Detection of malicious vehicles with demerit and reward level system

In Vehicular Ad hoc Networks (VANETs), to ensure the reliability of safety applications, each vehicle periodically receives crucial information from neighboring vehicles, in its transmission range, about their respective current state including position, direction, etc. Some vehicles will want to inject false information on the network, whether accidentally or intentionally. These vehicles, that we will call malicious vehicles, may affect the timeliness and the pertinence of safety related data. Our proposed scheme called TrustLevel, ranks a vehicle sharing inaccurate information repeatedly as malicious. To ensure system reliability, the TrustLevel scheme is able to promptly detect the malicious vehicles and ensure the accuracy of the vehicle perception of its environment. To do this, TrustLevel collects data for each vehicle on its environment. Thereafter, it creates a perception map for each vehicle representing its surroundings. TrustLevel can then cross these maps in order to increase each vehicle's perception. When doing so, the information sent by malicious vehicles will be incoherent, so TrustLevel will be able to detect these inconsistencies and isolate the faulty vehicles. The isolated vehicles will then be ignored by the other vehicles when exchanging their perceptions, increasing the system reliability. Simulation results demonstrate the efficiency of the TrustLevel scheme under high density of malicious vehicles.

[1]  W. Marsden I and J , 2012 .

[2]  Soumaya Cherkaoui,et al.  A secure service architecture to support wireless vehicular networks , 2010, Int. J. Auton. Adapt. Commun. Syst..

[3]  Soumaya Cherkaoui,et al.  Detecting faulty and malicious vehicles using rule-based communications data mining , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[5]  Tim Moors,et al.  Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA) , 2008, 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008).

[6]  V. Lakshmi Praba,et al.  Detecting Malicious Vehicles and Regulating Traffic in VANET using RAODV Protocol , 2013 .

[7]  Eliahu Khalastchi,et al.  Detecting anomalies in unmanned vehicles using the Mahalanobis distance , 2010, 2010 IEEE International Conference on Robotics and Automation.

[8]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[9]  Markus Jakobsson,et al.  Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.

[10]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[11]  Ben Kao,et al.  Online Algorithms for Mining Inter-stream Associations from Large Sensor Networks , 2005, PAKDD.

[12]  Gösta Grahne,et al.  Efficiently Using Prefix-trees in Mining Frequent Itemsets , 2003, FIMI.

[13]  Abdelhakim Hafid,et al.  Setting up an extended perception in a vehicular network environment: A proof of concept , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[14]  Nalini Venkatasubramanian,et al.  Security Issues in a Future Vehicular Network , 2002 .

[15]  Jihene Rezgui,et al.  An Overview of the SCV Simulator for Vehicular Networks , 2017 .

[16]  Syed Asad Hussain,et al.  Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..