浏览全部资源
扫码关注微信
1. 江苏大学 计算机科学与通信工程学院,江苏 镇江 212013
2. 国网三门峡供电公司,河南 三门峡 472000
[ "刘怡良(1990-),男,江苏徐州人,江苏大学硕士生,主要研究方向为车联网、网络安全。" ]
[ "石亚丽(1992-),女,安徽芜湖人,江苏大学硕士生,主要研究方向为车联网安全。" ]
[ "冯蒿(1979-),男,河南新密人,国网三门峡供电公司工程师,主要研究方向为电力系统自动化、继电保护。" ]
[ "王良民(1977-),男,安徽潜山人,江苏大学教授、博士生导师,主要研究方向为物联网信息处理技术、物联网安全协议、车联网安全结构。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
刘怡良, 石亚丽, 冯蒿, 等. 车联网中基于神经网络的入侵检测方案[J]. 通信学报, 2014,35(Z2):233-239.
Yi-liang LIU, Ya-li SHI, Hao FENG, et al. Intrusion detection scheme based on neural network in vehicle network[J]. Journal on communications, 2014, 35(Z2): 233-239.
刘怡良, 石亚丽, 冯蒿, 等. 车联网中基于神经网络的入侵检测方案[J]. 通信学报, 2014,35(Z2):233-239. DOI: 10.3969/j.issn.1000-436x.2014.z2.032.
Yi-liang LIU, Ya-li SHI, Hao FENG, et al. Intrusion detection scheme based on neural network in vehicle network[J]. Journal on communications, 2014, 35(Z2): 233-239. DOI: 10.3969/j.issn.1000-436x.2014.z2.032.
车联网的入侵检测(IDS)可用于确认交通事件通知中描述的事件的真实性。当前车联网IDS多采用基于冗余数据的一致性检测方案,为降低IDS对冗余数据的依赖性,提出了一个基于神经网络的入侵检测方案。该方案可描述大量交通事件类型,并综合使用了反向传播(BP)和支持向量机(SVM)2种学习算法。这2种算法分别适用于个人安全驾驶速度快与高效交通系统检测率高的应用。仿真实验和性能分析表明,本方案具有较快的入侵检测速度
且具有较高的检测率和较低的虚警率。
Vehicle networking intrusion detection solutions (IDS) can be used to confirm the authenticity of the events described in the notice of traffic incidents.The current Vehicle networking IDS frequently use detection scheme based on the consistency of redundant data
to reduce dependence on redundant data
an intrusion detection scheme based on neural network is presented.The program can be described as a lot of traffic event types
and the integrated use of the back-propagation (BP) and support vector machine (SVM) two learning algorithms.The two algorithms respectively applicable to personal safety driving fast and efficient transportation system with high detection applications.Simulation results and performance analysis show that our scheme has a faster speed intrusion detection
and has a high detection rate and low false alarm rate.
ISAAC J T , ZEADALLY S , CAMARA J S . Security attacks and solutions for vehicular ad hoc networks [J ] . IET Communications , 2010 , 4 ( 7 ): 894 - 903 .
RAYA M , HUBAUX J P . Securing vehicular ad hoc networks [J ] . Journal of Computer Security , 2007 , 15 ( 1 ): 39 - 68 .
STUDER A , BAI F , BELLUR B , et al . Flexible,extensible,and efficient VANET authentication [J ] . Journal of Communications and Networks , 2009 , 11 ( 6 ): 574 - 588 .
WASEF A , SHEN X M . EMAP:Expedite message authentication protocol for vehicular ad hoc networks [J ] . IEEE Transactions on Mobile Computing , 2013 , 12 ( 1 ): 78 - 89 .
GOLLE P , GREENE D H , STADDON J . Detecting and correcting malicious data in VANETs [A ] . Proceedings of the First International Workshop on Vehicular Ad Hoc Networks [C ] . Philadelphia,PA , 2004 . 29 - 37 .
PETIT J , FEIRI M , KARGL F . Spoofed data detection in VANETs using dynamic thresholds [A ] . 2011 IEEE Vehicular Networking Conference (VNC) [C ] . Amsterdam , 2011 . 25 - 32 .
PETIT J , MAMMERI Z . Dynamic consensus for secured vehicular ad hoc networks [A ] . 2011 IEEE 7th International Conference on Wireless and Mobile Computing,Networking and Communications [C ] . Wuhan , 2011 . 1 - 8 .
DIETZEL S , PETIT J , HEIJENK G , et al . Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols [J ] . IEEE Transactions on Vehicular Technology , 2013 , 62 ( 4 ): 1505 - 1518 .
KIM T H J , STUDER A , DUBEY R , et al . VANET alert endorsement using multi-source filters [A ] . Proceeding of the Seventh International Workshop on Vehicular Ad Hoc Networks [C ] . Chicago,IL , 2010 . 51 - 60 .
RAYA M , PAPADIMITRATOS P , AAD I , et al . Eviction of misbehaving and faulty nodes in vehicular networks [J ] . IEEE Journal on Selected Areas in Communications , 2007 , 25 ( 8 ): 1557 - 1568 .
HSIAO H C , STUDER A , DUBEY R , et al . Efficient and secure threshold-based event validation for VANETs [A ] . Proceedings of the Fourth ACM Conference on Wireless Network Security [C ] . New York,NY,USA , 2011 . 163 - 174 .
LI X J , WANG L M . A rapid certification protocol from bilinear pairing for vehicular ad hoc networks [A ] . Trust,Security and Privacy in Computing and Communcations [C ] . 2012 . 890 - 895 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构