Using discriminant analysis to detect intrusions in external communication for self-driving vehicles

Abstract Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS) and black hole attacks on vehicular ad hoc networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection.

[1]  Guizhen Yu,et al.  A vehicular ad hoc networks intrusion detection system based on BUSNet , 2010, 2010 2nd International Conference on Future Computer and Communication.

[2]  Khattab M. Ali Alheeti,et al.  An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars , 2015, 2015 Sixth International Conference on Emerging Security Technologies (EST).

[3]  Christian Bonnet,et al.  Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.

[4]  Klaus D. McDonald-Maier,et al.  On the detection of grey hole and rushing attacks in self-driving vehicular networks , 2015, 2015 7th Computer Science and Electronic Engineering Conference (CEEC).

[5]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[6]  Andrew J. Connolly,et al.  Statistics, Data Mining, and Machine Learning in Astronomy , 2014 .

[7]  Dong-You Choi,et al.  A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[8]  J. Friedman Regularized Discriminant Analysis , 1989 .

[9]  Amit Konar,et al.  Performance analysis of LDA, QDA and KNN algorithms in left-right limb movement classification from EEG data , 2010, 2010 International Conference on Systems in Medicine and Biology.

[10]  Nadir Shah,et al.  Modeling Vehicles Mobility for Connectivity Analysis in VANET , 2016 .

[11]  Vytautas Rudzionis,et al.  Evaluation of methods to combine different speech recognizers , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).

[12]  Priyanka Pandey,et al.  Mycosec - A database for signal peptide bearing genes of mycobacterium , 2011 .

[13]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[14]  Anil Kumar,et al.  Design an anomaly based fuzzy intrusion detection system for packet dropping attack in mobile ad hoc networks , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[15]  Jiankun Hu,et al.  A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.

[16]  Sherali Zeadally,et al.  Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges , 2015, J. Netw. Comput. Appl..

[17]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[18]  Mubashir Husain Rehmani,et al.  Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..

[19]  Chien-Ming Chou,et al.  Realistic mobility models for Vehicular Ad hoc Network (VANET) simulations , 2008, 2008 8th International Conference on ITS Telecommunications.

[20]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[21]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[22]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[23]  Guanrong Chen,et al.  Introduction to Fuzzy Sets, Fuzzy Logic, and Fuzzy Control Systems , 2000 .

[24]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[25]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[26]  Sami Muhaidat,et al.  Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[27]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[28]  D. P. Agrawal,et al.  Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[29]  Dong Ho Park,et al.  Hybrid kernel density estimation for discriminant analysis with information complexity and genetic algorithm , 2016, Knowl. Based Syst..

[30]  Sidi-Mohammed Senouci,et al.  An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.

[31]  Khattab M. Ali Alheeti,et al.  An intrusion detection system against malicious attacks on the communication network of driverless cars , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[32]  Rich Caruana,et al.  Data mining in metric space: an empirical analysis of supervised learning performance criteria , 2004, ROCAI.

[33]  Nilesh U. Sambhe,et al.  A review on cross layer intrusion detection system in wireless ad hoc network , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[34]  Michael Menth,et al.  Analysis of Cooperative Awareness Message rates in VANETs , 2013, 2013 13th International Conference on ITS Telecommunications (ITST).

[35]  Özgür B. Akan,et al.  Cognitive radio sensor networks , 2009, IEEE Network.

[36]  Aikaterini Mitrokotsa,et al.  Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks , 2006 .

[37]  Ghassan Samara,et al.  Security issues and challenges of Vehicular Ad Hoc Networks (VANET) , 2010, 4th International Conference on New Trends in Information Science and Service Science.

[38]  Christos Douligeris,et al.  Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks , 2006 .

[39]  Warnakulasuriya Anil Chandana Fernando,et al.  Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).

[40]  Boucif Amar Bensaber,et al.  Decision support protocol for intrusion detection in VANETs , 2013, DIVANet '13.

[41]  Saloua Chettibi,et al.  Trace file analyzer for ad hoc routing protocols simulation with NS2 , 2015, 2015 First International Conference on New Technologies of Information and Communication (NTIC).

[42]  Robert Bronte,et al.  A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm , 2016, SIN.

[43]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[44]  Chris McDonald,et al.  Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .

[45]  Mohamed Oussama Cherif Optimization of V2V and V2I communications in an operated vehicular network , 2010 .

[46]  Sidi-Mohammed Senouci,et al.  A new Intrusion Detection Framework for Vehicular Networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[47]  Shiyong Zhang,et al.  Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops).

[48]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[49]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[50]  Sidi-Mohammed Senouci,et al.  Efficient data dissemination in cooperative vehicular networks , 2013, Wirel. Commun. Mob. Comput..

[51]  Abderrahmane Lakas,et al.  Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[52]  Sidi-Mohammed Senouci,et al.  Detection and prevention from misbehaving intruders in vehicular networks , 2014, 2014 IEEE Global Communications Conference.

[53]  Udo W. Pooch,et al.  Cooperative security-enforcement routing in mobile ad hoc networks , 2002, 4th International Workshop on Mobile and Wireless Communications Network.