TY - GEN
T1 - Cheater detection in vehicular networks
AU - Huang, Dijiang
AU - Williams, Sean A.
AU - Shere, Swaroop
PY - 2012/11/5
Y1 - 2012/11/5
N2 - In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify cheaters. Vehicles can broadcast a congestion event to other vehicles. However, a rogue vehicle can also broadcast a bogus congestion message in order to get advantage over other vehicles for malicious purposes. To address this cheating problem, we develop a cheater detection protocol, in which each vehicle only depends on local velocity and distance measurements to validate the congestion event sent by a vehicle. Our presented protocol is based on the traffic flow theory to detect the Kinematic wave caused by congestion. The presented cheater detection solution is effective in that it only requires vehicles to communicate with its neighboring vehicles without relying on a centralized controlled congestion detection and prediction system.
AB - In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify cheaters. Vehicles can broadcast a congestion event to other vehicles. However, a rogue vehicle can also broadcast a bogus congestion message in order to get advantage over other vehicles for malicious purposes. To address this cheating problem, we develop a cheater detection protocol, in which each vehicle only depends on local velocity and distance measurements to validate the congestion event sent by a vehicle. Our presented protocol is based on the traffic flow theory to detect the Kinematic wave caused by congestion. The presented cheater detection solution is effective in that it only requires vehicles to communicate with its neighboring vehicles without relying on a centralized controlled congestion detection and prediction system.
UR - http://www.scopus.com/inward/record.url?scp=84868101006&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84868101006&partnerID=8YFLogxK
U2 - 10.1109/TrustCom.2012.103
DO - 10.1109/TrustCom.2012.103
M3 - Conference contribution
AN - SCOPUS:84868101006
SN - 9780769547459
T3 - Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
SP - 193
EP - 200
BT - Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
T2 - 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Y2 - 25 June 2012 through 27 June 2012
ER -