Responsive image
博碩士論文 etd-0731116-114212 詳細資訊
Title page for etd-0731116-114212
Detecting the Accuracy of Highway Incident Warnings in VANETs
Year, semester
Number of pages
Advisory Committee
Date of Exam
Date of Submission
Misbehavior detect, Verify alarm, Car Cluster, Beacon, VANET
本論文已被瀏覽 5815 次,被下載 62
The thesis/dissertation has been browsed 5815 times, has been downloaded 62 times.
車載通訊網路(VANET, Vehicular Ad Hoc Network),是利用車輛或道路設施為節點的概念,能讓車與車或車與道路設施之間可以互傳封包。在這基礎下便可以延伸出許多類型之車載系統,行車警報系統便是其中之一,當車輛出現異常情形時,便可以利用行車警報系統機制通知其他車輛。然而,攻擊者可以藉由散發假警報擾亂其他駕駛者,系統也有可能誤發警報的情形。因此,本論文研究駕駛者在高速公路上可能遭遇到的警報情形,制定完善的偵測系統探測行車警報系統的警報真實性,以及在行車警報系統未偵測到該異常車輛時,系統可以輔助偵查。
VANET, so called Vehicular Ad hoc Network, uses cars as nodes to send packages to other cars or road infrastructure. In this basis, VANET can extend lots of car system, and one of them is car alarm system. When the car have strange behavior, car alarm system can sand alarm messages to other cars. However, attackers can spread fake alarm messages to disturb other drivers. The system might also have alarm mistake. So, this study researches the possible situation in the highway, and formulate the perfect misbehavior detect scheme (MDS) to verify the alarm messages. When car alarm system can’t detect the misbehavior car, our system also can assist the car alarm system.
According to past studies against to detect misbehavior cars, our study integrate them to five dimensions. However, all of the past studies can’t complete contain five dimensions. This study can contain this five dimensions, so that the system can more complete, attackers can’t easily disturb the drivers. In highway, cars can send Beacon messages, which is sent by every second. The Beacon message contains such as car locations, so that the MDS can use the Beacon messages to verify the alarm message. In the real world, not all the cars can send Beacon messages, however, all the past studies assume all the car can send Beacon messages. It may not correct. Our study major for how the rate of not sending Beacon message cars that influences the MDS detection.
This study use “Car Cluster” to reduce false positive rate, and have more confidence to determine the misbehavior car. This study compares with LEAVE algorithm, proving our scheme have lower false positive rate and have high detect rate.
目次 Table of Contents
摘要 i
Abstract ii
第一章 緒論 1
1.1 研究背景 1
1.2 研究動機與目的 7
1.3 論文架構 8
第二章 文獻探討 9
2.1 物聯網簡介 9
2.2 VANET簡介 10
2.3 MDS簡介與五大面向 13
2.4 探討過往文獻的偵測方法 16
2.5 以五大面向探討過往文獻 19
第三章 系統設計 23
3.1 攻擊模式 24
3.2 VANET模擬環境 25
3.3 車輛叢集 31
3.4 系統流程 34
3.5 慢速車輛偵測情形探討 43
第四章 系統評估 46
4.1 評估方式 46
4.2 模擬環境 48
4.3 LEAVE演算法 51
4.4 實驗簡介 52
4.5 實驗一:初探未發送Beacon車輛比率對於偵測率之影響 53
4.6 實驗二:車輛叢集間距對於偵測率之影響 56
4.7 實驗三:車輛速度對偵測率之影響 59
4.8 實驗四:未發送Beacon車輛比率與密度對於偵測率之影響 61
4.9 實驗五:資料傳送範圍對於偵測率之影響 71
4.10 實驗六:車輛比例對於偵測率之影響 73
第五章 結論 75
參考文獻 77
參考文獻 References
[1] , ”物聯網”, 2015. [Online]. Available:物联网. [Accessed: 7- sep- 2016]
[2] R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, “VANET security surveys”, Computer Communications, vol. 44, pp. 1-13, May, 2014.
[3] M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions”, Vehicular Communications, vol. 1, pp. 53-66, April, 2014.
[4] A. P. Jadhao, and D. N. Chaudhari, “ A Novel Approach For Security Aware Topological Based Routing Protocol In Vehicular Ad hoc Network”, International Journal of Scientific & Engineering Research, vol. 14, pp. 45-51, June, 2013.
[5] F. D. Cunha, A. Boukerche, L. Villas, A. C. Viana, and A. A. F. Loureiro, “Data Communication in VANETs: A Survey, Challenges and Applications”, INRIA Saclay, INIRA. 2014.
[6] W. Xiong, and D. Liang, “Vehicular Ad Hoc Networks”, Hans Journal of Wireless Communications 无线通信, pp. 22-44, March, 2013.
[7] Utms, “UTMS society of Japan”, 2012, [Online]. Available: [Accessed: 6- May- 2016]
[8] I. Stojmenovic , “Mobile Ad Hoc Networks” in Handbook of Wireless Networks and Mobile Computing, John Wiley & Sons, 2002, ch. 15, sec. 1,pp. 125-126.
[9] S. Khan, and J. L. Mauri, “Detection of Misbehaving Nodes in Vehicular Ad Hoc Network” in Security for Multihop Wireless Networks, CRC Press, 2014, ch. 6, sec. 2, pp. 129.
[10] U. Khan, S. Agrawal, and S. Silakari,” A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks”, Proceedings of Second International Conference INDIA , 2015, pp. 11-19.
[11] S. Ruj, M. A. Cavenaghi, Z. Huang, A. Nayak, and I. Stojmenovic, “On Data-centric Misbehavior Detection in VANETs”, Vehicular Technology Conference, IEEE, 2011, pp. 1-5.
[12] F. A. Ghaleb, M. A. Razzaque, and A. Zainal, ” Mobility Pattern based Misbehavior Detection in Vehicular Adhoc Networks to Enhance Safety”, International Conference on Connected Vehicles and Expo (ICCVE), IEEE, 2014, pp.894-901.
[13] H. Sedjelamci, T. Bouali, and S. M. Senouci, “Detection and Prevention From Misbehaving Intruders in Vehicular Networks”, in IEEE Global Communications Conference, 2014, pp. 39-44.
[14] Chun-Yan Li, Yi-liang Liu, and Liang-min Wang, “Intrusion detection scheme based on traffic scenarios in vehicular ad hoc networks”, Journal od Shandong University (Engineering Science), Vol. 44, No. 1 ,pp. 29-34.
[15] R. P. Barnwal, and S. K. Ghosh, “Heartbeat message based misbehavior detection scheme for Vehicular Ad-hoc Networks”, in International Conference on Connected Vehicles and Expo (ICCVE), 2012, pp. 29-34.
[16] S. K. Harit, G. Singh, and N. Tyagi, “Fox-Hole Model for Data-centric Misbehavior”, in International Conference on Computer and Communication Technology (ICCCT), 2012, pp. 271-277.
[17] J. Grover, M. S. Gaur, V. Laxmi, and R. K. Tiwari, “Detection of Incorrect Position Information using Speed and Time Span Verification in VANET” in International Conference on Security of Information and Networks, 2012, pp. 53-59.
[18] D. Huang, S. A. Williams, and S. Shere, “Cheater Detection in Vehicular Networks”, in International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012, pp.193-200.
[19] Y. C. Wei, and Y. M. Chen, “An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs”, in International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012, pp.393-400.
[20] M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, “Detecting misbehaviors in VANET with integrated root-cause analysis”, Journal Ad Hoc Networks, Elsevier Science ,Vol. 8, 2010, pp. 778-790.
[21] T. H. J. Kim, A. Studer, R. Dubey, X. Zhang, A. Perrig, F. Bai, B. Bellur, and A. Iyer, “VANET Alert Endorsement Using Multi-Source Filters”, ser. 7th ACM International Workshop on Vehicular Internet working, 2010, pp. 51-60.
[22] A. Vulimiri, A. Gupta, P. Roy, S. N. Muthaiah, and A. A. Kherani, “Application of Secondary Information for Misbehavior Detection in VANET”, in International IFIP TC 6 Networking Conference, 2010, pp. 385-396.
[23] M. Ghosh, A. Varghese, A. A. Kherani, and A. Gupta, “Distributed Misbehavior Detection in VANETs”, in IEEE Wireless Communications and Networking Conference (WCNC), 2009, pp. 1-6.
[24] M. Abuelela , and S. Olariu, “Automatic Incident Detection In VANETs: A Bayesian Approach”, in Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th. 2009, pp. 1-5.
[25] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J. P. Hubaux, “Eviction of Misbehaving and Faulty Nodes in vehicular nodes”, IEEE Journal on Selected Areas in Communications, IEEE, Vol.8, 2007, pp. 1557-1568.
[26] P. Golle, D. Greene, and J. Staddon, “Detecting and Correcting Malicious Data in VANETs”, in ACM international workshop on Vehicular ad hoc networks, 2004, pp.29-37.
[27] Yi-Lin Ye, and Hual-Jen Liu, “Study on Detection of Abnormal Traffic Conditions on Highway”, Journal of Information Technology and Applications, Vol. 6, No. 3, 2012, pp. 92-101.
[28], “ROC曲線”, 2013. [Online]. Available:曲线. [Accessed: 14- Jul- 2016]
[29] 國道高速公路局, ”交通安全資訊”, 2010. [Online]. Available: [Accessed: 7- Sep- 2016].
[30] 國道高速公路局, “高速公路局年報(民國96年)”, 2007. [Online]. Available: [Accessed: 16- May- 2016].
[31] 國道高速公路局, “高速公路局年報(民國104年)”, 2015. [Online]. Available:高速公路年報-下(第86-128頁)_450426.pdf. [Accessed: 16-May- 2016].
[32] S.Singh, and N.Singh, nghcessed: 16Things(IoT): Security Challenges, Business Opportunities & Reference Architecture for E-commerce”, in 2015 International Conference on Green Computing and Internet of Things, 2015, pp. 1577-1581.
[33] Sujithra, and G.Padmavathi, World Scientific News, vol.41, 2016, pp.232-239
[34] Zhi-Kai Zhang, Cheng Yi Cho, and Shiuh-Pyng Shieh, “Emerging Security Threats and Countermeasures in IoT”, ASIA CCS '15 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ACM New York, NY,2015, pp.1-6.
[35] R. Mahmoud, T. Yousuf, and F. Aloul, “Internet of things (IoT) security: Current status, challenges and prospective measures”, International Journal for Information Security Research (IJISR), vol.5, 2015, pp. 608-616.
[36] Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, and Shiuh-Pyng Shieh, “IoT Security: Ongoing Challenges and Research Opportunities”, in IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), 2014, pp. 230-234.
[37] T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT systems: Design challenges and opportunities”, in IEEE/ACM International Conference on Computer-Aided Design (ICCAD) ,2014, pp.417-423.
[38], “物聯網簡介”, 2012. [Online]. Available: [Accessed: 6- Sep- 2016].
[39] 楊采蓉, “IoT物聯網市場趨勢與最新技術應用”, 2015. [Online]. Available: [Accessed: 6- Sep- 2016].
[40] Trand Labs, “< IoT 物聯網>五種物聯網上可能的攻擊及防範的方法”, 2015. [Online]. Available: [Accessed: 7- Sep- 2016].
[41] S. B. Priya, and C. Theebendra, “A Study On Security Challenges In Mobile Ad hoc Networks”, International Journal Of Research In Computer Applications And Robotics, Vol.4, 2016, pp.12-18.
[42] B. Bansal, P. Gupta, and N. Sharma,” Attacks Finding and Prevention Techniques in MANET: A Survey”, International Journal of Wired Communication, Vol.3, 2015, pp. 1-7.
[43] B. Selim, and C. Y. Yeun, “Key Management for the MANET: A Survey”, in International Conference on Information and Communication Technology Research (ICTRC), 2015, pp.326-329.
[44] S. H. Kauser, and P. A. Kumar, ”MANET : Services, Parameters, Applications, Attacks & Challenges ”, International Journal of Scientific Research in Science, Engineering and Technology, Vol.2, 2016, pp.4-9.
[45] S. B. Sharma, and N. Chauhan, “Security issues and their solutions in MANET”, in 1st International Conference on Futuristic trend in Computational Analysis and Knowledge Management, 2015, pp.289-294.
[46] A. Kannammal and S.S. Roy, “Survey on Secure Routing in Mobile Adhoc Networks”, in International Conference on Advances in Human Machine Interaction, 2016.
[47] RF Wireless World,” MANET vs VANET-difference between MANET and VANET”. [Online]. Available: [Accessed: 6- Sep- 2016].
[48] Wikipedia, “Mobile ad hoc network”, 2015. [Online]. Available: [Accessed: 6- Sep- 2016]
[49] DLR, “SUMO – Simulation of Urban MObility”. [Online]. Available: [Accessed: 16- Apr- 2016]
[50] DLR wiki,” Definition of Vehicles, Vehicle Types, and Routes”, 2016. [Online]. Available:,_Vehicle_Types,_and_Routes. [Accessed: 16- Apr- 2016]
[51] DLR wiki, “Main Page”, 2016. [Online]. Available: [Accessed: 16- Apr- 2016]
[52] N. M. Mittal, and S. Choudhary, “Comparative Study of Simulators for Vehicular Ad-hoc Networks (VANETs)”, International Journal of Emerging Technology and Advanced Engineering, vol.4, 2014, pp.528-537.
[53] F. J. Martinez, C. K. Toh, J. C. Cano, C. T. Calafate, and P. Manzoni, “A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)”, Wireless Communications and Mobile Computing, vol.11, 2011, pp. 813-828.
[54] F. Kaisser, C. Gransart, and M. Berbineau, “Simulations of VANET Scenarios with OPNET and SUMO”, Communication Technologies for Vehicles, Vol.7266, 2012, pp.103-112.
[55] 國道高速公路局, “即時資料庫”, 2015. [Online]. Available: [Accessed: 12- Sep- 2016]
電子全文 Fulltext
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available

紙本論文 Printed copies
開放時間 available 已公開 available

QR Code