A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology

Abstract Although Vehicle Ad Hoc Network (VANETs) as a new technology is being used in wide range of applications to improve the driving experience as well as safety, it is vulnerable to various type of network attacks. Literature studies have revealed several reliable approaches based on intrusion detection system (IDS), to protect VANETs against attacks. However, by those solutions, the overheads of IDSs are serious which cause too long detection time, especially when the number of vehicles increases. In this paper, we propose a novel filter model based hidden Markov model (HMM) (FM-HMM) for IDS to reduce the overhead and time for detection without impairing detection rate. To the best of our knowledge, this is the first work in the literature to model the state pattern of each vehicle in VANETs as a HMM to quickly filter the messages from the vehicles instead of detecting these messages. The FM-HMM consists of three modules, i.e., schedule, filter and update. In the schedule module, Baum–Welch algorithm is used to produce a HMM and its parameters for each neighbor vehicle. In the filter module, multiple HMMs are used with their parameters to forecast the future states of neighbor vehicles with which the messages from them are filtered. In the update module, a timeliness method is used to update HMMs and their parameters. Experiments show that the IDS with FM-HMM has a better performance in terms of detection rate, detection time and overhead.

[1]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[2]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[3]  Jeff A. Bilmes,et al.  A gentle tutorial of the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models , 1998 .

[4]  Sandeep Kumar,et al.  Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[5]  Véronique Berge-Cherfaoui,et al.  Detecting Road Events Using Distributed Data Fusion: Experimental Evaluation for the Icy Roads Case , 2016, IEEE Transactions on Intelligent Transportation Systems.

[6]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[7]  Andreas Rauber,et al.  The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data , 2002, IEEE Trans. Neural Networks.

[8]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[9]  Jalel Ben-Othman,et al.  DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.

[10]  Sushanta Karmakar,et al.  A game theory based multi layered intrusion detection framework for VANET , 2018, Future Gener. Comput. Syst..

[11]  Jamal Bentahar,et al.  CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks , 2016, Expert Syst. Appl..

[12]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[13]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[14]  Sami Muhaidat,et al.  Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[15]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[16]  Yuguang Fang,et al.  A defense technique against misbehavior in VANETs based on threshold authentication , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[17]  Nirwan Ansari,et al.  Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.

[18]  Ajay Kaul,et al.  Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET , 2018, Veh. Commun..

[19]  Samuel Pierre,et al.  Centralized and Localized Data Congestion Control Strategy for Vehicular Ad Hoc Networks Using a Machine Learning Clustering Algorithm , 2016, IEEE Transactions on Intelligent Transportation Systems.

[20]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[21]  Qin Li,et al.  A Reputation-Based Announcement Scheme for VANETs , 2012, IEEE Transactions on Vehicular Technology.

[22]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[23]  Sidi-Mohammed Senouci,et al.  An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.

[24]  Ahmad Khademzadeh,et al.  VWCA: An efficient clustering algorithm in vehicular ad hoc networks , 2011, J. Netw. Comput. Appl..

[25]  Jie Liu,et al.  Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[26]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[27]  Klaus D. McDonald-Maier,et al.  On the detection of grey hole and rushing attacks in self-driving vehicular networks , 2015, 2015 7th Computer Science and Electronic Engineering Conference (CEEC).

[28]  Dijiang Huang,et al.  PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.

[29]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[30]  Zhong Ming,et al.  An improved NSGA-III algorithm for feature selection used in intrusion detection , 2017, Knowl. Based Syst..

[31]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.