An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing

In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10  % in detection rate of malicious nodes when compared with the existing schemes.

[1]  Syed Masud Mahmud,et al.  Toward Strongley Connected Clustering Structure in Vehicular Ad Hoc Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[2]  Mohammad S. Obaidat,et al.  Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks , 2015, IEEE Systems Journal.

[3]  Pawel Gburzynski,et al.  A New Aggregate Local Mobility (ALM) Clustering Algorithm for VANETs , 2010, 2010 IEEE International Conference on Communications.

[4]  Naveen K. Chilamkurti,et al.  Bayesian Coalition Game as-a-Service for Content Distribution in Internet of Vehicles , 2014, IEEE Internet of Things Journal.

[5]  Joni da Silva Fraga,et al.  A Distributed IDS for Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[6]  Naveen K. Chilamkurti,et al.  Learning Automata-based Opportunistic Data Aggregation and Forwarding scheme for alert generation in Vehicular Ad Hoc Networks , 2014, Comput. Commun..

[7]  Arobinda Gupta,et al.  Distributed Misbehavior Detection in VANETs , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[8]  Yu Wang,et al.  Routing in vehicular ad hoc networks: A survey , 2007, IEEE Vehicular Technology Magazine.

[9]  Mohammad S. Obaidat,et al.  Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis , 2015, IEEE Internet of Things Journal.

[10]  Joel J. P. C. Rodrigues,et al.  Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach , 2015, IEEE Transactions on Intelligent Transportation Systems.

[11]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[12]  Seema Bawa,et al.  QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks , 2015, Mob. Networks Appl..

[13]  Ilias Maglogiannis,et al.  Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[14]  Jong Hyuk Park,et al.  ALCA: agent learning–based clustering algorithm in vehicular ad hoc networks , 2012, Personal and Ubiquitous Computing.

[15]  Joel J. P. C. Rodrigues,et al.  An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..

[16]  Kamalrulnizam Abu Bakar,et al.  Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.

[17]  Elmar Schoch,et al.  Communication patterns in VANETs , 2008, IEEE Communications Magazine.

[18]  Sudip Misra,et al.  Security in Vehicular Ad Hoc Networks , 2016 .

[19]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[20]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[21]  MengChu Zhou,et al.  A Position-Based Clustering Technique for Ad Hoc Intervehicle Communication , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[22]  Y. Koucheryavy,et al.  State of the Art and Research Challenges for VANETs , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[23]  Jongsung Kim,et al.  ELACCA: Efficient Learning Automata Based Cell Clustering Algorithm for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[24]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[25]  Daniel Krajzewicz,et al.  Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .

[26]  Tankut Acarman,et al.  Clustering Formation for Inter-Vehicle Communication , 2007, 2007 IEEE Intelligent Transportation Systems Conference.

[27]  A. Belghith,et al.  A trust-based architecture for managing certificates in vehicular ad hoc networks , 2012, 2012 International Conference on Communications and Information Technology (ICCIT).

[28]  Joel J. P. C. Rodrigues,et al.  Replication-Aware Data Dissemination for Vehicular Ad Hoc Networks using Location Determination , 2015, Mob. Networks Appl..

[29]  Chen Avin,et al.  Fast randomized algorithm for hierarchical clustering in Vehicular Ad-Hoc Networks , 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop.

[30]  Der-Jiunn Deng,et al.  LA-EEHSC: Learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks , 2014, J. Netw. Comput. Appl..

[31]  Iftikhar Ahmad,et al.  Classes of attacks in VANET , 2011, 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC).

[32]  S. Almalag Mohammad,et al.  Using traffic flow for cluster formation in vehicular ad-hoc networks , 2010, LCN 2010.

[33]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[34]  Chai Kiat Yeo,et al.  Distributed Court System for intrusion detection in mobile ad hoc networks , 2011, Comput. Secur..

[35]  Joel J. P. C. Rodrigues,et al.  Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud , 2015, Future Gener. Comput. Syst..

[36]  Roberto Bifulco,et al.  Integrating a network IDS into an open source Cloud Computing environment , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[37]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[38]  Joni da Silva Fraga,et al.  Algorithms for a distributed IDS in MANETs , 2014, J. Comput. Syst. Sci..

[39]  Frank Kargl,et al.  Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols , 2013, IEEE Transactions on Vehicular Technology.

[40]  Liviu Iftode,et al.  A Comparative Study of Data Dissemination Models for VANETs , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.

[41]  Neeraj Kumar,et al.  Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints , 2015, IEEE Systems Journal.

[42]  Panagiotis Papadimitratos,et al.  Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation , 2009, IEEE Communications Magazine.

[43]  Li Li,et al.  IEEE Wireless Communications and Networking Conference , 2012 .

[44]  Naveen K. Chilamkurti,et al.  Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment , 2016, IEEE Transactions on Dependable and Secure Computing.

[45]  Naveen K. Chilamkurti,et al.  Bayesian coalition game for the internet of things: an ambient intelligence-based evaluation , 2015, IEEE Communications Magazine.

[46]  Steven Furnell,et al.  Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.

[47]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[48]  Sudip Misra,et al.  LACAV: an energy-efficient channel assignment mechanism for vehicular ad hoc networks , 2011, The Journal of Supercomputing.

[49]  Joel J. P. C. Rodrigues,et al.  Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions , 2014, Veh. Commun..

[50]  Kpatcha M. Bayarou,et al.  Intrusion detection in VANETs through verification of vehicle movement data , 2010, 2010 IEEE Vehicular Networking Conference.

[51]  Stephan Olariu,et al.  Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..

[52]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[53]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[54]  Vamsi Popuri Intrusion detection for grid and cloud computing , 2011 .

[55]  William H. Robinson,et al.  A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.

[56]  Mohammad S. Obaidat,et al.  Networks of learning automata for the vehicular environment: a performance analysis study , 2014, IEEE Wireless Communications.

[57]  Chun-Cheng Lin,et al.  Reliable multicast as a Bayesian coalition game for a non-stationary environment in vehicular ad hoc networks: a learning automata-based approach , 2015, Int. J. Ad Hoc Ubiquitous Comput..

[58]  Subhas C. Misra,et al.  An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..

[59]  Sherali Zeadally,et al.  QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Industrial Electronics.

[60]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[61]  Guillermo Acosta-Marum,et al.  Wave: A tutorial , 2009, IEEE Communications Magazine.

[62]  Seema Bawa,et al.  An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks , 2015, Mob. Networks Appl..

[63]  Jongsung Kim,et al.  Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks , 2013, Math. Comput. Model..

[64]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[65]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..