Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant

作者: Man Zhou , Lansheng Han , Hongwei Lu , Cai Fu

DOI: 10.1016/J.COMNET.2020.107174

关键词: AdversaryWireless ad hoc networkIntrusion detection systemReputationComputer scienceDistributed computingInvariant (mathematics)Big dataVehicular ad hoc networkStochastic Petri net

摘要: Abstract The characteristics of high mobility and rapid topology change the Vehicle Ad Hoc Network (VANET) makes it vulnerable to various malicious attacks. adversary utilizes instability communication link induced by frequent changes structure undermine reliability timeliness vehicular communication, which raises serious security threats. In this paper, a distributed collaborative intrusion detection system based on invariant called DCDIV is proposed identify betray attacks in VANET. Firstly, paper designs framework implement storage calculation big data tracking collection information. Secondly, considering strict delay limitation requirement information transmission between vehicles, reputation-based cooperative method exploited establish stable reliable link, where novel cluster head vehicle selection global reputation state, traffic density, life presented. Following this, uses dynamic behavior analysis technology mine invariant, contributes determine normal driving so as detect behaviors. Finally, Stochastic Petri Net describe state its transfer, then defines system. simulation results demonstrate that has higher rate, lower false alarm faster attack rate compared with existing methods, ensures during process.

参考文章(44)
Bart Dhoedt, Ingrid Moerman, Jeroen Hoebeke, Piet Demeester, An overview of mobile ad hoc networks: applications and challenges Journal of The Communications Network. ,vol. 3, pp. 60- 66 ,(2004)
Neeraj Kumar, Naveen Chilamkurti, Collaborative trust aware intelligent intrusion detection in VANETs Computers & Electrical Engineering. ,vol. 40, pp. 1981- 1996 ,(2014) , 10.1016/J.COMPELECENG.2014.01.009
Hichem Sedjelmaci, Sidi Mohammed Senouci, An accurate and efficient collaborative intrusion detection framework to secure vehicular networks Computers & Electrical Engineering. ,vol. 43, pp. 33- 47 ,(2015) , 10.1016/J.COMPELECENG.2015.02.018
C Sommer, R German, F Dressler, Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis IEEE Transactions on Mobile Computing. ,vol. 10, pp. 3- 15 ,(2011) , 10.1109/TMC.2010.133
Robert Mitchell, Ing-Ray Chen, Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems IEEE Transactions on Reliability. ,vol. 65, pp. 350- 358 ,(2016) , 10.1109/TR.2015.2406860
Luke Tierney, Markov Chains for Exploring Posterior Distributions Annals of Statistics. ,vol. 22, pp. 1701- 1728 ,(1994) , 10.1214/AOS/1176325750
Vimal Bibhu, Kumar Roshan, K Balwant Singh, D Kumar Singh, None, Performance Analysis of Black Hole Attack in Vanet International Journal of Computer Network and Information Security. ,vol. 4, pp. 47- 54 ,(2012) , 10.5815/IJCNIS.2012.11.06
H. Rehborn, S. L. Klenov, J. Palmer, Common traffic congestion features studied in USA, UK, and Germany based on kerner's three-phase traffic theory ieee intelligent vehicles symposium. pp. 19- 24 ,(2011) , 10.1109/IVS.2011.5940394
R.A. Shaikh, H. Jameel, B.J. d'Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song, Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks IEEE Transactions on Parallel and Distributed Systems. ,vol. 20, pp. 1698- 1712 ,(2009) , 10.1109/TPDS.2008.258
A. Rodriguez, A. Laio, Clustering by fast search and find of density peaks Science. ,vol. 344, pp. 1492- 1496 ,(2014) , 10.1126/SCIENCE.1242072