Abstract
Malicious node detection in vehicular ad hoc network (VANET) has always been a research hot spot. An efficient misbehavior detection scheme is needed to avoid and reduce the factor of selfishness and maliciousness especially in the case where the selfish beacons exploit the medium. To disseminate honest data over VANET infrastructure, it is very essential for nodes to collaborate with each other during the process of message forwarding and to ensure the successful delivery of honest data over the network. However, using the fake identities in message forwarding process easily results in the dissemination forged data over the network. Therefore, most of the existing techniques for detection of misbehavior in VANET use collaborative-trust–reputation-based approaches to tackle the issue forged and fake data transmission. The objective of this research is to calculate the trust weightages of each vehicle over the network and to reduce the intensity of the malicious vehicular nodes in VANET. The proposed collaboration-based maliciousness detection mechanism comprises data trust module and reputation calculating module, which guarantees honest data communication and reduces the false positive rate of malicious vehicular nodes. The data trust module uses trust evaluation and reputation calculation model to decide whether the vehicle is trustworthy using vehicular behavior vector in the context of packet transmission. The vehicular trust authority uses collaborative approach to integrate several trust evaluation assessments about a particular vehicular node and formulate a complete trust assessment. The performance evaluation shows that the proposed scheme delivers more priority messages with high true positive rate and low false positive rate. Moreover, the experimental results show that Gaussian kernel function best suits our proposed model in comparison with other rationalities. In addition, proposed models are more vigorous in context of true positive rate than the existing schemes, i.e., Dempster–Shafer theory of evidence, majority voted model and Bayesian inference.








Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Abdulkader, Z. A., Abdullah, A., Abdullah, M. T., & Zukarnain, Z. A. (2017). Vehicular ad hoc networks and security issues: Survey. Modern Appl Sci, 11(5), 1–30. https://doi.org/10.5539/mas.v11n5p30
Bonomi, F. (2011). Connected vehicles, the internet of things, and fog computing. The Eighth ACM International Workshop on Vehicular Internetworking (VANET). https://doi.org/10.1145/2342509.2342513
ChauHua, L., Hossein, M., & PorLip, Y. (2017). Social networking-based cooperation mechanisms in vehicular ad-hoc network-A survey. Vehicular Communications. https://doi.org/10.1016/j.vehcom.2017.11.001
De, M.V., Brundo, R., & Brandic, I. (2019). Energy and profit aware proof-of-stake offloading in blockchain-based VANETs. Proceedings of 12th IEEE/ACM international conference on utility and cloud computing UCC 19, 177–186. https://doi.org/10.1145/3344341.3368797
Gu, K., Dong, X. Y., & Jia, W. (2020). Malicious node detection scheme based on correlation of data and network topology in fog-computing based VANETs. IEEE Transaction on Cloud Computing, 5(2), 1–18. https://doi.org/10.1109/TCC.2020.2985050
Habeeb, N. J., & Weli, S. T. (2020). Relationship of smart cities and smart tourism: An overview. HighTech Innovat J, 1(4), 194–202. https://doi.org/10.28991/HIJ-2020-01-04-07
Hasan, M., Mohan, S., Shimizu, T., & Lu, H. (2020). Securing vehicle-to-everything (V2X) communication platforms. IEEE Transactions on Intelligent Vehicles, 25(1), 1–22.
Hernandez-Orallo, E., David, O., Cano, C., & Calafate, T. (2015). CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes. IEEE Transactions on Mobile Computing, 14(6), 1162–1175. https://doi.org/10.1109//TMC.2014.2343627
Huang, C., Lu, R., & Choo, K. K. R. (2017). Vehicular fog computing: Architecture, use case, and security and forensic challenges. IEEE Communications Magazine, 55(11), 105–111. https://doi.org/10.1109/MCOM.2017.170032
Huang, Z., Ruj, S., Cavenaghi, M. A., Stojmenovic, M., & Nayak, A. (2014). A social network approach to trust management in VANETs. Peer Peer Netw. Appl, 7(3), 229–242. https://doi.org/10.1007/s12083-012-0136-8
Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems, 101(3), 843–864. https://doi.org/10.1016/j.future.2019.07.006
Iftikhar, A., Zawar, H. K., Aaron, G., Khurram, S., Khattak, M. A. K., Murtaza, A., & Nasru, M. (2020). Macroscopic traffic flow characterization at bottlenecks. Civil Engineering Journal, 6(7), 1227–1242. https://doi.org/10.28991/cej-2020-03091543
Khatib, A., Mourad, A., Otrok, H., Wahab, O. A., & Bentahar, J. (2015). A cooperative detection model based on artificial neural network for VANET QoS-OLSR protocol. IEEE ICUWB. https://doi.org/10.1109/ICUWB.2015.7324400
Kim, C. H., & Bae, I. H. (2012). A misbehavior-based reputation management system for VANETs. Lecture Notes in Electrical Engineering. https://doi.org/10.1007/978-94-007-5076-0_54
Lu, T., Chang, S., & Li, W. (2018). Fog computing enabling geographic routing for urban area vehicular network. Peer Peer Netw, 4(11), 749–755. https://doi.org/10.1007/s12083-017-0560-x
Manivannan, D., Shawkat, M., & Zeadally, S. (2020). Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Vehicular Communications, 25(2), 1–18. https://doi.org/10.1016/j.vehcom.2020.100247
Minhas, U. F., Zhang, J., Tran, T., & Cohen, R. (2011). A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. Syst Man Cybern. Appl Rev, 41(3), 407–420. https://doi.org/10.1109/TSMCC.2010.2084571
Molina-Gil, J., Caballero-Gil, P., & Caballero-Gil, G. (2012). Countermeasures to prevent misbehavior in VANETs. J UCS, 18(6), 857–873.
Mukherjee, M., Matam, R., & Shu, L. (2017). Security and privacy in fog computing: Challenges. IEEE Access, 5, 19293–19304. https://doi.org/10.1109/ACCESS.2017.2749422
Ning, Z. (2018). cooperative quality-aware service access system for social internet of vehicles. IEEE Internet of Things Journal, 59(4), 2506–2517. https://doi.org/10.1109/JIOT.2017.2764259
Placzek, B., & Bernas, M. (2017). Detection of malicious data in vehicular ad hoc networks for traffic signal control applications. International Conference on Computer Networks, 608, 72–82. https://doi.org/10.1007/978-3-319-39207-3_7
Rawat, D. B., Bista, B. B., Yan, G., & Weigle, M. C. (2011). Securing vehicular ad-hoc networks against malicious drivers: A probabilistic approach. IEEE CISIS. https://doi.org/10.1109/CISIS.2011.30
Rehman, G., Ghani, A., Zubair, M., Saeed, I., & Singh, D. (2020). SOS: Socially omitting selfishness in IoT for smart and connected communities. International Journal of Communication Systems, 1(25), 1–16. https://doi.org/10.1002/dac.4455
Rivero-Garcia, A., Santos-Gonzalez, I., Caballero-Gil, I., & Caballero-Gil, P. (2016). Vanet event verification based on user trust. 24th Euromicro International Conference on Parallel, Distributed, and Network Based Processing (PDP), 5(25), 313–316. https://doi.org/10.1109/PDP.2016.13
Rrecaj, A., Alimehaj, V., Malenkovska, M., & Mitrovski, C. (2021). An improved CTM model for urban signalized intersections and exploration of traffic evaluation. Civil Engineering Journal, 7(2), 357–375. https://doi.org/10.28991/cej-2021-03091659
Sichitiu, M., & Kihl, M. (2008). Inter-vehicle communication systems: A survey. IEEE Communications Surveys and Tutorials, 10(2), 88–105. https://doi.org/10.1109/COMST.2008.4564481
Tanzila, S., Tariq, S., Amjad, R., Zahid, M., & Qaisar, J. (2021). Intrusion detection system through advance machine learning for the internet of things networks. IT Professional, 23(2), 58–64. https://doi.org/10.1109/MITP.2020.2992710
Van-der-Heijden, R.W., Kargl, F., Abu-Sharkh, O.M., & Al-Momani, A. (2016). Enhanced position verification for vanets using subjective logic. IEEE 84th Vehicular Technology Conference (VTC-Fall), 1–7. https://doi.org/10.1109/VTCFall.2016.7881000
Velayudhan, N. C., Anitha, A., Madanan, M., & Paul, V. (2019). Review on avoiding Sybil in VANET while operating in an urban environment. Journal of Theoretical and Applied Information Technology. https://doi.org/10.35940/ijrte.E1008.0285S20
Wahab, O. A., Mourad, A., Otrok, H., & Bentahar, J. (2016). CEAP: SVM based intelligent detection model for clustered vehicular ad hoc networks. Expert Systems with Applications, 50, 40–54. https://doi.org/10.1016/j.eswa.2015.12.006
Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Computer Communications, 41(5), 43–54. https://doi.org/10.1016/j.comcom.2013.02.005
Yao, Y., Xiao, B., Wu, G., Liu, X., Yu, Z., Zhang, K., & Zhou, X. (2017). Voiceprint: A novel Sybil attack detection method based on RSSI for VANETs. 47th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw, 591–602. https://doi.org/10.1109/DSN.2017.10
Zaidi, K., Milojevic, M. B., Rakocevic, V., Nallanathan, A., & Rajarajan, M. (2016). Host-based intrusion detection for vanets: A statistical approach to rogue node detection. IEEE Transactions on Vehicular Technology, 65(8), 6703–6714. https://doi.org/10.1109/TVT.2015.2480244
Zaidi, K., Milojevic, M., Rakocevic, V., & Rajarajan, M. (2014). Data-centric rogue node detection in vanets. IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 398–405. https://doi.org/10.1109/TrustCom.2014.51
Acknowledgements
The authors received no financial support for the research and publication of this article.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest in this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sultan, S., Javaid, Q., Malik, A.J. et al. Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ Dev Sustain 24, 7532–7550 (2022). https://doi.org/10.1007/s10668-021-01632-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10668-021-01632-5
