Spoofed Data Detection in VANETs using Dynamic Thresholds

Jonathan Petit, Michael Feiri, Frank Kargl

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    22 Citations (Scopus)
    2 Downloads (Pure)


    Vehicular ad hoc networks aim at enhancing road safety by providing vehicle-to-vehicle communications and safety-related applications. But safety-related applications, like Local Danger Warning, need a high trust level in received messages. Indeed, decisions are made depending on these messages. To increase the trustworthiness, a consensus mechanism is used. Thus, vehicles make a decision when a threshold is reached. Setting this threshold is of main importance because it impacts the decision delay, and thus, the remaining time for a driver reaction. In this paper, we investigate the problem of threshold establishment without globally unique identifier system (GUID). We propose to model the threshold as a Kalman filter and provide an algorithm to dynamically update the threshold. By simulations, we investigate the problem of insider attackers that generate information forgery attacks. Simulation results show that our dynamic method suffers from a bootstrapping phase but reduces the percentage of wrong decisions. Nevertheless, as future work, further analysis of default threshold value will be done.
    Original languageUndefined
    Title of host publicationProceedings of the IEEE Vehicular Networking Conference (VNC 2011)
    Place of PublicationUSA
    Number of pages8
    ISBN (Print)978-1-4673-0049-0
    Publication statusPublished - Nov 2011
    EventIEEE Vehicular Networking Conference, VNC 2011 - Amsterdam, Netherlands
    Duration: 14 Nov 201116 Nov 2011

    Publication series

    PublisherIEEE Communications Society


    ConferenceIEEE Vehicular Networking Conference, VNC 2011
    Abbreviated titleVNC
    Internet address


    • METIS-285048
    • Consensus
    • IR-79510
    • VANET
    • EWI-21359
    • EC Grant Agreement nr.: FP7/269994
    • spoofing detection
    • SCS-Cybersecurity
    • dynamic threshold

    Cite this