Cheater detection in vehicular networks

Dijiang Huang, Sean A. Williams, Swaroop Shere

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify cheaters. Vehicles can broadcast a congestion event to other vehicles. However, a rogue vehicle can also broadcast a bogus congestion message in order to get advantage over other vehicles for malicious purposes. To address this cheating problem, we develop a cheater detection protocol, in which each vehicle only depends on local velocity and distance measurements to validate the congestion event sent by a vehicle. Our presented protocol is based on the traffic flow theory to detect the Kinematic wave caused by congestion. The presented cheater detection solution is effective in that it only requires vehicles to communicate with its neighboring vehicles without relying on a centralized controlled congestion detection and prediction system.

Original languageEnglish (US)
Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
Pages193-200
Number of pages8
DOIs
StatePublished - Nov 5 2012
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
Duration: Jun 25 2012Jun 27 2012

Publication series

NameProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

Other

Other11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
CountryUnited Kingdom
CityLiverpool
Period6/25/126/27/12

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Cheater detection in vehicular networks'. Together they form a unique fingerprint.

  • Cite this

    Huang, D., Williams, S. A., & Shere, S. (2012). Cheater detection in vehicular networks. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 (pp. 193-200). [6295975] (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012). https://doi.org/10.1109/TrustCom.2012.103