2022
DOI: 10.32604/cmc.2022.021374
|View full text |Cite
|
Sign up to set email alerts
|

Incentive-Driven Approach for Misbehavior Avoidance in Vehicular Networks

Abstract: For efficient and robust information exchange in the vehicular adhoc network, a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case where the periodic beacons exploit the channel. In addition, we cannot be sure that all vehicular nodes eagerly share their communication assets to the system for message dissemination without any rewards. Unfortunately, there may be some misbehaving nodes and due to their selfish and greedy app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…They have found use in decentralized defense systems. Some other applications [16][17][18][19] are in transportation, logistics, computer graphics and geographic information systems. They are widely supported in networked and wireless environments to provide automated and dynamically shared workloads, higher scale, and resilient networks with self-healing capabilities.…”
Section: Agents and Multi-agents Systemmentioning
confidence: 99%
“…They have found use in decentralized defense systems. Some other applications [16][17][18][19] are in transportation, logistics, computer graphics and geographic information systems. They are widely supported in networked and wireless environments to provide automated and dynamically shared workloads, higher scale, and resilient networks with self-healing capabilities.…”
Section: Agents and Multi-agents Systemmentioning
confidence: 99%
“…Some nodes attempt to postpone relaying packets. Our scheme excludes these nodes by punishing them according to the cost function in equation (8). Nodes that act bad are excluded from VANET by our scheme.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…These characteristics include security, unpredictable growth and decrease of nodes, random topology, high node mobility, and fluctuating interference. Unfortunately, the dynamic nature and flexibility of accessing VANET's spectrum have attracted malicious nodes' attention, making VANET a target of malicious operations [8]. As a result, typical wireless network security schemes cannot be directly applied in VANET since they result in poor network performance regarding data accuracy, delay, packet delivery ratio, and throughput.…”
Section: Introductionmentioning
confidence: 99%