Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks

被引:21
作者
Alsarhan, Ayoub [1 ]
Al-Ghuwairi, Abdel-Rahman [2 ]
Almalkawi, Islam T. [3 ]
Alauthman, Mohammad [4 ]
Al-Dubai, Ahmed [5 ]
机构
[1] Hashemite Univ, Dept Comp Informat Syst, Zarqa, Jordan
[2] Hashemite Univ, Dept Software Engn, Zarqa, Jordan
[3] Hashemite Univ, Dept Comp Engn, Zarqa, Jordan
[4] Zarqa Univ, Fac Informat Technol, Dept Comp Sci, Zarqa, Jordan
[5] Edinburgh Napier Univ, Sch Comp, Edinburgh, Midlothian, Scotland
关键词
Intrusion detection; Smart city; Malicious nodes; Security; Misbehavior detection; MANAGEMENT; MODEL;
D O I
10.1007/s11277-020-07797-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
An essential element in the smart city vision is providing safe and secure journeys via intelligent vehicles and smart roads. Vehicular ad hoc networks (VANETs) have played a significant role in enhancing road safety where vehicles can share road information conditions. However, VANETs share the same security concerns of legacy ad hoc networks. Unlike exiting works, we consider, in this paper, detection a common attack where nodes modify safety message or drop them. Unfortunately, detecting such a type of intrusion is a challenging problem since some packets may be lost or dropped in normal VANET due to congestion without malicious action. To mitigate these concerns, this paper presents a novel scheme for minimizing the invalidity ratio of VANET packets transmissions. In order to detect unusual traffic, the proposed scheme combines evidences from current as well as past behaviour to evaluate the trustworthiness of both data and nodes. A new intrusion detection scheme is accomplished through a four phases, namely, rule-based security filter, Dempster-Shafer adder, node's history database, and Bayesian learner. The suspicion level of each incoming data is determined based on the extent of its deviation from data reported from trustworthy nodes. Dempster-Shafer's theory is used to combine multiple evidences and Bayesian learner is adopted to classify each event in VANET into well-behaved or misbehaving event. The proposed solution is validated through extensive simulations. The results confirm that the fusion of different evidences has a significant positive impact on the performance of the security scheme compared to other counterparts.
引用
收藏
页码:3129 / 3152
页数:24
相关论文
共 27 条
[1]  
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
[2]   A New Spectrum Management Scheme for Road Safety in Smart Cities [J].
Alsarhan, Ayoub ;
Al-Dubai, Ahmed Y. ;
Min, Geyong ;
Zomaya, Albert Y. ;
Bsoul, Mohammad .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (11) :3496-3506
[3]  
Altwaijry H., 2013, IAENG Transactions on Engineering Technologies, P29, DOI DOI 10.1007/978-94-007-4786-9_3
[4]  
[Anonymous], 2009, International Journal of Computer Networks & Communications
[5]   Vehicular communication: a survey [J].
Bhoi, Sourav Kumar ;
Khilar, Pabitra Mohan .
IET NETWORKS, 2014, 3 (03) :204-217
[6]   VANET-CLOUD: A GENERIC CLOUD COMPUTING MODEL FOR VEHICULAR AD HOC NETWORKS [J].
Bitam, Salim ;
Mellouk, Abdelhamid ;
Zeadally, Sherali .
IEEE WIRELESS COMMUNICATIONS, 2015, 22 (01) :96-102
[7]  
Farid D. M., 2010, ARXIV10050919
[8]  
Han J, 2012, MOR KAUF D, P1
[9]   A social network approach to trust management in VANETs [J].
Huang, Zhen ;
Ruj, Sushmita ;
Cavenaghi, Marcos A. ;
Stojmenovic, Milos ;
Nayak, Amiya .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (03) :229-242
[10]  
Jiyu Zhang, 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2012), P360, DOI 10.1109/CyberC.2012.67