A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 339)


Communication in Vehicular ad hoc Network relies on exchange of information among different vehicular nodes in the network. This helps to improve the safety, driving efficiency and comfort on the journey for the travellers. In this network, information received from other vehicles is utilized to make majority of the decisions. However, a node may behave malicious or selfish in order to get advantage over other vehicles. A misbehaving node may transmit false alerts, tamper messages, create congestion in the network, drop, delay and duplicate packets. Thus, detecting misbehavior in VANET is very crucial and indispensible as it might have disastrous consequences. This paper presents a detailed survey on some of the important research works proposed on detecting misbehavior and malicious nodes in VANETs. In addition to the details about the techniques used for misbehavior detection, nature of misbehavior, this paper categorizes the schemes for better understanding and also outlines several research scopes to make VANET more reliable and secure.


Vehicular ad-hoc networks (VANETs) Misbehavior Detection Malicious vehicles Security 


  1. 1.
    Wang, Z., Chigan, C.: Countermeasure uncooperative behaviors with dynamic trust-token in VANETs. In: IEEE International Conference on Communications, ICC’07, pp. 3959–3964 (2007)Google Scholar
  2. 2.
    Al-kahtani, M.S.: Survey on security attacks in vehicular ad hoc networks (VANETs). In: 6th IEEE International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–9 (2012)Google Scholar
  3. 3.
    Ghosh, M., Varghese, A., Kherani, A.A., Gupta, A.: Distributed misbehavior detection in VANETs. In: Wireless Communications and Networking Conference, WCNC IEEE, pp. 1–6 (2009)Google Scholar
  4. 4.
    Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in VANET with integrated root-cause analysis. Ad Hoc Netw. 8, 778–790 (2010)CrossRefGoogle Scholar
  5. 5.
    Kim, C.H., Bae, I.H.: A misbehavior based reputation management system for VANETS. LNEE 181, 441–450 (2012)Google Scholar
  6. 6.
    Daeinabi, A., Rahbar, A.G.: Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks. Multimedia Tools Appl. 66(2), 325–338 (2013)CrossRefGoogle Scholar
  7. 7.
    Kadam, M., Limkar, S.: D and PMV: new approach for detection and prevention of misbehave/malicious vehicles from VANET. In: Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013. AISC, vol. 247, pp. 287–295. Springer, Heidelberg (2014)Google Scholar
  8. 8.
    Wahab, O.A., Otrok, H., Mourad, A.: A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Comput. Commun. 41, 43–54 (2014). ElsevierCrossRefGoogle Scholar
  9. 9.
    Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S.N., Kherani, A.A.: Application of secondary information for misbehavior detection in VANETs. IFIP. LNCS, vol. 6091, pp. 385–396. Springer, Berlin (2010)Google Scholar
  10. 10.
    Harit, S.K., Singh, G., Tyagi, N.: Fox-hole model for data-centric misbehavior detection in VANETs. In: 3rd International Conference on Computer and Communication Technology (ICCCT), pp. 271–277 (2012)Google Scholar
  11. 11.
    Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: Vehicular Technology Conference (VTC Fall), IEEE, pp. 1–5 (2011)Google Scholar
  12. 12.
    Wasef, A., Jiang, Y., Shen, X.: Ecmv: efficient certificate management scheme for vehicular networks. In: GLOBECOM, IEEE, pp. 639–643 (2008)Google Scholar
  13. 13.
    Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007)CrossRefGoogle Scholar
  14. 14.
    Calandriello, G., Papadimitratos, P., Hubaux, J.P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Vehicular ad hoc Networks, pp. 19–28. ACM, New York (2007)Google Scholar
  15. 15.
    Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589–3603 (2010)CrossRefGoogle Scholar
  16. 16.
    Rezgui, J., Cherkaoui, S.: Detecting faulty and malicious vehicles using rule based communications data mining. In: IEEE 36th Conference on Local Computer Networks (LCN), IEEE, pp. 827–834 (2011)Google Scholar
  17. 17.
    Grover J., Prajapati N.K, Laxmi V., Gaur M.S: Machine learning approach for multiple misbehavior detection in VANET. In: CCIS, vol. 192, pp. 644–653. Springer, Berlin (2011)Google Scholar
  18. 18.
    Grover J., Laxmi V., Gaur M.S. Misbehavior detection based on ensemble learning in VANET. In: ADCONS. LNCS, vol. 7135, pp. 602–611. Springer, Berlin (2011)Google Scholar
  19. 19.
    Barnwal, R.P., Ghosh, S.K.: Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks. In: 2012 International Conference on Connected Vehicles and Expo (ICCVE), pp. 29–34 (2012)Google Scholar
  20. 20.
    Huang D., Williams, S.A., Shere, S.: Cheater detection in vehicular networks. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 193–200 (2012)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity Institute of Technology, RGPVBhopalIndia

Personalised recommendations