A Heuristic Distributed Scheme to Detect Falsification of Mobility Patterns in Internet of Vehicles
- 2 June 2021
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Internet of Things Journal
- Vol. 9 (1), 719-727
- https://doi.org/10.1109/jiot.2021.3085315
Abstract
Autonomous vehicles in the Internet of Vehicles (IoV) have the ability to generate their mobility pattern in advance and share it with other vehicles or a central location. This information enables traffic systems to be aware of future traffic flow. However, the current classical traffic systems barely consider the spatial dependency of traffic data, and more advanced systems suffer from storage limitations. These problems will be exacerbated by the falsification of traffic data through corresponding data attacks, such as position forging attacks. This, in turn, negatively impacts the performance of traffic management systems. This paper proposes a heuristic distributed scheme (HIDE) to validate the mobility pattern of vehicles by penalizing or rewarding vehicles based on the contacts’ conformation. HIDE enables every vehicle to consider the claimed mobility pattern of every neighboring vehicle that is exchanged, and assigns a penalty or reward to each received mobility pattern and share with cloudlets via road side units (RSUs). These calculations are based on an efficient time-homogeneous semi-Markov process (THSMP) to predict the likelihood of the accuracy of mobility patterns. Cloudlets calculate a weight factor to determine if a vehicle is malicious. The validation results from THSMP reveal that a high correlation is achieved between the theoretical model and simulation. Also, the results show that the model fairly identifies the malicious vehicles and assigns a low weight of impact on them compared to normal vehicles.This publication has 23 references indexed in Scilit:
- Detecting False Position Attack in Vehicular Communications Using Angular CheckPublished by Association for Computing Machinery (ACM) ,2017
- Inter-vehicle communication assisted localization with resilience to false data injection attacksPublished by Association for Computing Machinery (ACM) ,2016
- A Novel Mobility-Based Routing Protocol for Semi-Predictable Disruption Tolerant NetworksInternational Journal of Wireless Information Networks, 2015
- Connected Vehicles: Solutions and ChallengesIEEE Internet of Things Journal, 2014
- Detecting Sybil attacks in vehicular networksJournal of Trust Management, 2014
- A comprehensive survey on vehicular Ad Hoc networkJournal of Network and Computer Applications, 2014
- DTN Routing with Probabilistic Trajectory PredictionLecture Notes in Computer Science, 2008
- Eviction of Misbehaving and Faulty Nodes in Vehicular NetworksIEEE Journal on Selected Areas in Communications, 2007
- Adaptive equalization and diversity combining for mobile radio using interpolated channel estimatesIEEE Transactions on Vehicular Technology, 1991
- Dynamic probabilistic system, R. A. Howard, Wiley, New York. Vol. 1, No. of pages: 576. Price: £7·90. Vol. 2, No. of pages: 1108. Price: £8·75International Journal for Numerical Methods in Engineering, 1972