurczyk W, Szczypiorski K, Śmietanka P (2015) Towards effective security framework for vehicular ad-hoc networks. J Adv Comput Netw 3(2)
Liang W, Li Z, Zhang H, Wang S, Bie R (2014) Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. Int J Distrib Sens Netw
Ostroukh AV, Elhadi H (2015) Comparative study of routing protocols in vehicular ad-hoc networks (VANETS). Int J Adv Stud 4(2):9–14
Helen D, Arivazhagan D (2014) Applications, advantages and challenges of ad hoc networks. JAIR 2(8):453–457
Younes MB, Boukerche A (2015) Scool: a secure traffic congestion control protocol for VANETs. In: Wireless communications and networking conference (WCNC). IEEE, pp 1960–1965
http://eprints.utm.my/33353/2/MahmoudAhmadSalemMFSKSM2012CHAP1.pdf
Agarwal D, Rout RR, Ravichandra S (2015) Detection of node-misbehavior using overhearing and autonomous agents in wireless ad-hoc networks. In: Applications and innovations in mobile computing (AIMoC). IEEE, pp 152–157
Mittal S (2015) Identification technique for all passive selfish node attacks in a mobile network. Int J 3(4)
Yang Y, Gao Z, Qiu X, Liu Q, Hao Y, Zheng J (2015) A hierarchical reputation evidence decision system (REDS) in VANETs. Int J Distrib Sens Netw 501:341579
Song J, He CJ, Yang F, Zhang HG (2015) A privacy‐preserving distance‐based incentive scheme in opportunistic VANETs. Secur Commun Netw
Zhou A, Li J, Sun Q, Fan C, Lei T, Yang F (2015) A security authentication method based on trust evaluation in VANETs. EURASIP J Wirel Commun Netw 2015(1):1–8
Khan U, Agrawal S, Silakari S (2015) Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Proc Comput Sci 46:965–972
JesudossA, Raja SVK, SulaimanA (2015) Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw 24:250–263
Das D, Majumder K, Dasgupta A (2015) Selfish node detection and low cost data transmission in MANET using game theory. Proc Comput Sci 54:92–101
Altayeb M, Mahgoub Imad (2013) A survey of vehicular ad hoc networks routing protocols. Int J Innov Appl Stud 3(3):829–846
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, P., Jhaveri, R. (2017). A Honeypot Scheme to Detect Selfish Vehicles in Vehicular Ad-hoc Network. In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_40
Download citation
DOI: https://doi.org/10.1007/978-981-10-3935-5_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3934-8
Online ISBN: 978-981-10-3935-5
eBook Packages: EngineeringEngineering (R0)