DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kong, Seung-Hyun | ko |
dc.contributor.author | Jun, Sang-Yun | ko |
dc.date.accessioned | 2018-04-24T04:26:46Z | - |
dc.date.available | 2018-04-24T04:26:46Z | - |
dc.date.created | 2017-08-14 | - |
dc.date.created | 2017-08-14 | - |
dc.date.issued | 2018-03 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, v.19, no.3, pp.826 - 838 | - |
dc.identifier.issn | 1524-9050 | - |
dc.identifier.uri | http://hdl.handle.net/10203/241225 | - |
dc.description.abstract | In the cooperative vehicular positioning networks (CVPN), non-line-of-sight (NLOS) delay in the vehicle-to-vehicle (V2V) ranging and malicious attacks, such as location spoofing and the manipulation of V2V ranging, can be significant threats to vehicle safety. However, the resulting observation from a vehicle in the event of any of the threats is the same; difference observation between the measured range and the Euclidian distance based on vehicles' shared location coordinates. In this paper, we propose a decentralized malicious vehicle detection technique for cooperative positioning technique (CPT), in which each vehicle evaluates the reliability of neighboring vehicles based on the observed difference and share the reliability with each other, so that each vehicle in the CVPN can collect the reliability of neighboring vehicles evaluated by their own neighboring vehicles. However, it is found that a malicious vehicle can make another attack; distribution of distorted reliability of its neighboring vehicles. To cope with the malicious attacks and NLOS delay effectively, we propose the weighted reliability and demonstrate that the proposed technique can detect malicious attacks (location spoofing, ranging manipulation, message distortion) and distinguish malicious vehicles from vehicles with a NLOS link. With Monte Carlo simulations using V2V radio parameters determined empirically, we demonstrate that the proposed technique achieves higher enhancement and superior robustness to malicious attacks than the conventional CPTs. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | AD-HOC NETWORKS | - |
dc.subject | INTRUSION DETECTION | - |
dc.subject | COMMUNICATION | - |
dc.subject | ATTACKS | - |
dc.subject | WIRELESS | - |
dc.title | Cooperative Positioning Technique With Decentralized Malicious Vehicle Detection | - |
dc.type | Article | - |
dc.identifier.wosid | 000427222600014 | - |
dc.identifier.scopusid | 2-s2.0-85020417155 | - |
dc.type.rims | ART | - |
dc.citation.volume | 19 | - |
dc.citation.issue | 3 | - |
dc.citation.beginningpage | 826 | - |
dc.citation.endingpage | 838 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS | - |
dc.identifier.doi | 10.1109/TITS.2017.2705249 | - |
dc.contributor.localauthor | Kong, Seung-Hyun | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Cooperative positioning | - |
dc.subject.keywordAuthor | decentralized malicious vehicle detection | - |
dc.subject.keywordAuthor | malicious vehicle | - |
dc.subject.keywordAuthor | V2V ranging | - |
dc.subject.keywordPlus | AD-HOC NETWORKS | - |
dc.subject.keywordPlus | INTRUSION DETECTION | - |
dc.subject.keywordPlus | COMMUNICATION | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordPlus | WIRELESS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.