Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks

Abstract As a mean to improve safety and convenience on the road, Vehicular Ad Hoc Networks (VANETs) provide various advantages to passengers. However, considering that it is a wireless ad hoc type network, it is usual to see numerous security exploits present in the environment. There are prevention methods as well as responsive solutions for network intrusions; the former is known as Intrusion Detection System (IDS), which monitors and detects potential intrusions that are ongoing in the network. Active network attacks are generally designed to reduce or interrupt availability of the network. Effect of these attackers on the network can be measured by select parameters, which can in turn be used as the main lead for detecting malicious behaviors. In this paper, we propose a complete IDS in VANET using the combination of modified promiscuous mode for data collection and Support Vector Machine (SVM) for data analysis to establish a shared trust value for every vehicle on the network as Trust Aware SVM-Based IDS (TSIDS). This method ensures that the source vehicle or node as well as any intermediate network node is aware of the activity of their next hop and in case of malicious behavior or malfunction, they will respond accordingly to keep the network performance as high as possible.

[1]  Victor I. Chang,et al.  Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..

[2]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[3]  Gaurav Sharma,et al.  A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks , 2017 .

[4]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[5]  Syed Haque,et al.  Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems , 2010 .

[6]  Pingzhi Fan,et al.  b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Sandro Gaycken,et al.  Information Security of Highly Critical Wireless Networks , 2017, Springer Briefs in Computer Science.

[8]  Jianping Yuan,et al.  Robust LS-SVM-based adaptive constrained control for a class of uncertain nonlinear systems with time-varying predefined performance , 2018, Commun. Nonlinear Sci. Numer. Simul..

[9]  Vinh Hoa La,et al.  SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .

[10]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[11]  Fuad A. Ghaleb,et al.  Security and privacy enhancement in VANETs using mobility pattern , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[12]  Kun-Chan Lan,et al.  Rapid Generation of Realistic Mobility Models for VANET , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[13]  Ahmet Rizaner,et al.  A novel support vector machine based intrusion detection system for mobile ad hoc networks , 2018, Wirel. Networks.

[14]  G. Kumaresan,et al.  Group Key Authentication scheme for Vanet INtrusion detection (GKAVIN) , 2017, Wirel. Networks.

[15]  Syed Asad Hussain,et al.  A game theory based trust model for Vehicular Ad hoc Networks (VANETs) , 2017, Comput. Networks.

[16]  Yu Wang,et al.  Routing in vehicular ad hoc networks: A survey , 2007, IEEE Vehicular Technology Magazine.

[17]  Al-Sakib Khan Pathan,et al.  The State of the Art in Intrusion Prevention and Detection , 2014 .

[18]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[19]  Mohammed Erritali,et al.  A review and classification of various VANET Intrusion Detection Systems , 2013, 2013 National Security Days (JNS3).

[20]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..