A hierarchical detection method in external communication for self-driving vehicles based on TDMA

نویسندگان

  • Khattab M Ali Alheeti
  • Muzhir Shaban Al-Ani
  • Klaus McDonald-Maier
چکیده

Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Discriminant Analysis to Detect Intrusions in External Communication of Self-Driving Vehicles

Security systems are considered a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, an intelligent intrusion detection system (IDS) is proposed to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability ...

متن کامل

Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

Vehicular ad hoc networks (VANETs) play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs) exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole...

متن کامل

An Investigation on the Effect of Using Regenerative Braking System on Energy Consumption Reduction of Hybrid Vehicles Based on Tehran City Driving Cycle

In driving and when you brake, a lot of energy is dissipated to stop the car; especially in urban areas where the vehicle is driving in a stop-and-go pattern. This energy, which is dissipated by the brake pads, can be stored in the vehiclechr('39')s battery. In Hybrid and Electric Vehicles, a regenerative brake can be used alongside the mechanical brakes to regenerate some energy while braking....

متن کامل

A new control strategy for energy management in Plug-in Hybrid Electric Vehicles based on Fuzzy Cognitive Maps

In this paper, a new control strategy for energy management in Plug-in Hybrid Electric Vehicles (PHEVs) using Fuzzy Cognitive Map (FCM) is presented. In this strategy, FCM is used as a supervisory control such that the State of Charge (SoC) of the battery is kept in the acceptable range and fuel consumption per kilometer is reduced, in addition to providing the request power. Since this method ...

متن کامل

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2018