Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction
Abstract
Vehicular Ad-hoc Networks (VANETs) are gaining much interest and research efforts over recent years for it offers enhanced safety and improved travel comfort. However, security threats that are either seen in the ad-hoc networks or unique to VANET present considerable challenges. In this paper, we are presenting the intrusion detection classifier for VANET base on pre-processing feature extraction. This ID infrastructure novel is mainly introducing a new design feature for extraction mechanism a pre-processing feature-based classifier. In the beginning, we will extract the traffic stream structures and vehicle location features in the VANET model. Later an Algorithm Pre-processing feature-based classifier was designed for evaluating the IDS by using hierarchy learning process. Finally, an additional two-step validation mechanism was used to determine the abnormal vehicle messages accurately. The proposed method has better finding accuracy, stability, processing efficiency, and communication load.
Keywords
Vehicular Ad-hoc Network (VANET) Intrusion Detection System (IDS) IEEE 802.11pReferences
- 1.Wu, J., Wang, Y.: Performance study of multi-path in VANETs and their impact on routing protocols. Wirel. Eng. Technol. 2011, 125–129 (2011)CrossRefGoogle Scholar
- 2.Pradweap, R.V., Hansdah, R.C.: A novel RSU-aided hybrid architecture for anonymous authentication (RAHAA) in VANET. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 314–328. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45204-8_24CrossRefGoogle Scholar
- 3.Al, G.: Technology Design Principle, Application and Controversies. Nov. Sci. Publ. (2018)Google Scholar
- 4.Rajarajan, C., Zaidi, K., Milojevic, M., Member, S., Rakocevic, V.: City research online city, University of London institutional repository host based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans. Veh. Technol. 65(8), 6703–6714 (2016)CrossRefGoogle Scholar
- 5.LAN/MAN Standards Committee of the IEEE Computer Society Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Computer Society, vol. 2012 (2012). ISBN 9780738172118Google Scholar
- 6.Hao, Z., Singh, G., Kamboj, E.S.: A review on multiple malicious and irrelevant packet detection in VANET. Int. J. Technol. Comput. 2 (2016)Google Scholar
- 7.Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a bayesian game-theoretic methodology. IEEE Trans. Syst. 18, 1143–1153 (2017)Google Scholar
- 8.Erritali, M., El, O.B.: A survey on VANET intrusion detection systems. Int. J. Eng. Technol. A 5, 1985–1989 (2013)Google Scholar
- 9.Zaidi, K., Milojevic, M.B., Member, S., Rakocevic, V.: Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans. Veh. Technol. 65, 6703–6714 (2016)CrossRefGoogle Scholar
- 10.Lu, R., Lin, X., Luan, T.H., Liang, X., Member, S., Shen, X.S.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61, 86–96 (2012)CrossRefGoogle Scholar
- 11.Wex, P., Breuer, J., Held, A., Leinm, T.: Trust issues for vehicular ad hoc networks. Veh. Technol. Conf. 4, 2800–2804 (2008)Google Scholar
- 12.Bibhu Vimal, K.R.: Performance analysis of black hole attack in VANET. Comput. Netw. Inf. Secur. 5, 47–54 (2012)Google Scholar
- 13.Ayoob, A., Su, G., Al, G.: Hierarchical growing neural gas network (HGNG)-based semi cooperative feature classifier for IDS in vehicular ad hoc network (VANET). J. Sens. Actuator Netw. 7, 41 (2018)CrossRefGoogle Scholar
- 14.Minhas, U.F., Zhang, J.: Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Pract. 5 (2010)Google Scholar
- 15.Kargl, F., et al.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Commun. Mag. 6, 177 (2008)Google Scholar
- 16.Al Gaith, K. (ed.): Analysis Radio Access Technology RFID/IEEE802.11p For VANET’s. RFID Technology: Design Principles, Applications and Controversies, Nova Publishing, pp. 51–70 (2018)Google Scholar
- 17.Hao, X., Hortelano, J., Sakiz, F., Sen, S.: Ad hoc networks survey paper a survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33–50 (2017)CrossRefGoogle Scholar
- 18.Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2 (2012). ISBN 9781461414063CrossRefGoogle Scholar
- 19.Kolici, V., Oda, T., Sugihara, Y., Spaho, E., Ikeda, M., Barolli, L.: Performance evaluation of a VANET simulation system using NS-3 and SUMO considering number of vehicles and crossroad scenario. In: Proceedings of the - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, pp. 22–27 (2015)Google Scholar
- 20.Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: SUMO - simulation of urban mobility - an overview. In: Proceedings of the 3rd International Conference on Advances in System Simulation, pp. 63–68 (2011)Google Scholar
- 21.Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18, 1143–1153 (2017)CrossRefGoogle Scholar
- 22.Mane, A.A.: Sybil attack in VANET. Int. J. Comput. Eng. Res. 06, 60–65 (2016)Google Scholar
- 23.Yan, S., Member, S., Malaney, R., Nevat, I., Peters, G.W.: Optimal information-theoretic wireless location verification. IEEE Transic. 63, 3410–3422 (2014)Google Scholar
- 24.Ayoob, A., et al.: Hierarchical Growing Neural Gas Network (HGNG)-Based Semi-Cooperative, 1st edn. Lambert Academic Publishing (2018). ISBN 978-613-9-89443-7Google Scholar
- 25.Ayoob, A., et al.: Performance Analysis of Routing Protocols for Mobile AD-HOC Network, 1st edn. Lambert Acadamic Publishing (2018). ISBN 978-613-9-93266-5Google Scholar
- 26.Al, G.: RFID Technology: Design Principles, Applications and Controversies. Nova Science Publishers, Inc. (2018)Google Scholar