Cooperative Positioning Technique With Decentralized Malicious Vehicle Detection

Cited 14 time in webofscience Cited 0 time in scopus
  • Hit : 942
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKong, Seung-Hyunko
dc.contributor.authorJun, Sang-Yunko
dc.date.accessioned2018-04-24T04:26:46Z-
dc.date.available2018-04-24T04:26:46Z-
dc.date.created2017-08-14-
dc.date.created2017-08-14-
dc.date.issued2018-03-
dc.identifier.citationIEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, v.19, no.3, pp.826 - 838-
dc.identifier.issn1524-9050-
dc.identifier.urihttp://hdl.handle.net/10203/241225-
dc.description.abstractIn the cooperative vehicular positioning networks (CVPN), non-line-of-sight (NLOS) delay in the vehicle-to-vehicle (V2V) ranging and malicious attacks, such as location spoofing and the manipulation of V2V ranging, can be significant threats to vehicle safety. However, the resulting observation from a vehicle in the event of any of the threats is the same; difference observation between the measured range and the Euclidian distance based on vehicles' shared location coordinates. In this paper, we propose a decentralized malicious vehicle detection technique for cooperative positioning technique (CPT), in which each vehicle evaluates the reliability of neighboring vehicles based on the observed difference and share the reliability with each other, so that each vehicle in the CVPN can collect the reliability of neighboring vehicles evaluated by their own neighboring vehicles. However, it is found that a malicious vehicle can make another attack; distribution of distorted reliability of its neighboring vehicles. To cope with the malicious attacks and NLOS delay effectively, we propose the weighted reliability and demonstrate that the proposed technique can detect malicious attacks (location spoofing, ranging manipulation, message distortion) and distinguish malicious vehicles from vehicles with a NLOS link. With Monte Carlo simulations using V2V radio parameters determined empirically, we demonstrate that the proposed technique achieves higher enhancement and superior robustness to malicious attacks than the conventional CPTs.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectAD-HOC NETWORKS-
dc.subjectINTRUSION DETECTION-
dc.subjectCOMMUNICATION-
dc.subjectATTACKS-
dc.subjectWIRELESS-
dc.titleCooperative Positioning Technique With Decentralized Malicious Vehicle Detection-
dc.typeArticle-
dc.identifier.wosid000427222600014-
dc.identifier.scopusid2-s2.0-85020417155-
dc.type.rimsART-
dc.citation.volume19-
dc.citation.issue3-
dc.citation.beginningpage826-
dc.citation.endingpage838-
dc.citation.publicationnameIEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS-
dc.identifier.doi10.1109/TITS.2017.2705249-
dc.contributor.localauthorKong, Seung-Hyun-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCooperative positioning-
dc.subject.keywordAuthordecentralized malicious vehicle detection-
dc.subject.keywordAuthormalicious vehicle-
dc.subject.keywordAuthorV2V ranging-
dc.subject.keywordPlusAD-HOC NETWORKS-
dc.subject.keywordPlusINTRUSION DETECTION-
dc.subject.keywordPlusCOMMUNICATION-
dc.subject.keywordPlusATTACKS-
dc.subject.keywordPlusWIRELESS-
Appears in Collection
GT-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 14 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0