CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks

被引:91
作者
Wahab, Omar Abdel [1 ]
Mourad, Azzam [1 ]
Otrok, Hadi [2 ,3 ]
Bentahar, Jamal [3 ]
机构
[1] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[2] Khalifa Univ Sci Technol & Res, Dept Elect & Comp Engn, Abu Dhabi, U Arab Emirates
[3] Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Vehicular ad hoc network; Intrusion detection; High mobility; Support vector machine (SVM); Malicious node; Training set size reduction; INTRUSION DETECTION SYSTEM; DEMPSTER-SHAFER; SCHEME; DISSEMINATION; INCENTIVES; ALGORITHMS; TRUST;
D O I
10.1016/j.eswa.2015.12.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has attracted several contributions in the past few years. Nonetheless, the applicability of the current detection mechanisms in the deployed vehicular networks is hindered by two main challenges imposed by the special characteristics of VANETs. The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. The second challenge is concerned with the limited resources of the vehicles especially in terms of storage space that restricts the vehicles' capacity of storing a huge amount of observations and applying complex detection mechanisms. To tackle these challenges, we propose a multi decision intelligent detection model called CEAP that complies with the highly mobile nature of VANET with increased detection rate and minimal overhead. The basic idea is to launch cooperative monitoring between vehicles to build a training dataset that is analyzed by the Support Vector Machine (SVM) learning technique in online and incremental fashions to classify the smart vehicles either cooperative or malicious. To adapt the proposed model to the high mobility, we design it on top of the VANET QoS-OLSR protocol, which is a clustering protocol that maintains the stability of the clusters and prolongs the network's lifetime by considering the mobility metrics of vehicles during clusters formation. To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster Shafer-based, and averaging-based detection techniques. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:40 / 54
页数:15
相关论文
共 68 条
[1]   Impact of denial of service attacks on ad hoc networks [J].
Aad, Imad ;
Hubaux, Jean-Pierre ;
Knightly, Edward W. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (04) :791-802
[2]   Design and analysis of genetic fuzzy systems for intrusion detection in computer networks [J].
Abadeh, Mohammad Saniee ;
Mohamadi, Hamid ;
Habibi, Jafar .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (06) :7067-7075
[3]  
[Anonymous], CSTR1101 IEEE UMBC
[4]  
[Anonymous], 2001, Learning with Kernels |
[5]  
[Anonymous], 2005, RSA CRYPTOBYTES
[6]  
[Anonymous], 2001, Neural Networks: A Comprehensive Foundation
[7]  
[Anonymous], 2002, P 3 ACM INT S MOBILE
[8]  
[Anonymous], P IEEE INMIC
[9]  
Auria L., 2008, 811 DIW BERL GERM I
[10]  
Chen RC, 2008, INT J INNOV COMPUT I, V4, P413