467 research outputs found

    Position Falsification Detection in VANET with Consecutive BSM Approach using Machine Learning Algorithm

    Get PDF
    Vehicular ad-hoc network (VANET) is an emerging technology for vehicle-to-vehicle communication vital for reducing road accidents and traffic congestion in an Intelligent Transportation System (ITS). VANET communication is vulnerable to various attacks and cryptographic techniques are used for message integrity and authentication of vehicles in order to ensure security and privacy for vehicular communications. However, if there is an inside attacker additional measures are necessary to ensure the correctness of the transmitted data. A basic safety message (BSM) is broadcasted by each vehicle in the network periodically to transmit its status. Position falsification is an attack where the attacker broadcasts a false BSM position, leading to congestion or even accidents. It becomes imperative to detect and identify the attacker to ensure safety in the network. Although many trust-based models are researched in the past, this research proposes a feasible and efficient data-centric approach to detect malicious behavior, using machine learning (ML) algorithms.The proposed Machine Learning based misbehavior detection system utilizes labelled dataset called Vehicular Reference Misbehavior Dataset (VeReMi). VeReMi dataset offers five different types of position falsification attacks with different vehicle and attacker densities. This ML-based model uses two consecutive BSM approach to detect these attacks. Model classification on the Road-side Unit detects and could revoke malicious nodes from the network, reducing computational overhead on vehicles

    Attack Classification and Detection for Misbehaving Vehicles using ML/DL

    Get PDF
    Vehicle ad hoc networks are a crucial component of the next Intelligent Transportation System created to build a reliable and secure connection between various network components to establish a safe and effective transportation network. Because of open nature of VANETs become vulnerable to numerous assaults such forgery, Denial-of-Service (DoS), and false reports, which can ultimately cause traffic jams or accidents The earlier study concentrated on misbehaving vehicles rather than RSUs. Proposed method integrates data from two subsequent BSMs for testing and training by employing machine learning (ML) methods. The framework merges the data from two BSMs in the right manner and utilizes machine learning/Deep learning methodology which identify the running vehicle as a legal or hostile one

    Neural Network Based Approach for Detecting Location Spoofing in Vehicular Communication

    Get PDF
    Vehicular Ad hoc Network (VANET) is an evolving subset of MANET. It\u27s deployed on the roads, where vehicles act as mobile nodes. Active security and Intelligent Transportation System (ITS) are integral applications of VANET, which require stable and uninterrupted vehicle-to-vehicle communication technology. VANET, is a type of wireless network, due to which it is quite prone to security attacks. Extremely dynamic connections, sensitive data sharing and time-sensitivity of this network make it a vulnerable to security attacks. The messages shared between the vehicles are the basic safety message (BSM), these messages are broadcasted by each vehicle in the network to report its status to the other vehicles and Road Side Unit (RSU). One common attack is to use position falsification to hamper the roadside safety, leading to road accidents and congestion. Identifying malicious nodes involved in such attacks is crucial to ensure safety in the network. The proposed research presents a neural network based approach for detecting position falsification attacks in VANET. The proposed Deep Learning-based detection of attackers is done using the dataset called Vehicular Reference Misbehavior Dataset (VeReMi). VeReMi dataset provides five classes of attackers, each broadcasting fabricated coordinates concerning the type. This MLP-based model uses resampled single BSM and two consecutive BSM to detect these attacks

    Trust Management in the Internet of Everything

    Full text link
    Digitalization is leading us towards a future where people, processes, data and things are not only interacting with each other, but might start forming societies on their own. In these dynamic systems enhanced by artificial intelligence, trust management on the level of human-to-machine as well as machine-to-machine interaction becomes an essential ingredient in supervising safe and secure progress of our digitalized future. This tutorial paper discusses the essential elements of trust management in complex digital ecosystems, guiding the reader through the definitions and core concepts of trust management. Furthermore, it explains how trust-building can be leveraged to support people in safe interaction with other (possibly autonomous) digital agents, as trust governance may allow the ecosystem to trigger an auto-immune response towards untrusted digital agents, protecting human safety.Comment: Proceedings of the 16th European Conference on Software Architecture-Companion Volum

    Smart Grid Technologies in Europe: An Overview

    Get PDF
    The old electricity network infrastructure has proven to be inadequate, with respect to modern challenges such as alternative energy sources, electricity demand and energy saving policies. Moreover, Information and Communication Technologies (ICT) seem to have reached an adequate level of reliability and flexibility in order to support a new concept of electricity networkā€”the smart grid. In this work, we will analyse the state-of-the-art of smart grids, in their technical, management, security, and optimization aspects. We will also provide a brief overview of the regulatory aspects involved in the development of a smart grid, mainly from the viewpoint of the European Unio

    Security aspects of communications in VANETs

    Get PDF
    The Fourth Industrial Revolution has begun and it promises breakthroughs in Artificial Intelligence, robotics, Machine Learning, Internet of Things, Digital Twin, and many other technologies that tackle advancements in the industries. The trend is headed towards automation and connectivity. In the automotive industry, advancements have been made towards integrating autonomous driving vehicles into Intelligent Transport Systems (ITS) with the use of Vehicular Ad-Hoc Networks (VANETs). The purpose of this type of network is to enable efficient communication between vehicles (V2V communication) or vehicles and infrastructure (V2I communication), to improve driving safety, to avoid traffic congestion, and to better coordinate transport networks. This direction towards limited (or lack of) human intervention implies vulnerability to cyber attacks. In this context, this paper provides a comprehensive classification of related state-of-the-art approaches following three key directions: 1) privacy, 2) authentication and 3) message integrity within VANETs. Discussions, challenges and open issues faced by the current and next generation of vehicular networks are also provided

    Context-aware Security for Vehicles and Fleets: A Survey

    Get PDF
    Vehicles are becoming increasingly intelligent and connected. Interfaces for communication with the vehicle, such as WiFi and 5G, enable seamless integration into the userā€™s life, but also cyber attacks on the vehicle. Therefore, research is working on in-vehicle countermeasures such as authentication, access controls, or intrusion detection. Recently, legal regulations have also become effective that require automobile manufacturers to set up a monitoring system for fleet-wide security analysis. The growing amount of software, networking, and the automation of driving create new challenges for security. Context-awareness, situational understanding, adaptive security, and threat intelligence are necessary to cope with these ever-increasing risks. In-vehicle security should be adaptive to secure the car in an infinite number of (driving) situations. For fleet-wide analysis and alert triage, knowledge and understanding of the circumstances are required. Context-awareness, nonetheless, has been sparsely considered in the field of vehicle security. This work aims to be a precursor to context-aware, adaptive and intelligent security for vehicles and fleets. To this end, we provide a comprehensive literature review that analyzes the vehicular as well as related domains. Our survey is mainly characterized by the detailed analysis of the context information that is relevant for vehicle security in the future

    Stacking Ensemble Models for Misbehavior Detection in Vehicular Networks

    Get PDF

    Machine Learning Use-Cases in C-ITS Applications

    Get PDF
    In recent years, the development of Cooperative Intelligent Transportation Systems (C-ITS) have witnessed significant growth thus improving the smart transportation concept. The ground of the new C-ITS applications are machine learning algorithms. The goal of this paper is to give a structured and comprehensive overview of machine learning use-cases in the field of C-ITS. It reviews recent novel studies and solutions on CITS applications that are based on machine learning algorithms. These works are organised based on their operational area, including self-inspection level, inter-vehicle level and infrastructure level. The primary objective of this paper is to demonstrate the potential of artificial intelligence in enhancing C-ITS applications
    • ā€¦
    corecore