A survey of local/cooperative-based malicious information detection techniques in VANETs

Vehicular ad hoc networks (VANETs) are emerged technology where vehicles and roadside units (RSUs) communicate with each other. VANETs can be categorized as a subbranch of mobile ad hoc networks (MANETs). VANETs help to improve traffic efficiency and safety and provide infotainment facility as well. The dissemination of messages must be relayed through nodes in VANETs. However, it is possible that a node may propagate false information in a network due to its malicious behaviour or selfishness. False information in VANETs can change drivers’ behaviour and create disastrous consequences in the network. Therefore, sometimes false safety messages may endanger human life. To avoid any lass, it is more important to detect and avoid false messages. This paper has explained some important algorithms that can detect false messages in VANETs. The categorization of false message detection schemes based on local and cooperative behaviour has been presented in this article. The limitations and consequences of existing schemes as well as future work has been discussed.

[1]  Nadeem Javaid,et al.  SEDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater WSNs , 2015, ANT/SEIT.

[2]  Xiang Cheng,et al.  Channel Prediction Based Scheduling for Data Dissemination in VANETs , 2017, IEEE Communications Letters.

[3]  Xinlei Zhang,et al.  Using trust model to ensure reliable data acquisition in VANETs , 2017, Ad Hoc Networks.

[4]  G. Singh,et al.  Fox-Hole Model for Data-centric Misbehaviour Detection in VANETs , 2012, 2012 Third International Conference on Computer and Communication Technology.

[5]  Pandi Vijayakumar,et al.  EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[6]  Rashid Minhas,et al.  Effects of jamming on IEEE 802.11p systems , 2010 .

[7]  Muttukrishnan Rajarajan,et al.  Data-centric Rogue Node Detection in VANETs , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Xiang Cheng,et al.  A Novel Centralized TDMA-Based Scheduling Protocol for Vehicular Networks , 2015, IEEE Transactions on Intelligent Transportation Systems.

[9]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[10]  Zhong Chen,et al.  Proof-of-relevance: Filtering false data via authentic consensus in Vehicle Ad-hoc Networks , 2008, IEEE INFOCOM Workshops 2008.

[11]  Pino Caballero-Gil,et al.  Countermeasures to Prevent Misbehaviour in VANETs , 2012, J. Univers. Comput. Sci..

[12]  Frank Kargl,et al.  Misbehavior detection in vehicular ad-hoc networks , 2013 .

[13]  Weisong Shi,et al.  $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.

[14]  Dijiang Huang,et al.  Cheater Detection in Vehicular Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[15]  T. Mantoro,et al.  Energy consumption evaluation in trust and reputation models for Wireless Sensor Networks , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).

[16]  Haitham S. Cruickshank,et al.  Pseudonymised communication in delay tolerant networks , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[17]  Huirong Fu,et al.  Evaluation of active position detection in Vehicular Ad Hoc Networks , 2014, 2014 International Joint Conference on Neural Networks (IJCNN).

[18]  Xiang Cheng,et al.  5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework: When Benz Meets Marconi , 2017, IEEE Intelligent Systems.

[19]  R. P. Barnwal,et al.  Heartbeat Message Based Misbehavior Detection Scheme for Vehicular Ad-hoc Networks , 2012, 2012 International Conference on Connected Vehicles and Expo (ICCVE).

[20]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[21]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[22]  Xiang Cheng,et al.  An adaptive geometry-based stochastic model for non-isotropic MIMO mobile-to-mobile channels , 2009, IEEE Transactions on Wireless Communications.

[23]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[24]  Muhammad Arshad,et al.  A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks , 2017, J. Sensors.

[25]  Nai-Wei Lo,et al.  Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.

[26]  Fuad A. Ghaleb,et al.  Data Verification and Misbehavior Detection in Vehicular Ad-hoc Networks , 2015 .

[27]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[28]  Azizol Abdullah,et al.  Vehicular Ad Hoc Networks and Security Issues: Survey , 2017 .

[29]  Xuemin Shen,et al.  Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks , 2010, 2010 IEEE International Conference on Communications.

[30]  Rutvij H. Jhaveri,et al.  Trust Based Approaches for Secure Routing in VANET: A Survey , 2015 .

[31]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[32]  Paolo Cremonesi,et al.  Parallel, distributed and network-based processing , 2006, J. Syst. Archit..

[33]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[34]  Xin Zhang,et al.  VANET alert endorsement using multi-source filters , 2010, VANET '10.

[35]  Jie Zhang,et al.  A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[36]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[37]  Xiang Cheng,et al.  Data Dissemination in VANETs: A Scheduling Approach , 2014, IEEE Transactions on Intelligent Transportation Systems.

[38]  Nai-Wei Lo,et al.  A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[39]  Vijay Laxmi,et al.  Machine Learning Approach for Multiple Misbehavior Detection in VANET , 2011, ACC.

[40]  Liuqing Yang,et al.  Intelligent transportation spaces: vehicles, traffic, communications, and beyond , 2010, IEEE Communications Magazine.

[41]  Nader Mohamed,et al.  Similarity-Based Trust Management System: Data Validation Scheme , 2015, HIS.

[42]  Alexandra Rivero-García,et al.  VANET Event Verification Based on User Trust , 2016, 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP).

[43]  Akbar Ghaffar Pour Rahbar,et al.  Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks , 2011, Multimedia Tools and Applications.

[44]  Radhika M. Pai,et al.  Mitigation of insider and outsider DoS attack against signature based authentication in VANETs , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).

[45]  Abdelwahab Boualouache,et al.  A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.

[46]  Tim Leinmüller,et al.  Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems , 2016, IEEE Communications Surveys & Tutorials.

[47]  Tim Leinmüller,et al.  Vehicle Behavior Analysis to Enhance Security in VANETs , 2008 .

[48]  Yuguang Fang,et al.  A defense technique against misbehavior in VANETs based on threshold authentication , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[49]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[50]  Josep Domingo-Ferrer,et al.  A Scalable Robust Authentication Protocol for Secure Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[51]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[52]  Xiang Cheng,et al.  Envelope Level Crossing Rate and Average Fade Duration of Nonisotropic Vehicle-to-Vehicle Ricean Fading Channels , 2014, IEEE Transactions on Intelligent Transportation Systems.

[53]  Soumya K. Ghosh,et al.  MDS-Based Trust Estimation of Event Reporting Node in VANET , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[54]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[55]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[56]  Xiaohui Liang,et al.  A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.

[57]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[58]  Tim Leinmüller,et al.  POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.

[59]  Soumaya Cherkaoui,et al.  Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[60]  Zhen Huang,et al.  On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET , 2011 .

[61]  Kpatcha M. Bayarou,et al.  Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters , 2012, 2012 IEEE Vehicular Networking Conference (VNC).

[62]  Xiang Cheng,et al.  Interference Graph-Based Resource-Sharing Schemes for Vehicular Networks , 2013, IEEE Transactions on Vehicular Technology.

[63]  Arobinda Gupta,et al.  Application of Secondary Information for Misbehavior Detection in VANETs , 2010, Networking.

[64]  Haitham S. Cruickshank,et al.  A comparative simulation based analysis of location based routing protocols in underwater wireless sensor networks , 2017, 2017 2nd Workshop on Recent Trends in Telecommunications Research (RTTR).

[65]  Zahid Ullah,et al.  Comparison of Localization Free Routing Protocols in Underwater Wireless Sensor Networks , 2017 .

[66]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[67]  Aifeng Wu,et al.  RATE: A RSU-Aided Scheme for Data-Centric Trust Establishment in VANETs , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[68]  Arobinda Gupta,et al.  Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[69]  Vijay Laxmi,et al.  Detection of incorrect position information using speed and time span verification in VANET , 2012, SIN '12.

[70]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[71]  Ciprian Dobre,et al.  Secure Opportunistic Vehicle-to-Vehicle Communication , 2017 .

[72]  Kpatcha M. Bayarou,et al.  Central misbehavior evaluation for VANETs based on mobility data plausibility , 2012, VANET@MOBICOM.

[73]  Imad Mahgoub,et al.  A Survey of Vehicular Ad hoc Networks Routing Protocols , 2013 .

[74]  Florian Dotzer,et al.  VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[75]  Sushmita Ruj,et al.  Limitations of trust management schemes in VANET and countermeasures , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[76]  A. Held,et al.  Modeling Roadside Attacker Behavior in VANETs , 2008, 2008 IEEE Globecom Workshops.

[77]  Xiang Cheng,et al.  D2D for Intelligent Transportation Systems: A Feasibility Study , 2015, IEEE Transactions on Intelligent Transportation Systems.

[78]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[79]  Saneeha Ahmed,et al.  Misbehaviour detection in vehicular networks using logistic trust , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[80]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[81]  Vijay Laxmi,et al.  Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[82]  Xiang Cheng,et al.  New deterministic and stochastic simulation models for non-isotropic scattering mobile-to-mobile Rayleigh fading channels , 2011, Wirel. Commun. Mob. Comput..

[83]  Frank Kargl,et al.  Enhanced Position Verification for VANETs Using Subjective Logic , 2016, VTC 2016.

[84]  Ayman I. Kayssi,et al.  A Privacy-Preserving Trust Model for VANETs , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[85]  Debasish Jena,et al.  Security in vehicular adhoc networks: a survey , 2011, ICCCS '11.

[86]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[87]  Xiang Cheng,et al.  Wideband Channel Modeling and Intercarrier Interference Cancellation for Vehicle-to-Vehicle Communication Systems , 2013, IEEE Journal on Selected Areas in Communications.

[88]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[89]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[90]  Alok Kumar,et al.  A Historical Feedback Based Misbehavior Detection (HFMD) Algorithm in VANET , 2016, 2016 2nd International Conference on Computational Intelligence and Networks (CINE).

[91]  Tim Leinmüller,et al.  Decentralized position verification in geographic ad hoc routing , 2010, Secur. Commun. Networks.

[92]  E. Schoch,et al.  Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[93]  Bartlomiej Placzek,et al.  Detection of malicious data in vehicular ad-hoc networks for traffic signal control applications , 2016, CN.

[94]  Pin-Han Ho,et al.  AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[95]  Muttukrishnan Rajarajan,et al.  Vehicular Internet: Security & Privacy Challenges and Opportunities , 2015, Future Internet.

[96]  Yu-Cheng Lin,et al.  A Proxy-Based Authentication and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks , 2014, IEEE Transactions on Intelligent Transportation Systems.

[97]  Zhong Chen,et al.  MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET , 2013, APWeb.

[98]  J. Miller,et al.  A Review of Security Threats, Solutions and Trust Management in VANETs , 2016, Int. J. Next Gener. Comput..

[99]  Tim Leinmüller,et al.  Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[100]  Azzedine Boukerche,et al.  Software-defined Vehicular Ad Hoc Networks with Trust Management , 2016, DIVANet@MSWiM.

[101]  Feng Xia,et al.  A greedy model with small world for improving the robustness of heterogeneous Internet of Things , 2016, Comput. Networks.

[102]  B. K. Chaurasia,et al.  Trust Computation in VANETs , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[103]  Shikha Agrawal,et al.  A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks , 2015 .

[104]  Ihn-Han Bae,et al.  A Misbehavior-Based Reputation Management System for VANETs , 2012 .