Azuma, Shuntaro et al.
Benefit Summary HTML

One potential threat to connected-vehicle networks is cloud-based attacks. Such attacks would hijack vehicle-to-cloud (V2C) communications and send falsified information, such as incurring congestion by falsely reporting traffic accidents or fabricating driving and position information.

The authors of the paper offer a method to detect misbehavior from aggregated data on a cloud server by utilizing information from surrounding vehicles. For instance, it is possible to verify the position of a vehicle that reports falsified location data through the independent verification of nearby vehicles that are within the range of vehicle-to-vehicle (V2V) communication. The method proposed within the paper combines this validation with a further cross-reference against local base stations to verify that location information from a given vehicle is accurate. If enough discrepancies are observed, the vehicle is assumed to be transmitting falsified data.

To evaluate the effectiveness of the detection procedure, the authors performed a trial using the network simulator Scenargie. A variety of misbehavior methods were examined, to account for possible attempted attacks. The impact of changing the "threshold value," or the number of times the location-validation was performed, was examined.

Hyperlink Exit Door
Last Modified Date
Publication Sort Date
International Journal on Advances in Internet Technology
Result Type
Source ID
A Method of Misbehavior Detection with Mutual Vehicle Position Monitoring
Source Review
External URL Disclaimer

(Our website has many links to other organizations. While we offer these electronic linkages for your convenience in accessing transportation-related information, please be aware that when you exit our website, the privacy and accessibility policies stated on our website may not be the same as that on other websites.)