Browse > Article

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs  

Kim, Chil-Hwa (Department of Computer and Information Communication, Catholic University of Daegu)
Bae, Ihn-Han (Department of Computer and Information Communication, Catholic University of Daegu)
Publication Information
Journal of the Korean Data and Information Science Society / v.22, no.6, 2011 , pp. 1153-1166 More about this Journal
Abstract
Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.
Keywords
Misbehavior detection; rough sets; security; selfish behavior; VANET;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Papadimitratos, P., Gligor, V. and Hubaux, J. P. (2006). Securing vehicluar communications - assumptions, requirements and principles. Proceeding of the workshop on Embedded Security in Cars, 5-14.
2 Park, S., Aslam, B., Turgut, D. and Zou, C. C. (2009). Defence against sybil attack in vehicular ad hoc network based on roadside unit support. Proceedings of Military Communications Conference, 1-7.
3 Raya, M., Manshaei, M. H., Felegyhazi, M. and Hubaux, J. P. (2008). Revocation games in ephemeral networks. Procedings of ACM Computer and Communications Security, 199-210.
4 Raya, M., Papadimitratos, P., Aad, I., Jungels, D. and Hubaux, J. P. (2007). Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications, 25, 1557-1568.   DOI
5 Ruj, S., Cavenaghi, M. A., Huang, Z., Nayak, A., and Stojmenovic, I. (2011). On data-centric misbehavior detection in vanets. Proceeding of Vehicular Technology Conference.
6 Shen, Q. and Jensen, R (2007). Rough sets, their extensions and applications. International Journal of Automation and Computing, 4, 217-228.   DOI   ScienceOn
7 The CAMP Vehicle Safety Communications Consortium. (2005) Vehicle safety communications project, task 3 final report.
8 Zhou, T., Choudhury, R. R., Ning, P. and Chakrabarty, K. (2007). Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. Proceeding of Mobile and Ubiquitous Systems: Networking & Services, 1-8.
9 배인한 (2010). 모바일 애드-혹 망을 위한 퍼지 비정상 행위 탐지 알고리즘. <한국데이터정보과학회지>, 21, 1125-1136.
10 이소연 (2008). 차내망 인터페이스. , 117, 114-117.
11 오현서, 박종현 (2008). 차량 통신 네트워크 기술 동향. <전자통신동향분석>, 23, 49-55.
12 Bilogrevic, I., Manshaei, M., Raya, M. and Hubaux, J. P. (2010). Optimal revocations in ephemeral networks: A gametheoretic framework. Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 184-193.
13 Douceur, J. R. (2002). The sybil attack. Proceeding of the First International Workshop on Peer-to-Peer Systems, 251-260.
14 Ghosh M., Varghese, A., Gupta, A., Kherani A. A. and Muthaiah, S. N. (2010). Detecting misbehaviors in vanet with integrated root-cause analysis. Journal of Ad Hoc Networks, 8, 778-790.   DOI   ScienceOn
15 Golle, P., Greene, D. and Staddon J. (2009). Detecting and correcting malicious data in vanets. Proceedings of Vehicular Ad Hoc Networks, 29-37.
16 Hiraoka, T., Tanaka, M., Takeuchi, S., Kumamoto, H., Isumi, T. and Hatanaka, K. (2009). Collision risk evaluation index based on deceleration for collision avoidance (second report). Review of Automotive Engineering, 30, 439-447.
17 Moore, T., Raya, M., Clulow, J., Papadimitratos, P., Andeson, R. and Hubaux, J. P. (2008). Fast exclusion of errant devices from vehicular networks. Proceeding of Sensor, Mesh and Ad Hoc Communications and Networks, 21, 135-143.