Optimal Attack or Malicious Activity Detection in VANET Using Ensemble Machine Learning Approach

Authors

  • Raghunath M. Kawale Research Scholar, SKNCOE Vadgaon (Bk.), Pune.
  • Ritesh V. Patil Principal, PDEA's College of Engineering Manjari (Bk.), Pune.
  • Surendra A. Mahajan Associate Professor, PVGCOET & GKPIOM,Pune.

Keywords:

Malicious Activity Detection, Vehicular Ad-Hoc Network, Ensemble Machine Learning Model

Abstract

In a Vehicular Ad-Hoc Network (VANET), a large number of moving and stationary automobiles form a wireless network. It's a cheap and straightforward way to get data on traffic and cars to command centers. VANET employs a set of protocols to safely transmit data and connect vehicle nodes to the internet. It's not uncommon for VANETs to make use of the Ad-hoc on-demand Distance Vector Protocol (AODV). It is a machine language paradigm that requires minimal processing time and memory. OBUs on vehicles carry out the necessary protocols and procedures for sending messages between vehicles, while RSUs are the fixed links that allow vehicles to communicate with one another. When multiple vehicles transmit data on a single vehicle at the same time, some of the data may be garbled or lost. However, the nodes' roles shift regularly, making routing difficult when a vehicle's software or hardware fails. New attack detection in VANET is developed to address the aforementioned problems. At first, we compiled the information from several online resources. Data cleansing is the process of scrubbing information of duplicates or irrelevant details. By contrasting the results of the developed machine learning-based attack detection in VANET with those of previously established methods and algorithms, we can verify the effectiveness of the latter.

Downloads

Download data is not yet available.

References

Gurjot Kaur and Deepti Kakkar, "Hybrid optimization enabled trust- based secure routing with deep learning- based attack detection in VANET," Ad Hoc Networks, vol.136, pp.102961, November 2022.

Hind Bangui, Mouzhi Ge and Barbora Buhnova, "A hybrid machine learning model for intrusion detection in VANET," Computing, vol.104, pp.503– 531, 2022.

Velayudhan, N.C., Anitha, A. and Madanan, "Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC," Journal of Ambient Intelligence and Humanized Computing, vol.14, pp.1297–1309, 2023.

Ayoub Alsarhan, Mohammad Alauthman, Esra’a Alshdaifat, Abdel- Rahman Al- Ghuwairi and Ahmed Al- Dubai, "Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks," Journal of Ambient Intelligenceand Humanized Computing, vol.14, pp.6113–6122, 2023.

J. Bhuvana, Hina Hashmi, Rachit Adhvaryu, Sneha Kashyap, Savita Kumari and Durgesh Wadhwa, "Intelligent analytics algorithms in breach detection systems for securing VANETs and data for smart transportation management, Soft Computing, 2023.

Erfan A. Shams, Ahmet Rizaner and Ali Hakan Ulusoy, "Flow-based intrusion detection system in Vehicular Ad hoc Network using context-aware feature extraction," Vehicular Communications, vol.41, pp.100585, June 2023.

Y. Gao, H. Wu, B. Song, Y. Jin, X. Luo and X. Zeng, "A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network," IEEE Access, vol. 7, pp. 154560-154571, 2019.

Ankit Kumar, Vijayakumar Varadarajan, Abhishek Kumar, Pankaj Dadheech, Surendra Singh Choudhary, V.D. Ambeth Kumar, B.K. Panigrahi and Kalyana C. Veluvolu, "Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm," Microprocessors and Microsystems, vol.80, pp.103352, February 2021.

Manoj kumar Pulligilla and C. Vanmathi, "An authentication approach in SDN- VANET architecture with Rider-Sea Lion optimized neural network for intrusion detection," Internet of Things, vol.22, pp.100723, July 2023.

B.A. Tosunoglu and C. Kocak, "feature selection for clustering and classification based attack detection systems in vehicular ad-hoc networks," Microprocessors and Microsystems, pp.104808, February 2023.

Yantao Yu, Xin Zeng, Xiaoping Xue and Jingxiao Ma, "LSTM-Based Intrusion Detection System for VANETs: A Time Series Classification Approach to False Message Detection," IEEE Transactions on Intelligent Transportation Systems, vol. 23, pp. 23906-23918, December 2022.

T. Zhou, R. R. Choudhury, P. Ning and K. Chakrabarty, "P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol. 29, pp. 582-594, March 2011.

Nie L, Li YK and Kong Xiangjie, "Spatio-temporal network traffic estimation and anomaly detection based on convolutional neural network in vehicular ad-hoc networks," IEEE Access, vol.6, pp.40168–40176, 2018.

Sedjelmaci H and Senouci SM, "An accurate and efficient collaborative intrusion detection framework to secure vehicular networks," Computers Electrical Engineering, vol.43, pp.33– 47, 2015.

Omar Abdel Wahab, Azzam Mourad, Hadi Otrok and Jamal Bentahar, "SVM-based intelligent detection model for clustered vehicular ad hoc networks," vol.50, pp.40–54, 2016.

David A. Schmidt, Mohammad S. Khan, Brian T. Bennett, "Spline-based intrusion detection for VANET utilizing knot flow classification," Internet technology letters," vol.3, June 2020.

Xiaoyun Liu, Gongjun Yan, Danda B Rawat and Shugang Deng, "Data Mining Intrusion Detection in Vehicular Ad Hoc Network,"IEICE Transactions on Information and Systems, vol.7, pp.1719-1726, July 2014.

Rupareliya J, Vithlani S and Gohel C, "Securing VANET by preventing attacker node using watchdog and Bayesian network theory," Procedia computer science, vol.79, pp.649–656, 2016.

Hasan MAM, Nasser M, Pal B and Ahmad S, "Support vector machine and random forest modeling for intrusion detection system (IDS)," Journal of Intelligent Learning Systems and Applications, Vol.6 February 2014.

Sonali D.Patil, Atul B.Kathole, Savita Kumbhare, Kapil Vhatkar, Vinod V. Kimbahune,“A Blockchain-Based Approach to Ensuring the Security of Electronic Data”, International Journal ofINTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING, IJISAE, 2024, 12(11s), 649–655.

Atul Kathole, Dinesh Chaudhari “Secure Hybrid Approach for Sharing Data Securely in VANET”, Proceeding of International Conference on Computational Science and Applications pp 217–221, © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Atul Kathole, Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Atul Kathole , Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Mohammad Dehghani, PavelTrojovský and Om Parkash Malik, "Green Anaconda Optimization: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems," Biomimetics, vol.8, March 2023.

Downloads

Published

02.02.2024

How to Cite

Kawale, R. M. ., Patil, R. V. ., & Mahajan, S. A. . (2024). Optimal Attack or Malicious Activity Detection in VANET Using Ensemble Machine Learning Approach. International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 669 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4744

Issue

Section

Research Article