A hierarchical detection method in external communication for self-driving vehicles based on TDMA

Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.

[1]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[2]  Vijay Laxmi,et al.  A novel defense mechanism against sybil attacks in VANET , 2010, SIN.

[3]  Sanjay Silakari,et al.  Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks☆ , 2015 .

[4]  Xin Gao,et al.  2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks , 2014, Comput. Commun..

[5]  J.Ramkumar,et al.  Fuzzy Logic Approach for Detecting Black HoleAttack in Hybrid Wireless Mesh Network , 2014 .

[6]  Mário Serafim Nunes,et al.  Distributed Latency-Energy Minimization and interference avoidance in TDMA Wireless Sensor Networks , 2009, Comput. Networks.

[7]  Khattab M. Ali Alheeti,et al.  An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars , 2015, 2015 Sixth International Conference on Emerging Security Technologies (EST).

[8]  Warnakulasuriya Anil Chandana Fernando,et al.  Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).

[9]  Boucif Amar Bensaber,et al.  Decision support protocol for intrusion detection in VANETs , 2013, DIVANet '13.

[10]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[11]  Prasant Mohapatra,et al.  Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware , 2009, IEEE INFOCOM 2009.

[12]  Wathiq Laftah Al-Yaseen,et al.  Real-time multi-agent system for an adaptive intrusion detection system , 2017, Pattern Recognit. Lett..

[13]  Xiaohong Li,et al.  MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks , 2017, Future Gener. Comput. Syst..

[14]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[15]  Michael Menth,et al.  Analysis of Cooperative Awareness Message rates in VANETs , 2013, 2013 13th International Conference on ITS Telecommunications (ITST).

[16]  N. Radhika,et al.  Intruder Detection and Prevention in a Smart Grid Communication System , 2015 .

[17]  Venus W. Samawi,et al.  The affect of fuzzification on neural networks intrusion detection system , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.

[18]  A. Karygiannis,et al.  Host-based network monitoring tools for MANETs , 2006, PE-WASUN '06.

[19]  Lin Zhang,et al.  A Scalable CSMA and Self-Organizing TDMA MAC for IEEE 802.11 p/1609.x in VANETs , 2014, Wirel. Pers. Commun..

[20]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[21]  Pravin Varaiya,et al.  TDMA scheduling algorithms for wireless sensor networks , 2010, Wirel. Networks.

[22]  J. Ramkumar,et al.  Fuzzy Logic Approach for Detecting Black Hole Attack in Hybrid Wireless Mesh Network , 2015 .