Design a Process to Detect and Mitigate the Malicious Attacks in VANET Using Ml Approach
Keywords:
VANET, HCMNDA (Hybrid cooperative malicious node detection Approach), attackers, securityAbstract
The research intends to detect suspicious behavior in VANETs and block the vehicles involved from using the network for its intended purpose of safe information exchange. To enhance traffic safety and efficiency, VANETs use wireless ad hoc communication between vehicles and roadside devices to share cooperative awareness data and event-based messaging. By considering the existence and condition of cars traveling within a set range, drivers can receive quick notifications about potentially hazardous scenarios, such as a vehicle suddenly braking in front of the back of traffic congestion up ahead or the hacking of shared information inside a network. Within a communication range of a few hundred meters, nodes in a VANET will often broadcast mobility-related data (i.e. absolute values for position, time, heading, and speed) to develop a communal knowledge of single-hop neighbors. The ability for network nodes to communicate ad hoc allows traffic safety software to run with little lag.
For the purpose of protecting VANETs from outside attackers, the suggested HCMNDA (Hybrid cooperative malicious node detection Approach) methods employ automated prediction. Only VANET-registered nodes have addresses that have been validated by a trusted certificate authority. Internal attackers with the right hardware, software, and valid certificates can be detected by analyzing stored data in a table using a clustering approach. I illustrate how the Attacker's single-hop or multi-hop communication range may be negatively affected by the processing of incorrect information on the traffic's overall security and performance. The majority of existing VANET misbehavior detection systems focus on data-centric plausibility and consistency criteria.
Most existing solutions are only tested via simulations. To the contrary, I employed a network-wide automated prediction of malicious activity to test how well VANET misbehavior detection stands up in the actual world. Long-term research in operational tests based on simulation, and dedicated trials employing test vehicles, yielded fresh insights that are presented here. Based on these findings, the cutting-edge HCMNDA (Hybrid cooperative malicious node detection Approach) method was developed. There are two main benefits to this approach: the ability to quickly pinpoint potential attackers within the cluster and the ability to spot irregular behavior in the immediate vicinity. Using this strategy, which can detect abnormal node behavior should be effective even against yet-to-be-developed attack methods.
Downloads
References
Carlos H. O. O. Quevedo, Ana M. B. C. Quevedo, Ahmed Serhrouchni , “An Intelligent Mechanism for Sybil Attacks Detection in VANETs”, 978-1-7281-5089-5/20/$31.00 ©2020 IEEE.
Stefan Mihai, Nedzhmi Dokuz, Meer Saqib Ali, Purav Shah, and Ramona Trestian,” Security Aspects of Communications in VANETs”, 978-1-7281-5611-8/20/$31.00 c 2020 IEEE.
Fabio Gonc¸alves, Bruno Ribeiro, Oscar Gama,“A Systematic Review on Intelligent Intrusion Detection Systems for VANETs”, 978-1-7281-5764-1/19/$31.00 ©2019 IEEE.
WANG TONG, AZHAR HUSSAIN , WANG XI BO , AND SABITA MAHARJAN ,“Artificial Intelligence for Vehicle-to-Everything: a Survey”, 2169-3536 (c) 2019 IEEE.
C. Chembe, D. Kunda, I. Ahmedy, R. Md Noor, A. Q. Md Sabri, and M. A. Ngadi, “Infrastructure based spectrum sensing scheme in VANET using reinforcement learning,” Veh. Commun., vol. 18, p. 100161, 2019.
Dimitrios Kosmanos, Apostolos Pappas , Francisco J. Aparicio-Navarro ,”Intrusion Detection System for Platooning Connected Autonomous Vehicles”, 978-1-7281-4757-4/19/$31.00 c 2019 IEEE.
W. Tong, A. Hussain, W. X. Bo, and S. Maharjan, “Artificial Intelligence for Vehicle-to-Everything: A Survey,” IEEE Access, vol. 7, pp. 10823–10843, 2019.
R. Boutaba et al., “A comprehensive survey on machine learning for networking: evolution, applications and research opportunities,” J. Internet Serv. Appl., vol. 9, no. 1, p. 16, 2018.
S. Pouyanfar et al., “A Survey on Deep Learning: Algorithms, Techniques, and Applications,” ACM Comput. Surv., vol. 51, no. 5, pp. 92:1--92:36, Sep. 2018.
Y. Gordienko et al., "Deep learning with lung segmentation and bone shadow exclusion techniques for chest x-ray analysis of lung cancer," in International Conference on Theory and Applications of Fuzzy Systems and Soft Computing, 2018, pp. 638-647: Springer.
AB Kathole, KN Vhatkar, S Kumbhare, J Katti, VV Kimbahune, “IoT-Based Smart Agriculture for Onion Plant Disease Management: A Comprehensive Approach”, International Journal of Intelligent Systems and Applications in Engineering,2024.
S Kumbhare, SA Ubale, G Dharmale, N Mhala, N Gandhewar, “IoT-Enabled Agricultural Waste Management for Sustainable Energy Generation”, International Journal of Intelligent Systems and Applications in Engineering,2024.
SD Patil, AB Kathole, S Kumbhare, K Vhatkar, “A Blockchain-Based Approach to Ensuring the Security of Electronic Data”, International Journal of Intelligent Systems and Applications in Engineering,2024.
Ara and A. Ara, "Case study: Integrating IoT, streaming analytics and machine learning to improve intelligent diabetes management system," in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017, pp. 3179-3182.
S. Shahrestani, "Assistive IoT: Deployment Scenarios and Challenges," in Internet of Things and Smart Environments: Springer, 2017, pp. 75-95.
S. Pandit and G. Singh, “Spectrum Sensing in Cognitive Radio Networks: Potential Challenges and Future Perspective BT - Spectrum Sharing in Cognitive Radio Networks: Medium Access Control Protocol Based Approach,” S. Pandit and G. Singh, Eds. Cham: Springer International Publishing, 2017, pp. 35–75.
N. Muchandi and R. Khanai, “Cognitive Radio Spectrum Sensing: A Survey,” Int. Conf. Electr. Electron. Optim. Tech. - 2016 Cogn., pp. 3233–3237, 2016.
J. Qadir, “Artificial intelligence based cognitive routing for cognitive radio networks,” Artif. Intell. Rev., vol. 45, no. 1, pp. 25–96, 2016.
S. M. Baby and M. James, “A Comparative Study on Various Spectrum Sharing Techniques,” Procedia Technol., vol. 25, no. Raerest, pp. 613–620, 2016.
Atul Kathole , Dinesh Chaudhari “Secure Hybrid Approach for Sharing Data Securely in VANET”, Proceeding of International Conference on Computational Science and Applications pp 217–221, © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Atul Kathole , Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Atul Kathole , Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Atul B Kathole, Dr.Dinesh N.Chaudhari, "Pros & Cons of Machine learning and Security Methods, "2019.http://gujaratresearchsociety.in/index.php/ JGRS, ISSN: 0374-8588, Volume 21 Issue 4.
“Practical Guide to Principal Component Analysis (PCA) in R & Python”, accessed on 5/11/2016, https://www.analyticsvidhya.com/blog/2016/03/practical-guide-principal-component-analysis-python/
Physical Human Activity Recognition Using Wearable Sensors Ferhat Attal , Samer Mohammed , Mariam Dedabrishvili , Facial Chamroukhi , Latifa Oukhellou and Yacine Amirat Received: 11 September 2015; Accepted: 8 December 2015; Published: 11 December 2015 Academic Editor: Vittorio M.N. Passaro.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.