A hierarchical detection method in external communication for self-driving vehicles based on TDMA
نویسندگان
چکیده
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
منابع مشابه
Using Discriminant Analysis to Detect Intrusions in External Communication of Self-Driving Vehicles
Security systems are considered a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, an intelligent intrusion detection system (IDS) is proposed to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability ...
متن کاملIntelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks
Vehicular ad hoc networks (VANETs) play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs) exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole...
متن کاملAn Investigation on the Effect of Using Regenerative Braking System on Energy Consumption Reduction of Hybrid Vehicles Based on Tehran City Driving Cycle
In driving and when you brake, a lot of energy is dissipated to stop the car; especially in urban areas where the vehicle is driving in a stop-and-go pattern. This energy, which is dissipated by the brake pads, can be stored in the vehiclechr('39')s battery. In Hybrid and Electric Vehicles, a regenerative brake can be used alongside the mechanical brakes to regenerate some energy while braking....
متن کاملA new control strategy for energy management in Plug-in Hybrid Electric Vehicles based on Fuzzy Cognitive Maps
In this paper, a new control strategy for energy management in Plug-in Hybrid Electric Vehicles (PHEVs) using Fuzzy Cognitive Map (FCM) is presented. In this strategy, FCM is used as a supervisory control such that the State of Charge (SoC) of the battery is kept in the acceptable range and fuel consumption per kilometer is reduced, in addition to providing the request power. Since this method ...
متن کاملEntropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کامل