6 research outputs found

    A new procedure for misbehavior detection in vehicular ad-hoc networks using machine learning

    Get PDF
    Misbehavior detection in vehicular ad hoc networks (VANETs) is performed to improve the traffic safety and driving accuracy. All the nodes in the VANETs communicate to each other through message logs. Malicious nodes in the VANETs can cause inevitable situation by sending message logs with tampered values. In this work, various machine learning algorithms are used to detect the primarily five types of attacks namely, constant attack, constant offset attack, random attack, random offset attack, and eventual attack. Firstly, each attack is detected by different machine learning algorithms using binary classification. Then, the new procedure is created to do the multi classification of the attacks on best chosen algorithm from different machine learning techniques. The highest accuracy in case of binary classification is obtained with Naïve Bayes (100%), decision tree (100%), and random forest (100%) in type1 attack, decision tree (100%) in type2 attack, and random forest (98.03%, 95.56%, and 95.55%) in Type4, Type8 and Type16 attack respectively. In case of new procedure for multi-classification, the highest accuracy is obtained with random forest (97.62%) technique. For this work, VeReMi dataset (a public repository for the malicious node detection in VANETs) is used

    Guardauto: A Decentralized Runtime Protection System for Autonomous Driving

    Full text link
    Due to the broad attack surface and the lack of runtime protection, potential safety and security threats hinder the real-life adoption of autonomous vehicles. Although efforts have been made to mitigate some specific attacks, there are few works on the protection of the self-driving system. This paper presents a decentralized self-protection framework called Guardauto to protect the self-driving system against runtime threats. First, Guardauto proposes an isolation model to decouple the self-driving system and isolate its components with a set of partitions. Second, Guardauto provides self-protection mechanisms for each target component, which combines different methods to monitor the target execution and plan adaption actions accordingly. Third, Guardauto provides cooperation among local self-protection mechanisms to identify the root-cause component in the case of cascading failures affecting multiple components. A prototype has been implemented and evaluated on the open-source autonomous driving system Autoware. Results show that Guardauto could effectively mitigate runtime failures and attacks, and protect the control system with acceptable performance overhead

    Secure Authentication and Privacy-Preserving Techniques in Vehicular Ad-hoc NETworks (VANETs)

    Get PDF
    In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that need to be thoroughly addressed and solved for the widespread adoption/deployment of VANETs. Given the importance of these issues, researchers have spent a lot of effort in these areas over the last decade. We present an overview of the following issues that arise in VANETs: privacy, authentication, and secure message dissemination. Then we present a comprehensive review of various solutions proposed in the last 10 years which address these issues. Our survey sheds light on some open issues that need to be addressed in the future

    Predict and prevent from misbehaving intruders in heterogeneous vehicular networks

    No full text
    International audienceThe great evolution of communication technologies and potential availability of network access mediums and service providers have led to the appearance of heterogeneous network concept. This paradigm refers to the seamless and ubiquitous interoperability between multi-coverage protocols with different access techniques. A heterogeneous vehicular network (HetVNet) is a heterogeneous network where a vehicle is a smart node equipped with various communication technologies such as Dedicated Short Range Communication (DSRC) and cellular network (3G/4G). The purpose of HetVNet is ensuring a wide area coverage to all vehicles in a large scale network, thus achieving the Always Best Connected (ABC) paradigm where the best continuous connectivity is offered to clients. In addition, HetVNet enables the acquisition and processing of a large amount of data from wide geographical areas via smart vehicles to offer various categories of services to drivers and passengers. There are many challenges in HetVNet and security is one of them since, on one hand, vehicles exchange vital data (about congestions, accidents, hazards, road-works, etc.) and on the other hand they form a specific network with particular characteristics (frequent fragmentation, dynamic topology, no centralized authority, etc.). Intrusion detection systems (IDS) act as a second wall of defense when cryptography is broken and already proved their effectiveness against both external and internal intruders. Therefore, in this research work we propose and implement an intrusion detection and prediction scheme able to detect and especially predict the future misbehavior of a malicious vehicle. The attack prediction technique proposed in this paper is based on a game theory to prevent the occurrence of malicious vehicles. Moreover, the proposed detection scheme detects the most dangerous attacks that target a HetVNet such as false alerts and Sybil attacks. This detection uses a rules-based technique to model a normal behavior of a vehicle. Simulations performed using NS-3 show that our scheme exhibits a high accuracy prediction, faster attack detection, and a low communication overhead compared to current detection frameworks
    corecore