z-logo
open-access-imgOpen Access
Beacon trust management system and fake data detection in vehicular ad‐hoc networks
Author(s) -
Arshad Muhammad,
Ullah Zahid,
Khalid Muhammad,
Ahmad Naveed,
Khalid Waqar,
Shahwar Duri,
Cao Yue
Publication year - 2019
Publication title -
iet intelligent transport systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.579
H-Index - 45
eISSN - 1751-9578
pISSN - 1751-956X
DOI - 10.1049/iet-its.2018.5117
Subject(s) - wireless ad hoc network , computer science , vehicular ad hoc network , computer network , overhead (engineering) , mobile ad hoc network , event (particle physics) , scheme (mathematics) , computer security , trust management (information system) , wireless , telecommunications , mathematical analysis , physics , mathematics , quantum mechanics , network packet , operating system
A vehicular ad‐hoc network is an emerged technology, where vehicles communicate with one another and Road Side Units. Vehicular ad‐hoc networks are categorised as a sub‐branch of mobile ad‐hoc networks, and they help in enhancing traffic efficiency and safety. Vehicular ad‐hoc networks facilitate communication by dissemination of messages relaying through vehicles. However, malicious nodes can propagate false safety alert in a network due to its malicious behaviour or selfishness. False messages in vehicular ad‐hoc networks can change drivers behaviour and create a disastrous situation in the network. Therefore, it is more important to thwart these false messages. The article presents a beacon trust management system and fake data detection (BTMS‐FDD) scheme. The trust management system uses speed and density information to establish a relationship with vicinity vehicles. The false safety event detection scheme uses relative safety and beacon messages to detect false safety event more accurately. For false safety events, a scheme uses position and speed information of beacon and safety‐related messages. To analyse the performance of proposed detection scheme, it is compared with ELIDV and host IDS schemes. The simulation results demonstrate that proposed malicious data detection scheme is better in terms of true positive, false positive and overhead.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here