Application of secondary information for misbehavior detection in vanets
By Ashish Vulimiri,
Safety applications designed for Vehicular Ad Hoc Networks (VANETs) can be compromised by participating vehicles transmitting false or inaccurate information. Design of mechanisms that detect such misbehaving nodes is an important problem in VANETs. In this paper, we investigate the use of correlated information, called “ secondary alerts”, generated in response to another alert, called as the “ primary alert” to verify the truth or falsity of the primary alert received by a vehicle. We first propose a framework to model how such correlated secondary information observed from more than one source can be integrated to generate a “degree of belief” for the primary alert. We then show an instantiation of the model proposed for the specific case of Post-Crash Notification as the primary alert and Slow/Stopped Vehicle Advisory as the secondary alerts. Finally, we present the design and evaluation of a misbehavior detection scheme (MDS) for PCN application using such correlated information to illustrate that such information can be used efficiently for MDS design.
Keywords VANET - Misbehavior detection - Primary alert - Secondary information
Part of this work was supported by the GM Collaborative Research Lab at IIT Kharagpur, India.
BibTeX
@inproceedings{conf/networking/VulimiriGRMK10, author = "Vulimiri, Ashish and Gupta, Arobinda and Roy, Pramit and Muthaiah, Skanda N. and Kherani, Arzad Alam", editor = "Crovella, Mark and Feeney, Laura Marie and Rubenstein, Dan and Raghavan, S. V.", title = "Application of Secondary Information for Misbehavior Detection in VANETs", booktitle = "Networking", crossref = "conf/networking/2010", ee = "http://dx.doi.org/10.1007/978-3-642-12963-6_31", pages = "385-396", year = "2010", } @proceedings{conf/networking/2010, editor = "Crovella, Mark and Feeney, Laura Marie and Rubenstein, Dan and Raghavan, S. V.", title = "NETWORKING 2010, 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings", ee = "http://dx.doi.org/10.1007/978-3-642-12963-6", isbn = "978-3-642-12962-9", publisher = "Springer", series = "Lecture Notes in Computer Science", volume = "6091", year = "2010", }