[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3368756.3369017acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmartcityappConference Proceedingsconference-collections
research-article

Enhancing vehicular ad-hoc networks security using intrusion detection system techniques

Published: 02 October 2019 Publication History

Abstract

The deployment of vehicular ad hoc networks has greatly increased the risks caused by the attacks on vehicular networks, that represents a real problem for road safety. To secure this network against these attacks, several methods and techniques have been developed. Intrusion Detection System (IDS) is an attack countermeasure that listens to network traffic in a sneaky manner in order to identify abnormal or malicious activities and thus to have a preventive action on the risks of intrusion. IDS has already proved its worth in detection of malicious nodes in traditional networks, but in VANET, using IDS is difficult due to its peculiar characteristics such as high mobility, Dynamic topology, Anonymity of the support.
In this paper, we present some possible types of attacks against VANET to get the readers well acquainted with the attacks and threats threatened to vehicular network. After, we introduce different IDS technique for succeeded by analyzing and comparing each technique along with merits and demerits, and conclude the best method between them. Finally, we propose a solution to minimize the weak points of Watchdog and Pathrater and IDS clustred based RSU.

References

[1]
Abdelgadir, M., Saeed, R., & Babiker, A. (2016). Vehicular Ad-hoc Networks (VANETs) dynamic performance estimation routing model for city scenarios. In 2016 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1--8). IEEE.
[2]
Targe, P. A., & Satone, M. P. (2016). VANET based Real-Time Intelligent Transportation System. International Journal of Computer Applications, 145(4), 34--38.
[3]
Bagherlou, H and Ghaffari, A. (2018). A routing protocol for vehicular ad hoc networks using simulated annealing algorithm and neural networks. The Journal of Supercomputing, 74(6), 2528--2552.
[4]
Liang, W., Li, Z., Zhang, H., Wang, S., & Bie, R. (2015). Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. International Journal of Distributed Sensor Networks, 11(8), 745303.
[5]
Singh, G. D., Tomar, R., Sastry, H. G., & Prateek, M. (2018). A review on VANET routing protocols and wireless standards. In Smart computing and informatics (pp. 329--340). Springer.
[6]
Al Junaid, M. A. H., Syed, A. A., Warip, M. N. M., Azir, K. N. F. K., & Romli, N. H. (2018). Classification of security attacks in VANET: a review of requirements and perspectives. In MATEC Web of Conferences (Vol. 150, p. 06038). EDP Sciences.
[7]
Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. D. (2015). An intrusion detection system against malicious attacks on the communication network of driverless cars. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (pp. 916--921). IEEE.
[8]
Geetha, K., & Sreenath, N. (2016). Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol. Arabian Journal for Science and Engineering, 41(3), 1161--1172.
[9]
Upadhyaya, A. N., & Shah, J. S. (2018). Attacks on vanet security. Int J Comp Eng Tech, 9(1), 8--19.
[10]
Linna, F., Xiaofeng, S., Weiwei, Z., Haodan, R., Jingzhi, L., Deyang, S., ... & Tao, Q. (2018). An anonymous authentication mechanism based on Kerberos and HIBC. In Proceedings of the 10th International Conference on Education Technology and Computers (pp. 392--396). ACM.
[11]
Mina Rahbari and Mohammad Ali Jabreil Jamali, "Efficient Detection Of Sybil Attack Based On Cryptography In Vanet". International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, 2011.
[12]
Namarpreet Kaur and Aman Arora, "A Review on Security Issues in VANET", International Journal of Advanced Research in Computer Science, Vol.6, No.2, 2015.
[13]
Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. & Rajarajan, M. "A survey of intrusion detection techniques in Cloud". Journal of Network and Computer Applications, 36(1), pp. 42--57, 2013.
[14]
Jorge Hortelano, Juan Carlos Ruiz and Pietro Manzoni, "Evaluating the uselfusness of watchdogs for intrusion detection in VANETs", IEEE International Conference on Communications Workshops, 2010.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SCA '19: Proceedings of the 4th International Conference on Smart City Applications
October 2019
788 pages
ISBN:9781450362894
DOI:10.1145/3368756
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IDS
  2. ITS
  3. VANET
  4. security

Qualifiers

  • Research-article

Conference

SCA2019

Acceptance Rates

Overall Acceptance Rate 183 of 487 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 115
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media