Cheater detection in vehicular networks

Dijiang Huang, Sean A. Williams, Swaroop Shere

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify cheaters. Vehicles can broadcast a congestion event to other vehicles. However, a rogue vehicle can also broadcast a bogus congestion message in order to get advantage over other vehicles for malicious purposes. To address this cheating problem, we develop a cheater detection protocol, in which each vehicle only depends on local velocity and distance measurements to validate the congestion event sent by a vehicle. Our presented protocol is based on the traffic flow theory to detect the Kinematic wave caused by congestion. The presented cheater detection solution is effective in that it only requires vehicles to communicate with its neighboring vehicles without relying on a centralized controlled congestion detection and prediction system.

Original languageEnglish (US)
Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
Pages193-200
Number of pages8
DOIs
StatePublished - 2012
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
Duration: Jun 25 2012Jun 27 2012

Other

Other11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
CountryUnited Kingdom
CityLiverpool
Period6/25/126/27/12

Fingerprint

Distance measurement
Velocity measurement
Kinematics

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Huang, D., Williams, S. A., & Shere, S. (2012). Cheater detection in vehicular networks. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 (pp. 193-200). [6295975] https://doi.org/10.1109/TrustCom.2012.103

Cheater detection in vehicular networks. / Huang, Dijiang; Williams, Sean A.; Shere, Swaroop.

Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012. p. 193-200 6295975.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Huang, D, Williams, SA & Shere, S 2012, Cheater detection in vehicular networks. in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012., 6295975, pp. 193-200, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom, 6/25/12. https://doi.org/10.1109/TrustCom.2012.103
Huang D, Williams SA, Shere S. Cheater detection in vehicular networks. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012. p. 193-200. 6295975 https://doi.org/10.1109/TrustCom.2012.103
Huang, Dijiang ; Williams, Sean A. ; Shere, Swaroop. / Cheater detection in vehicular networks. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012. pp. 193-200
@inproceedings{63877377c9bb44b6849985904bfcbb96,
title = "Cheater detection in vehicular networks",
abstract = "In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify cheaters. Vehicles can broadcast a congestion event to other vehicles. However, a rogue vehicle can also broadcast a bogus congestion message in order to get advantage over other vehicles for malicious purposes. To address this cheating problem, we develop a cheater detection protocol, in which each vehicle only depends on local velocity and distance measurements to validate the congestion event sent by a vehicle. Our presented protocol is based on the traffic flow theory to detect the Kinematic wave caused by congestion. The presented cheater detection solution is effective in that it only requires vehicles to communicate with its neighboring vehicles without relying on a centralized controlled congestion detection and prediction system.",
author = "Dijiang Huang and Williams, {Sean A.} and Swaroop Shere",
year = "2012",
doi = "10.1109/TrustCom.2012.103",
language = "English (US)",
isbn = "9780769547459",
pages = "193--200",
booktitle = "Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012",

}

TY - GEN

T1 - Cheater detection in vehicular networks

AU - Huang, Dijiang

AU - Williams, Sean A.

AU - Shere, Swaroop

PY - 2012

Y1 - 2012

N2 - In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify cheaters. Vehicles can broadcast a congestion event to other vehicles. However, a rogue vehicle can also broadcast a bogus congestion message in order to get advantage over other vehicles for malicious purposes. To address this cheating problem, we develop a cheater detection protocol, in which each vehicle only depends on local velocity and distance measurements to validate the congestion event sent by a vehicle. Our presented protocol is based on the traffic flow theory to detect the Kinematic wave caused by congestion. The presented cheater detection solution is effective in that it only requires vehicles to communicate with its neighboring vehicles without relying on a centralized controlled congestion detection and prediction system.

AB - In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify cheaters. Vehicles can broadcast a congestion event to other vehicles. However, a rogue vehicle can also broadcast a bogus congestion message in order to get advantage over other vehicles for malicious purposes. To address this cheating problem, we develop a cheater detection protocol, in which each vehicle only depends on local velocity and distance measurements to validate the congestion event sent by a vehicle. Our presented protocol is based on the traffic flow theory to detect the Kinematic wave caused by congestion. The presented cheater detection solution is effective in that it only requires vehicles to communicate with its neighboring vehicles without relying on a centralized controlled congestion detection and prediction system.

UR - http://www.scopus.com/inward/record.url?scp=84868101006&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84868101006&partnerID=8YFLogxK

U2 - 10.1109/TrustCom.2012.103

DO - 10.1109/TrustCom.2012.103

M3 - Conference contribution

AN - SCOPUS:84868101006

SN - 9780769547459

SP - 193

EP - 200

BT - Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

ER -