首页 | 本学科首页   官方微博 | 高级检索  
     


Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks
Authors:Alsarhan  Ayoub  Al-Ghuwairi  Abdel-Rahman  Almalkawi  Islam T  Alauthman  Mohammad  Al-Dubai  Ahmed
Affiliation:1.Department of Computer Information System, Hashemite University, Zarqa, Jordan
;2.Department of Software Engineering, Hashemite University, Zarqa, Jordan
;3.Department of Computer Engineering, Hashemite University, Zarqa, Jordan
;4.Department of Computer Science, Faculty of information technology, Zarqa University, Zarqa, Jordan
;5.School of Computing, Edinburgh Napier University, Edinburgh, UK
;
Abstract:

An essential element in the smart city vision is providing safe and secure journeys via intelligent vehicles and smart roads. Vehicular ad hoc networks (VANETs) have played a significant role in enhancing road safety where vehicles can share road information conditions. However, VANETs share the same security concerns of legacy ad hoc networks. Unlike exiting works, we consider, in this paper, detection a common attack where nodes modify safety message or drop them. Unfortunately, detecting such a type of intrusion is a challenging problem since some packets may be lost or dropped in normal VANET due to congestion without malicious action. To mitigate these concerns, this paper presents a novel scheme for minimizing the invalidity ratio of VANET packets transmissions. In order to detect unusual traffic, the proposed scheme combines evidences from current as well as past behaviour to evaluate the trustworthiness of both data and nodes. A new intrusion detection scheme is accomplished through a four phases, namely, rule-based security filter, Dempster–Shafer adder, node’s history database, and Bayesian learner. The suspicion level of each incoming data is determined based on the extent of its deviation from data reported from trustworthy nodes. Dempster–Shafer’s theory is used to combine multiple evidences and Bayesian learner is adopted to classify each event in VANET into well-behaved or misbehaving event. The proposed solution is validated through extensive simulations. The results confirm that the fusion of different evidences has a significant positive impact on the performance of the security scheme compared to other counterparts.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号