Design a Process to Detect and Mitigate the Malicious Attacks in VANET Using Ml Approach

Authors

  • Prakash V. Sontakke Pimpri Chinchwad College of Engineering, Savitribai Phule Pune University, Pune- 411044, India.
  • Nilkanth B. Chopade Pimpri Chinchwad College of Engineering, Savitribai Phule Pune University, Pune- 411044, India.

Keywords:

VANET, HCMNDA (Hybrid cooperative malicious node detection Approach), attackers, security

Abstract

The research intends to detect suspicious behavior in VANETs and block the vehicles involved from using the network for its intended purpose of safe information exchange. To enhance traffic safety and efficiency, VANETs use wireless ad hoc communication between vehicles and roadside devices to share cooperative awareness data and event-based messaging. By considering the existence and condition of cars traveling within a set range, drivers can receive quick notifications about potentially hazardous scenarios, such as a vehicle suddenly braking in front of the back of traffic congestion up ahead or the hacking of shared information inside a network. Within a communication range of a few hundred meters, nodes in a VANET will often broadcast mobility-related data (i.e. absolute values for position, time, heading, and speed) to develop a communal knowledge of single-hop neighbors. The ability for network nodes to communicate ad hoc allows traffic safety software to run with little lag.

For the purpose of protecting VANETs from outside attackers, the suggested HCMNDA (Hybrid cooperative malicious node detection Approach) methods employ automated prediction. Only VANET-registered nodes have addresses that have been validated by a trusted certificate authority. Internal attackers with the right hardware, software, and valid certificates can be detected by analyzing stored data in a table using a clustering approach. I illustrate how the Attacker's single-hop or multi-hop communication range may be negatively affected by the processing of incorrect information on the traffic's overall security and performance. The majority of existing VANET misbehavior detection systems focus on data-centric plausibility and consistency criteria.

Most existing solutions are only tested via simulations. To the contrary, I employed a network-wide automated prediction of malicious activity to test how well VANET misbehavior detection stands up in the actual world. Long-term research in operational tests based on simulation, and dedicated trials employing test vehicles, yielded fresh insights that are presented here. Based on these findings, the cutting-edge HCMNDA (Hybrid cooperative malicious node detection Approach) method was developed. There are two main benefits to this approach: the ability to quickly pinpoint potential attackers within the cluster and the ability to spot irregular behavior in the immediate vicinity. Using this strategy, which can detect abnormal node behavior should be effective even against yet-to-be-developed attack methods.

Downloads

Download data is not yet available.

References

Carlos H. O. O. Quevedo, Ana M. B. C. Quevedo, Ahmed Serhrouchni , “An Intelligent Mechanism for Sybil Attacks Detection in VANETs”, 978-1-7281-5089-5/20/$31.00 ©2020 IEEE.

Stefan Mihai, Nedzhmi Dokuz, Meer Saqib Ali, Purav Shah, and Ramona Trestian,” Security Aspects of Communications in VANETs”, 978-1-7281-5611-8/20/$31.00 c 2020 IEEE.

Fabio Gonc¸alves, Bruno Ribeiro, Oscar Gama,“A Systematic Review on Intelligent Intrusion Detection Systems for VANETs”, 978-1-7281-5764-1/19/$31.00 ©2019 IEEE.

WANG TONG, AZHAR HUSSAIN , WANG XI BO , AND SABITA MAHARJAN ,“Artificial Intelligence for Vehicle-to-Everything: a Survey”, 2169-3536 (c) 2019 IEEE.

C. Chembe, D. Kunda, I. Ahmedy, R. Md Noor, A. Q. Md Sabri, and M. A. Ngadi, “Infrastructure based spectrum sensing scheme in VANET using reinforcement learning,” Veh. Commun., vol. 18, p. 100161, 2019.

Dimitrios Kosmanos, Apostolos Pappas , Francisco J. Aparicio-Navarro ,”Intrusion Detection System for Platooning Connected Autonomous Vehicles”, 978-1-7281-4757-4/19/$31.00 c 2019 IEEE.

W. Tong, A. Hussain, W. X. Bo, and S. Maharjan, “Artificial Intelligence for Vehicle-to-Everything: A Survey,” IEEE Access, vol. 7, pp. 10823–10843, 2019.

R. Boutaba et al., “A comprehensive survey on machine learning for networking: evolution, applications and research opportunities,” J. Internet Serv. Appl., vol. 9, no. 1, p. 16, 2018.

S. Pouyanfar et al., “A Survey on Deep Learning: Algorithms, Techniques, and Applications,” ACM Comput. Surv., vol. 51, no. 5, pp. 92:1--92:36, Sep. 2018.

Y. Gordienko et al., "Deep learning with lung segmentation and bone shadow exclusion techniques for chest x-ray analysis of lung cancer," in International Conference on Theory and Applications of Fuzzy Systems and Soft Computing, 2018, pp. 638-647: Springer.

AB Kathole, KN Vhatkar, S Kumbhare, J Katti, VV Kimbahune, “IoT-Based Smart Agriculture for Onion Plant Disease Management: A Comprehensive Approach”, International Journal of Intelligent Systems and Applications in Engineering,2024.

S Kumbhare, SA Ubale, G Dharmale, N Mhala, N Gandhewar, “IoT-Enabled Agricultural Waste Management for Sustainable Energy Generation”, International Journal of Intelligent Systems and Applications in Engineering,2024.

SD Patil, AB Kathole, S Kumbhare, K Vhatkar, “A Blockchain-Based Approach to Ensuring the Security of Electronic Data”, International Journal of Intelligent Systems and Applications in Engineering,2024.

Ara and A. Ara, "Case study: Integrating IoT, streaming analytics and machine learning to improve intelligent diabetes management system," in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017, pp. 3179-3182.

S. Shahrestani, "Assistive IoT: Deployment Scenarios and Challenges," in Internet of Things and Smart Environments: Springer, 2017, pp. 75-95.

S. Pandit and G. Singh, “Spectrum Sensing in Cognitive Radio Networks: Potential Challenges and Future Perspective BT - Spectrum Sharing in Cognitive Radio Networks: Medium Access Control Protocol Based Approach,” S. Pandit and G. Singh, Eds. Cham: Springer International Publishing, 2017, pp. 35–75.

N. Muchandi and R. Khanai, “Cognitive Radio Spectrum Sensing: A Survey,” Int. Conf. Electr. Electron. Optim. Tech. - 2016 Cogn., pp. 3233–3237, 2016.

J. Qadir, “Artificial intelligence based cognitive routing for cognitive radio networks,” Artif. Intell. Rev., vol. 45, no. 1, pp. 25–96, 2016.

S. M. Baby and M. James, “A Comparative Study on Various Spectrum Sharing Techniques,” Procedia Technol., vol. 25, no. Raerest, pp. 613–620, 2016.

Atul Kathole , Dinesh Chaudhari “Secure Hybrid Approach for Sharing Data Securely in VANET”, Proceeding of International Conference on Computational Science and Applications pp 217–221, © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Atul Kathole , Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Atul Kathole , Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Atul B Kathole, Dr.Dinesh N.Chaudhari, "Pros & Cons of Machine learning and Security Methods, "2019.http://gujaratresearchsociety.in/index.php/ JGRS, ISSN: 0374-8588, Volume 21 Issue 4.

“Practical Guide to Principal Component Analysis (PCA) in R & Python”, accessed on 5/11/2016, https://www.analyticsvidhya.com/blog/2016/03/practical-guide-principal-component-analysis-python/

Physical Human Activity Recognition Using Wearable Sensors Ferhat Attal , Samer Mohammed , Mariam Dedabrishvili , Facial Chamroukhi , Latifa Oukhellou and Yacine Amirat Received: 11 September 2015; Accepted: 8 December 2015; Published: 11 December 2015 Academic Editor: Vittorio M.N. Passaro.

Downloads

Published

24.03.2024

How to Cite

Sontakke, P. V. ., & Chopade, N. B. . (2024). Design a Process to Detect and Mitigate the Malicious Attacks in VANET Using Ml Approach. International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 106–117. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5050

Issue

Section

Research Article