Abstract
Vehicular Ad-hoc Networks (VANETs) are gaining much interest and research efforts over recent years for it offers enhanced safety and improved travel comfort. However, security threats that are either seen in the ad-hoc networks or unique to VANET present considerable challenges. In this paper, we are presenting the intrusion detection classifier for VANET base on pre-processing feature extraction. This ID infrastructure novel is mainly introducing a new design feature for extraction mechanism a pre-processing feature-based classifier. In the beginning, we will extract the traffic stream structures and vehicle location features in the VANET model. Later an Algorithm Pre-processing feature-based classifier was designed for evaluating the IDS by using hierarchy learning process. Finally, an additional two-step validation mechanism was used to determine the abnormal vehicle messages accurately. The proposed method has better finding accuracy, stability, processing efficiency, and communication load.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu, J., Wang, Y.: Performance study of multi-path in VANETs and their impact on routing protocols. Wirel. Eng. Technol. 2011, 125–129 (2011)
Pradweap, R.V., Hansdah, R.C.: A novel RSU-aided hybrid architecture for anonymous authentication (RAHAA) in VANET. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 314–328. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45204-8_24
Al, G.: Technology Design Principle, Application and Controversies. Nov. Sci. Publ. (2018)
Rajarajan, C., Zaidi, K., Milojevic, M., Member, S., Rakocevic, V.: City research online city, University of London institutional repository host based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans. Veh. Technol. 65(8), 6703–6714 (2016)
LAN/MAN Standards Committee of the IEEE Computer Society Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Computer Society, vol. 2012 (2012). ISBN 9780738172118
Hao, Z., Singh, G., Kamboj, E.S.: A review on multiple malicious and irrelevant packet detection in VANET. Int. J. Technol. Comput. 2 (2016)
Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a bayesian game-theoretic methodology. IEEE Trans. Syst. 18, 1143–1153 (2017)
Erritali, M., El, O.B.: A survey on VANET intrusion detection systems. Int. J. Eng. Technol. A 5, 1985–1989 (2013)
Zaidi, K., Milojevic, M.B., Member, S., Rakocevic, V.: Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans. Veh. Technol. 65, 6703–6714 (2016)
Lu, R., Lin, X., Luan, T.H., Liang, X., Member, S., Shen, X.S.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61, 86–96 (2012)
Wex, P., Breuer, J., Held, A., Leinm, T.: Trust issues for vehicular ad hoc networks. Veh. Technol. Conf. 4, 2800–2804 (2008)
Bibhu Vimal, K.R.: Performance analysis of black hole attack in VANET. Comput. Netw. Inf. Secur. 5, 47–54 (2012)
Ayoob, A., Su, G., Al, G.: Hierarchical growing neural gas network (HGNG)-based semi cooperative feature classifier for IDS in vehicular ad hoc network (VANET). J. Sens. Actuator Netw. 7, 41 (2018)
Minhas, U.F., Zhang, J.: Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Pract. 5 (2010)
Kargl, F., et al.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Commun. Mag. 6, 177 (2008)
Al Gaith, K. (ed.): Analysis Radio Access Technology RFID/IEEE802.11p For VANET’s. RFID Technology: Design Principles, Applications and Controversies, Nova Publishing, pp. 51–70 (2018)
Hao, X., Hortelano, J., Sakiz, F., Sen, S.: Ad hoc networks survey paper a survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33–50 (2017)
Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2 (2012). ISBN 9781461414063
Kolici, V., Oda, T., Sugihara, Y., Spaho, E., Ikeda, M., Barolli, L.: Performance evaluation of a VANET simulation system using NS-3 and SUMO considering number of vehicles and crossroad scenario. In: Proceedings of the - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, pp. 22–27 (2015)
Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: SUMO - simulation of urban mobility - an overview. In: Proceedings of the 3rd International Conference on Advances in System Simulation, pp. 63–68 (2011)
Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18, 1143–1153 (2017)
Mane, A.A.: Sybil attack in VANET. Int. J. Comput. Eng. Res. 06, 60–65 (2016)
Yan, S., Member, S., Malaney, R., Nevat, I., Peters, G.W.: Optimal information-theoretic wireless location verification. IEEE Transic. 63, 3410–3422 (2014)
Ayoob, A., et al.: Hierarchical Growing Neural Gas Network (HGNG)-Based Semi-Cooperative, 1st edn. Lambert Academic Publishing (2018). ISBN 978-613-9-89443-7
Ayoob, A., et al.: Performance Analysis of Routing Protocols for Mobile AD-HOC Network, 1st edn. Lambert Acadamic Publishing (2018). ISBN 978-613-9-93266-5
Al, G.: RFID Technology: Design Principles, Applications and Controversies. Nova Science Publishers, Inc. (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ayoob, A., Khalil, G., Chowdhury, M., Doss, R. (2019). Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-34353-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34352-1
Online ISBN: 978-3-030-34353-8
eBook Packages: Computer ScienceComputer Science (R0)