TY - JOUR
T1 - UAV-assisted technique for the detection of malicious and selfish nodes in VANETs
AU - Kerrache, Chaker Abdelaziz
AU - Lakas, Abderrahmane
AU - Lagraa, Nasreddine
AU - Barka, Ezedin
N1 - Funding Information:
This research is partially supported by the United Arab Emirates University (UAEU) under grant number 31T065 .
Publisher Copyright:
© 2017 Elsevier Inc.
PY - 2018/1
Y1 - 2018/1
N2 - Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative solution since it is less costly than cryptography-based solution in terms of computation delay and mobility support. However, the existing solutions assume that, in general, the attackers have always a dishonest behavior that persists over time. This assumption may be misleading, as the attackers can behave intelligently to avoid being detected. Moreover, pseudonyms changing strategies to preserve vehicles' privacy are another issue to take into account. In this paper, a new solution for the detection of intelligent malicious behaviors based on the adaptive detection threshold is proposed. In addition to the detection of malicious nodes, our solution relies on Unmanned Aerial Vehicles to face the negative impact of pseudonym changes on the detection process. Our solution also incites attackers to behave well since any malicious behavior will be immediately detected thanks to the adaptive detection threshold adopted. Simulation results depict the high efficiency of our proposal at ensuring high ratios for both detection and packet delivery.
AB - Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative solution since it is less costly than cryptography-based solution in terms of computation delay and mobility support. However, the existing solutions assume that, in general, the attackers have always a dishonest behavior that persists over time. This assumption may be misleading, as the attackers can behave intelligently to avoid being detected. Moreover, pseudonyms changing strategies to preserve vehicles' privacy are another issue to take into account. In this paper, a new solution for the detection of intelligent malicious behaviors based on the adaptive detection threshold is proposed. In addition to the detection of malicious nodes, our solution relies on Unmanned Aerial Vehicles to face the negative impact of pseudonym changes on the detection process. Our solution also incites attackers to behave well since any malicious behavior will be immediately detected thanks to the adaptive detection threshold adopted. Simulation results depict the high efficiency of our proposal at ensuring high ratios for both detection and packet delivery.
KW - Pseudonyms changing
KW - Trust management
KW - UAV
KW - VANETs
UR - http://www.scopus.com/inward/record.url?scp=85038444675&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85038444675&partnerID=8YFLogxK
U2 - 10.1016/j.vehcom.2017.12.001
DO - 10.1016/j.vehcom.2017.12.001
M3 - Article
AN - SCOPUS:85038444675
SN - 2214-2096
VL - 11
SP - 1
EP - 11
JO - Vehicular Communications
JF - Vehicular Communications
ER -