IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v15y2019i2p1550147719827500.html
   My bibliography  Save this article

Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment

Author

Listed:
  • Yan Xin
  • Xia Feng

Abstract

In vehicular ad hoc networks, attackers can disguise as replicas of legitimate vehicles by cracking or colluding and then use the identity replicas in a malicious way. Not only the generation of replicas itself poses an aggressive behavior, but also the replicas can enable other insider attacks, such as denial of service, information interception, and replay attack. To solve this issue, researchers have presented many solutions in wireless sensor network or in mobile ad hoc networks. However, majority of current schemes are not good at dealing with conspiracy replicas or lack of considering peculiar characteristics of high mobility of vehicles. For detecting identity replicas in vehicular ad hoc networks, we propose a detection method with sequential trajectory segment based on semi-supervised support vector machine. In terms of semi-supervised support vector machine, we establish a detection model using spatio-temporal trajectories of different identities as input samples, which include features of both conspiracy and non-conspiracy attack scenarios. To validate our approach, we apply sequential trajectory segment to simulation environment. The performance analysis and experimental studies suggest that our proposed method provides high detection accuracy, which is almost impervious to the replica identity ratios in vehicular ad hoc networks. Furthermore, the time performance of replica detection is less affected by the distance between compromised nodes and their clones than that of existing solutions.

Suggested Citation

  • Yan Xin & Xia Feng, 2019. "Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment," International Journal of Distributed Sensor Networks, , vol. 15(2), pages 15501477198, February.
  • Handle: RePEc:sae:intdis:v:15:y:2019:i:2:p:1550147719827500
    DOI: 10.1177/1550147719827500
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/1550147719827500
    Download Restriction: no

    File URL: https://libkey.io/10.1177/1550147719827500?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:15:y:2019:i:2:p:1550147719827500. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.