Skip to main content
Erschienen in: Wireless Personal Communications 1/2023

19.03.2023

Malicious Node Detection in Vehicular Ad-hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM-CP)

verfasst von: Chitvan Gupta, Laxman Singh, Rajdev Tiwari

Erschienen in: Wireless Personal Communications | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an aggressor aims to pose duplicate information or reprise the present information. Every vehicle in VANET broadcast short packet of data which is called as beacon packets. Beacon Packets carries the vehicle identifier, vehicle’s present geographical location and speed at specific time. The duplicated information from the aggressor appropriately synchronizes the same location creating the impression of a collision, a gridlock, or emergency braking. The utilization of the channel is degraded due to attackers and poses a severe effect on the security algorithms of VANET. This paper proposes a novel trust management scheme named Enhanced Beacon Trust Management with Clustering Protocol (EBTM-CP) for the efficient selection of cluster heads and malicious node detection. The implementation of this protocol will deliver promising output as it aims to establish the reliance between the vehicles associated with the network to enhance the vehicle safety, which results authentic, accurate and reliable message to be broadcasted inside the network. Simulation results show that the suggested EBTM-CP superior to cutting-edge technology trust model in terms of throughput, PDR, energy consumption, packet loss, end-to-end delay, and packet length, with 297.99 Kbps, 46.34%, 13%, 165.6 Mbps, 67.49%, 16.34% respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tripathi, V. K., & Venkaeswari, S. (2015). Secure communication with privacy preservation in VANET-using multilingual translation. Proc. IEEE GCCT, 2015, 125–127. Tripathi, V. K., & Venkaeswari, S. (2015). Secure communication with privacy preservation in VANET-using multilingual translation. Proc. IEEE GCCT, 2015, 125–127.
2.
Zurück zum Zitat Xu, C., Zhao, F., & Guan, J. (2013). QoE-driven user-centric VoD services in urban multihomed P2P-based vehicular networks. IEEE Transactions on Vehicular Technology, 62(5), 2273–2289.CrossRef Xu, C., Zhao, F., & Guan, J. (2013). QoE-driven user-centric VoD services in urban multihomed P2P-based vehicular networks. IEEE Transactions on Vehicular Technology, 62(5), 2273–2289.CrossRef
3.
Zurück zum Zitat Hussain, S., Faizan, M., & Hayee, M.I. (2018). Real-time relative lane and position identification of surrounding vehicles using GPS and DSRC based vehicle-to-vehicle communication. In Proc. IEEE ICC, pp. 1–7. Hussain, S., Faizan, M., & Hayee, M.I. (2018). Real-time relative lane and position identification of surrounding vehicles using GPS and DSRC based vehicle-to-vehicle communication. In Proc. IEEE ICC, pp. 1–7.
4.
Zurück zum Zitat S. Mitra, B., Jana, & Poray, J. (2016). A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks (CRVANETs). In Proc. IEEE ICCECE, pp.1–5. S. Mitra, B., Jana, & Poray, J. (2016). A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks (CRVANETs). In Proc. IEEE ICCECE, pp.1–5.
5.
Zurück zum Zitat Xu, C., Liu, T., & Guan, J. (2013). CMT-QA: Quality-aware adaptive concurrent multipath data transfer in heterogeneous wireless networks. IEEE Transactions on Mobile Computing, 12(11), 2193–2205.CrossRef Xu, C., Liu, T., & Guan, J. (2013). CMT-QA: Quality-aware adaptive concurrent multipath data transfer in heterogeneous wireless networks. IEEE Transactions on Mobile Computing, 12(11), 2193–2205.CrossRef
6.
Zurück zum Zitat Vighnesh. N. V., Kavita, N., Urs, S. R. (2011). Vehicle authentication scheme based on random permutation for VANET. In Proc. IEEE World Congress on Information and Communication Technologies, pp. 722–726. Vighnesh. N. V., Kavita, N., Urs, S. R. (2011). Vehicle authentication scheme based on random permutation for VANET. In Proc. IEEE World Congress on Information and Communication Technologies, pp. 722–726.
7.
Zurück zum Zitat Cheng, X., Yang, L., & Shen, X. (2015). D2D for intelligent transportation systems: A feasibility study. IEEE Transactions on Intelligent Transportation Systems, 16(4), 1784–1793.CrossRef Cheng, X., Yang, L., & Shen, X. (2015). D2D for intelligent transportation systems: A feasibility study. IEEE Transactions on Intelligent Transportation Systems, 16(4), 1784–1793.CrossRef
8.
Zurück zum Zitat Hao, Y., Cheng, Y., Zhou, C., & Song, W. (2011). A distributed key management framework with cooperative message authentication in VANETs. IEEE Journal on Selected Areas in Communications, 29(3), 616–629.CrossRef Hao, Y., Cheng, Y., Zhou, C., & Song, W. (2011). A distributed key management framework with cooperative message authentication in VANETs. IEEE Journal on Selected Areas in Communications, 29(3), 616–629.CrossRef
9.
Zurück zum Zitat Tan, H., Choi, D., Kim, P., Pan, S., & Chung, I. (2017). Comments on ’ ’dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 99, 1–3. Tan, H., Choi, D., Kim, P., Pan, S., & Chung, I. (2017). Comments on ’ ’dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 99, 1–3.
10.
Zurück zum Zitat Chuang, M. C., & Chen, M. C. (2013). DEEP: Density-aware emergency message extension protocol for VANETs. IEEE Transactions on Wireless Communications, 12(10), 4983–4993.CrossRef Chuang, M. C., & Chen, M. C. (2013). DEEP: Density-aware emergency message extension protocol for VANETs. IEEE Transactions on Wireless Communications, 12(10), 4983–4993.CrossRef
11.
Zurück zum Zitat Song, J., He, C., Zhang, L., Tang, S., & Zhang, H. (2014). Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Communications, 11(9), 93–103.CrossRef Song, J., He, C., Zhang, L., Tang, S., & Zhang, H. (2014). Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Communications, 11(9), 93–103.CrossRef
12.
Zurück zum Zitat Slavik, M., & Mahgoub, I. (2012). Spatial distribution and channel quality adaptive protocol for multi hop wireless broadcast routing in VANET. IEEE Transactions on Mobile Computing, 12(4), 722–734.CrossRef Slavik, M., & Mahgoub, I. (2012). Spatial distribution and channel quality adaptive protocol for multi hop wireless broadcast routing in VANET. IEEE Transactions on Mobile Computing, 12(4), 722–734.CrossRef
13.
Zurück zum Zitat Khelifi, H., Luo, S., Nour, B., & Shah, S. C. (2018). Security and privacy issues in vehicular named data networks: An overview. Mobile Information Systems, 2018, 11.CrossRef Khelifi, H., Luo, S., Nour, B., & Shah, S. C. (2018). Security and privacy issues in vehicular named data networks: An overview. Mobile Information Systems, 2018, 11.CrossRef
14.
Zurück zum Zitat Mahmood, J., Duan, Z., Yang, Y., Wang, Q., Nebhen, J., & Bhutta, M. N. M. (2021). Security in vehicular ad hoc networks: Challenges and countermeasures. Security and Communication Networks, 2021, 20.CrossRef Mahmood, J., Duan, Z., Yang, Y., Wang, Q., Nebhen, J., & Bhutta, M. N. M. (2021). Security in vehicular ad hoc networks: Challenges and countermeasures. Security and Communication Networks, 2021, 20.CrossRef
15.
Zurück zum Zitat Alhaidari, F. A., & Alrehan, A. M. (2021). A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc network systems. International Journal of Distributed Sensor Networks, 17(3), 15501477211000288.CrossRef Alhaidari, F. A., & Alrehan, A. M. (2021). A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc network systems. International Journal of Distributed Sensor Networks, 17(3), 15501477211000288.CrossRef
16.
Zurück zum Zitat Aggarwal, S. S., Kumar, P. (2016). Analysis of various issues in non-local means image denoising algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 5(5). Aggarwal, S. S., Kumar, P. (2016). Analysis of various issues in non-local means image denoising algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 5(5).
17.
Zurück zum Zitat Hamdan, S., Hudaib, A., & Awajan, A. (2021). Detecting Sybil attacks in vehicular ad hoc networks. International Journal of Parallel, Emergent and Distributed Systems, 36, 69–70.CrossRef Hamdan, S., Hudaib, A., & Awajan, A. (2021). Detecting Sybil attacks in vehicular ad hoc networks. International Journal of Parallel, Emergent and Distributed Systems, 36, 69–70.CrossRef
18.
Zurück zum Zitat Khan, U., Agrawala, S., & Silakari, S. (2015). Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Procedia Computer Science, 22(46), 965–972.CrossRef Khan, U., Agrawala, S., & Silakari, S. (2015). Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Procedia Computer Science, 22(46), 965–972.CrossRef
19.
Zurück zum Zitat Nascimento, D. A. D., Iano, Y., Loschi, H. J., Razmjooy, N., Sroufe, R., Oliveira, V. D. J. S., & Montagner, M. (2019). Sustainable Adoption of connected vehicles in the Brazilian landscape: Policies. Technical Specifications and Challenges Transactions on Environment and Electrical Engineering, 3(1), 44.CrossRef Nascimento, D. A. D., Iano, Y., Loschi, H. J., Razmjooy, N., Sroufe, R., Oliveira, V. D. J. S., & Montagner, M. (2019). Sustainable Adoption of connected vehicles in the Brazilian landscape: Policies. Technical Specifications and Challenges Transactions on Environment and Electrical Engineering, 3(1), 44.CrossRef
20.
Zurück zum Zitat Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on Dempster Shafer for detecting misbehaving vehicles. Computer Communications, 41, 43–54.CrossRef Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on Dempster Shafer for detecting misbehaving vehicles. Computer Communications, 41, 43–54.CrossRef
21.
Zurück zum Zitat Ghosh, M., Varghese, A., Gupta, A., Kherani, A., & Muthaiah, S. N. (2010) Detecting misbehaviour in VANET with integrated root-cause analysis. In Proceedings of the sixth ACM international workshop on Vehicular Inter networking, Association for Computing Machinery, vol. 8, pp. 123–124 Ghosh, M., Varghese, A., Gupta, A., Kherani, A., & Muthaiah, S. N. (2010) Detecting misbehaviour in VANET with integrated root-cause analysis. In Proceedings of the sixth ACM international workshop on Vehicular Inter networking, Association for Computing Machinery, vol. 8, pp. 123–124
22.
Zurück zum Zitat Alkhalidy, M., Serhan, A. F., Alsarhan, A., & Igried, B. (2022). A new scheme for detecting malicious nodes in vehicular ad hoc networks based on monitoring node behavior. Future Internet, 14, 223.CrossRef Alkhalidy, M., Serhan, A. F., Alsarhan, A., & Igried, B. (2022). A new scheme for detecting malicious nodes in vehicular ad hoc networks based on monitoring node behavior. Future Internet, 14, 223.CrossRef
23.
Zurück zum Zitat Xu, X., Wang, Y., & Wang, P. (2022). Comprehensive review on misbehaviour detection for vehicular ad-hoc networks. Hindawi Journal of Advanced Transportation, 2022, 27. Xu, X., Wang, Y., & Wang, P. (2022). Comprehensive review on misbehaviour detection for vehicular ad-hoc networks. Hindawi Journal of Advanced Transportation, 2022, 27.
24.
Zurück zum Zitat Malik, A., Khan, M. Z., Faisal, M., Khan, F., & Seo, J. T. (2022). An efficient dynamic solution for the detection and prevention of black hole attack in VANETs. Sensors, 22(5), 1897.CrossRef Malik, A., Khan, M. Z., Faisal, M., Khan, F., & Seo, J. T. (2022). An efficient dynamic solution for the detection and prevention of black hole attack in VANETs. Sensors, 22(5), 1897.CrossRef
25.
Zurück zum Zitat Fatemidokht, H., & Rafsanjani, M. K. (2020). QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks. Journal of Systems and Software, 165, 110561.CrossRef Fatemidokht, H., & Rafsanjani, M. K. (2020). QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks. Journal of Systems and Software, 165, 110561.CrossRef
26.
Zurück zum Zitat Hassan, Z., Mehmood, A., Maple, C., Khan, M. A., & Aldegheishem, A. (2020). Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access, 8, 199618–199628.CrossRef Hassan, Z., Mehmood, A., Maple, C., Khan, M. A., & Aldegheishem, A. (2020). Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access, 8, 199618–199628.CrossRef
27.
Zurück zum Zitat Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532–183544.CrossRef Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532–183544.CrossRef
28.
Zurück zum Zitat Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258–47267.CrossRef Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258–47267.CrossRef
29.
Zurück zum Zitat Oubabas, A., Aoudjit, R., Rodrigues, J. J. P. C., & Talbi, S. (2018). Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme. Vehicular Communications, 13, 128–138.CrossRef Oubabas, A., Aoudjit, R., Rodrigues, J. J. P. C., & Talbi, S. (2018). Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme. Vehicular Communications, 13, 128–138.CrossRef
30.
Zurück zum Zitat Liu, X., Xia, Y., Chen, W., Xiang, Y., Hassan, M. M., & Alelaiwi, A. (2016). SEMD: Secure and efficient message dissemination with policy enforcement in VANET. Journal of Computer and System Sciences, 82(8), 1316–1328.MathSciNetMATHCrossRef Liu, X., Xia, Y., Chen, W., Xiang, Y., Hassan, M. M., & Alelaiwi, A. (2016). SEMD: Secure and efficient message dissemination with policy enforcement in VANET. Journal of Computer and System Sciences, 82(8), 1316–1328.MathSciNetMATHCrossRef
31.
Zurück zum Zitat De Sales, T. B. M., Perkusich, A., de Sales, L. M., de Almeida, H. O., Soares, G., & de Sales, M. (2016). ASAP-V: A privacy-preserving authentication and sybil detection protocol for VANETs. Information Sciences, 372, 208–224.CrossRef De Sales, T. B. M., Perkusich, A., de Sales, L. M., de Almeida, H. O., Soares, G., & de Sales, M. (2016). ASAP-V: A privacy-preserving authentication and sybil detection protocol for VANETs. Information Sciences, 372, 208–224.CrossRef
33.
Zurück zum Zitat Badis, H., & Al Agha, K. (2007). Quality of service for the ad hoc optimized link state routing protocol (QOLSR). Digital Communications and Networks, 3, 180–187. Badis, H., & Al Agha, K. (2007). Quality of service for the ad hoc optimized link state routing protocol (QOLSR). Digital Communications and Networks, 3, 180–187.
34.
Zurück zum Zitat Li, W., & Song, H. (2015). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.CrossRef Li, W., & Song, H. (2015). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.CrossRef
35.
Zurück zum Zitat Kumar, N., Iqbal, R., Misra, S., & Rodrigues, J. J. P. C. (2015). An intelligent approach for building a secure decentralized public key infrastructure in VANET. Journal of Computer and System Sciences, 81(6), 1042–1058.MATHCrossRef Kumar, N., Iqbal, R., Misra, S., & Rodrigues, J. J. P. C. (2015). An intelligent approach for building a secure decentralized public key infrastructure in VANET. Journal of Computer and System Sciences, 81(6), 1042–1058.MATHCrossRef
36.
Zurück zum Zitat Mokdad, L., Ben-Othman, J., & Nguyen, A. T. (2015). DJAVAN: Detecting jamming attacks in vehicle ad hoc networks. Performance Evaluation, 87, 47–59.CrossRef Mokdad, L., Ben-Othman, J., & Nguyen, A. T. (2015). DJAVAN: Detecting jamming attacks in vehicle ad hoc networks. Performance Evaluation, 87, 47–59.CrossRef
37.
Zurück zum Zitat Haddadou, N., Rachedi, A., & Doudane, Y. G. (2014). A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3657–3674.CrossRef Haddadou, N., Rachedi, A., & Doudane, Y. G. (2014). A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3657–3674.CrossRef
38.
Zurück zum Zitat Kumar, N., & Chilamkurti, N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers and Electrical Engineering, 40(6), 1981–1996.CrossRef Kumar, N., & Chilamkurti, N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers and Electrical Engineering, 40(6), 1981–1996.CrossRef
39.
Zurück zum Zitat Sultan, S., Javaid, Q., Malik, A. J., Turjman, F. A., & Attique, M. (2021). Collaborative‑trust approach toward malicious node detection in vehicular ad hoc networks. Environment, Development and Sustainability. 29. Sultan, S., Javaid, Q., Malik, A. J., Turjman, F. A., & Attique, M. (2021). Collaborative‑trust approach toward malicious node detection in vehicular ad hoc networks. Environment, Development and Sustainability. 29.
40.
Zurück zum Zitat Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing, 5, 193–204.CrossRef Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing, 5, 193–204.CrossRef
41.
Zurück zum Zitat Mokhtar, B., & Azab, M. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4), 1115.CrossRef Mokhtar, B., & Azab, M. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4), 1115.CrossRef
42.
Zurück zum Zitat Mühlbauer, R., & Kleinschmidt, J. H. (2018). Bring your own reputation: A feasible trust system for vehicular ad hoc networks article. Journal of Sensor and Actuator Networks, 7, 37.CrossRef Mühlbauer, R., & Kleinschmidt, J. H. (2018). Bring your own reputation: A feasible trust system for vehicular ad hoc networks article. Journal of Sensor and Actuator Networks, 7, 37.CrossRef
43.
Zurück zum Zitat Wang, J., Zhang, Y., Wang, Y., & Gu, X. (2016). RPRep: a robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. International Journal of Distributed Sensor Networks, 12(3), 6138251.CrossRef Wang, J., Zhang, Y., Wang, Y., & Gu, X. (2016). RPRep: a robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. International Journal of Distributed Sensor Networks, 12(3), 6138251.CrossRef
44.
Zurück zum Zitat Tolba, A. M. R. (2018). Trust-based distributed authentication method for collision attack avoidance in VANETs. IEEE Access, 6, 62747–62755.CrossRef Tolba, A. M. R. (2018). Trust-based distributed authentication method for collision attack avoidance in VANETs. IEEE Access, 6, 62747–62755.CrossRef
45.
Zurück zum Zitat Arshad, M., Ullah, Z., Ahmad, N., Khalid, M., Criuckshank, H., & Cao, Y. (2018). A survey of local/cooperative-based malicious information detection techniques in VANETs. EURASIP Journal on Wireless Communications and Networking, 62, 1–17. Arshad, M., Ullah, Z., Ahmad, N., Khalid, M., Criuckshank, H., & Cao, Y. (2018). A survey of local/cooperative-based malicious information detection techniques in VANETs. EURASIP Journal on Wireless Communications and Networking, 62, 1–17.
46.
Zurück zum Zitat Roy, D., & Das, P. (2017). Trust and group leader based model to avoid broadcast storm problem in vehicular ad-hoc networks. Advances in Computational Sciences and Technology, Research India Publications, 10, 575–597. Roy, D., & Das, P. (2017). Trust and group leader based model to avoid broadcast storm problem in vehicular ad-hoc networks. Advances in Computational Sciences and Technology, Research India Publications, 10, 575–597.
47.
Zurück zum Zitat Chen, Y. M., & Wei, Y. C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153–163.CrossRef Chen, Y. M., & Wei, Y. C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153–163.CrossRef
48.
Zurück zum Zitat Gupta, C., Singh, L., & Tiwari, R. (2022). Wormhole attack detection techniques in ad-hoc network: A systematic review. Open Computer Science, 12(1), 260–288.CrossRef Gupta, C., Singh, L., & Tiwari, R. (2022). Wormhole attack detection techniques in ad-hoc network: A systematic review. Open Computer Science, 12(1), 260–288.CrossRef
Metadaten
Titel
Malicious Node Detection in Vehicular Ad-hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM-CP)
verfasst von
Chitvan Gupta
Laxman Singh
Rajdev Tiwari
Publikationsdatum
19.03.2023
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10287-6

Weitere Artikel der Ausgabe 1/2023

Wireless Personal Communications 1/2023 Zur Ausgabe

Neuer Inhalt