A game theory based multi layered intrusion detection framework for VANET

Abstract Vehicular Ad-hoc Networks (VANETs) are vulnerable to various type of network attacks like Blackhole attack, Denial of Service (DoS), Sybil attack etc. Intrusion Detection Systems (IDSs) have been proposed in the literature to address these security threats. However, high vehicular mobility makes the process of formulating an IDS framework for VANET a difficult task. Moreover, VANETs operate in bandwidth constrained wireless radio spectrum. Therefore, IDS frameworks that introduce significant volume of IDS traffic are not suitable for VANETs. In addition, dynamic network topology, communication overhead and scalability to higher vehicular density are some other issues that needs to be addressed while developing an IDS framework for VANETs. This paper aims to address these issues by proposing a multi-layered game theory based intrusion detection framework and a novel clustering algorithm for VANET. The communication overhead of the IDS is reduced by using a set of specification rules and a lightweight neural network based classifier module for detecting malicious vehicles. The volume of IDS traffic is minimized by modeling the interaction between the IDS and the malicious vehicle as a two player non-cooperative game and adopting a probabilistic IDS monitoring strategy based on the Nash Equilibrium of the game. Finally, the proposed clustering algorithm maintains the stability of the IDS framework, which ensures that the framework scales up well to networks with higher vehicular densities. Simulation results show that the proposed framework achieves high accuracy and detection rate across wide range of attacks, while at the same time minimizes the overall volume of intrusion detection related traffic introduced into the vehicular network.

[1]  Soumaya Cherkaoui,et al.  An AAA Study for Service Provisioning in Vehicular Networks , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).

[2]  Prabir Bhattacharya,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .

[3]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[5]  Patrick Weber,et al.  OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.

[6]  Muhammad Imran,et al.  A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks , 2017, Future Gener. Comput. Syst..

[7]  Ahmad Khademzadeh,et al.  VWCA: An efficient clustering algorithm in vehicular ad hoc networks , 2011, J. Netw. Comput. Appl..

[8]  Thar Baker,et al.  Measurement and Classification of Smart Systems Data Traffic Over 5G Mobile Networks , 2018 .

[9]  Yvon Gourhant,et al.  AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture , 2005, VANET '05.

[10]  Thar Baker,et al.  Comparison Data Traffic Scheduling Techniques for Classifying QoS over 5G Mobile Networks , 2017, 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[11]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[12]  Lorena González-Manzano,et al.  Security Models in Vehicular Ad-hoc Networks: A Survey , 2014 .

[13]  Xiaodong Lin,et al.  Security in service-oriented vehicular networks , 2009, IEEE Wirel. Commun..

[14]  Daniel Krajzewicz,et al.  Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .

[15]  Hannes Federrath,et al.  REST-Net: A dynamic rule-based IDS for VANETs , 2014, 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC).

[16]  Md. Rafiqul Islam,et al.  Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..

[17]  Guillermo Acosta-Marum,et al.  Wave: A tutorial , 2009, IEEE Communications Magazine.

[18]  Anis Laouiti,et al.  Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.

[19]  Farrukh Aslam Khan,et al.  Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[20]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[21]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[22]  Xiaohong Li,et al.  MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks , 2017, Future Gener. Comput. Syst..

[23]  M. G. Sumithra,et al.  An enhanced intrusion detection system for routing attacks in MANET , 2013, 2013 International Conference on Advanced Computing and Communication Systems.

[24]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[25]  Turgay Korkmaz,et al.  HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[26]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[27]  Thar Baker,et al.  Data Traffic Model in Machine to Machine Communications over 5G Network Slicing , 2016, 2016 9th International Conference on Developments in eSystems Engineering (DeSE).

[28]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[29]  Amir Qayyum,et al.  A Survey on Security in Vehicular Ad Hoc Networks , 2013, Nets4Cars/Nets4Trains.

[30]  Dan Feng,et al.  Unifying intrusion detection and forensic analysis via provenance awareness , 2016, Future Gener. Comput. Syst..

[31]  Sushanta Karmakar,et al.  Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .

[32]  Gang Qu,et al.  Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[33]  Frank Kargl,et al.  Redundancy-based statistical analysis for insider attack detection in VANET aggregation schemes , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[34]  Charlie Yong-Sang Shim,et al.  A taxonomy for DOS attacks in VANET , 2014, 2014 14th International Symposium on Communications and Information Technologies (ISCIT).

[35]  Frank Kargl,et al.  Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols , 2013, IEEE Transactions on Vehicular Technology.

[36]  Ali Movaghar,et al.  A novel approach for avoiding wormhole attacks in VANET , 2009, 2009 First Asian Himalayas International Conference on Internet.

[37]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[38]  Lars C. Wolf,et al.  Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).