2013
DOI: 10.1109/tits.2013.2262176
|View full text |Cite
|
Sign up to set email alerts
|

MARV-X: Applying Maneuver Assessment for Reliable Verification of Car-to-X Mobility Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
26
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(26 citation statements)
references
References 16 publications
0
26
0
Order By: Relevance
“…The proposed CA-DC-MDM is compared with the scheme proposed by Stübing, et al, [53]. This scheme consists of many plausibility and consistency models which was developed and improved by Firl, et al, [46], Jaeger, et al, [37], Leinmüller, et al, [48], Schmidt, et al, [50]. It is common to evaluate the data-centric misbehaviour detection using the normal dataset (before simulating the attacker actions) in terms of false positive rate (FBR) in order to evaluate its effectiveness under different communication scenarios [53,46,22].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed CA-DC-MDM is compared with the scheme proposed by Stübing, et al, [53]. This scheme consists of many plausibility and consistency models which was developed and improved by Firl, et al, [46], Jaeger, et al, [37], Leinmüller, et al, [48], Schmidt, et al, [50]. It is common to evaluate the data-centric misbehaviour detection using the normal dataset (before simulating the attacker actions) in terms of false positive rate (FBR) in order to evaluate its effectiveness under different communication scenarios [53,46,22].…”
Section: Resultsmentioning
confidence: 99%
“…Misbehaving vehicles which share false context information through manipulating their own mobility information to resemble a traffic pattern event, such as hard braking, crash pattern, or congestion pattern can create illusion and cause neighbouring vehicles to accept false information [40][41][42][43][44]. Contextinformation-based misbehaviour detection has many advantages over event-information-based misbehaviour detection because it can detect the attacks in their initial stages before [27,45,46,38]. Manipulating context information can trigger the applications of benign vehicles to spread false information such as Electronic Emergency Brake Light (EEBL), Slow and Suddenly Stop Vehicle message (S&SV), Post-Crash Notification (PCN), Congestion Message (CM) among many others.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it is commonly believed that context-based data-centric misbehavior detection has many advantages. For example, context-based misbehavior detection can detect most types of attacks that send false information, including false events [29,44,49,50]. Most of the possible attacks in VANET are performed through manipulating context information [51,52].…”
Section: Related Workmentioning
confidence: 99%
“…Three types of multifaceted and hybrid features were used to construct the context reference, namely, the consistency-based, plausibility-based, and behavioral-based features. The Kalman filter-based algorithm was used to periodically track and predict the mobility states of the neighboring vehicles due to its efficiency in tracking multiple vehicles' states that are suitable for real-time requirements of VANET applications [29]. During such tracking, the Kalman filter-based algorithm collects recent mobility information of the neighboring vehicles.…”
mentioning
confidence: 99%
“…This kind of method is suitable for verification of static claimant only. The use of probabilistic framework for verification of car‐to‐ X mobility data can be an effective approach, but there is always a risk of high false positives, which is an undesirable situation in VCPS .…”
Section: Related Workmentioning
confidence: 99%