Abstract
In vehicular ad hoc network (VANET), which is considered as a type of mobile ad hoc network (MANET), communication occurs between neighbor vehicles and also roadside equipment and vehicles. Due to the characteristics of VANET, there are chances of a number possible attack in this network. In this paper, an anomaly detection system that uses clustering and fuzzy set theory to defend the Denial of Service (DoS) attack is presented. Results of simulation represent that the proposed algorithm arrives to the high detection rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Engoulou, R.G., Bellaiche, M., Pierre, S., Quintero, A.: VANET security surveys. Comput. Commun. 44, 1–13 (2014)
Thilak, K.D., Amuthan, A.: DoS attack on VANET routing and possible defending solutions-a survey. In: International Conference on Information Communication and Embedded Systems (ICICES 2016), Chennai, Tamil Nadu, India (2016)
Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 37, 380–392 (2014)
Sharef, B.T., Alsaqour, R.A., Ismail, M.: Vehicular communication ad hoc routing protocols: a survey. J. Netw. Comput. Appl. 40, 363–396 (2014)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. In: RSA CryptoBytes (2002)
Petit, J.: Analysis of ECDSA authentication processing in VANETs. In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2009)
Lyu, C., Gu, D., Zeng, Y., Mohapatra, P.: PBA: prediction-based authentication for vehicle-to-vehicle communications. IEEE Trans. Dependable Secur. Comput. 13, 71–83 (2015)
Patel, K.N., Jhaveri, R.H.: Isolating packet dropping misbehavior in VANET using ant colony optimization. Int. J. Comput. Appl. 120, 5–9 (2015)
Malla, A.M., Sahu, R.K.: Security attacks with an effective solution for DOS attacks in VANET. Int. J. Comput. Appl. 66, 45–49 (2013)
Kanungo, T., Mount, D.M., Netanyaha, N.S., Piatko, C.D., Silverman, P., Wu, A.Y.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24, 881–892 (2002)
Chen, C.Y., Ye, F.: Particle swarm optimization algorithm and its application to clustering analysis. In: IEEE International Conference on Networking, Sensing and Control, Taipei, Taiwan, pp. 789–794 (2004)
Karami, A., Guerrero-Zapata, M.: A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing 149, 1253–1269 (2015)
Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–353 (1965)
Hellmann, M.: Fuzzy logic introduction (2001)
Kayacan, E., Ahmadieh, K.M.: Fuzzy Neural Networks for Real Time Control Applications. Elsevier, Amsterdam (2016)
Zadeh, L.A.: Fuzzy Logic Toolbox for use with MATLAB, MathWorks (2001)
Su, M.Y.: Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst. Appl. 38, 3492–3498 (2011)
Steenwijk, M.D., Pouwels, P.J.W., Daams, M., Dalen, J.W., Caan, M.W.A., Richard, E., Barkhof, F., Vrenken, H.: Accurate white matter lesion segmentation by k nearest neighbor classification with tissue type priors (kNN-TTPs). J. Neuroimage Clin. 3, 462–469 (2013)
Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier, Amsterdam (2009)
Raghavendar, N.S., Deka, P.C.: Support vector machine applications in the field of hydrology: a review. Appl. Soft Comput. 19, 372–386 (2014)
Sangkatsanee, P., Wattanapongsakorn, N., Charnsripinyo, C.: Practical real-time intrusion detection using machine learning approaches. Comput. Commun. 34, 2227–2235 (2011)
UCI machine learning repository. http://mlr.cs.umass.edu/ml/datasets/KDD+Cup+1999+Data
Muniyandi, A.P., Rajeswari, R., Pajaram, P.: Network anomaly detection by cascading k-means clustering and C4.5 decision tree algorithm. In: International Conference on Communication Technology and System Design, vol. 30, pp. 174–182 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Kuchaki Rafsanjani, M., Fatemidokht, H., Balas, V.E., Batth, R.S. (2021). An Anomaly Detection System Based on Clustering and Fuzzy Set Theory in VANETs. In: Balas, V., Jain, L., Balas, M., Shahbazova, S. (eds) Soft Computing Applications. SOFA 2018. Advances in Intelligent Systems and Computing, vol 1222. Springer, Cham. https://doi.org/10.1007/978-3-030-52190-5_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-52190-5_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52189-9
Online ISBN: 978-3-030-52190-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)