Intrusion detection scheme based on neural network in vehicle network
Correspondences|更新时间:2024-06-05
|
Intrusion detection scheme based on neural network in vehicle network
Journal on CommunicationsVol. 35, Issue Z2, Pages: 233-239(2014)
作者机构:
1. 江苏大学 计算机科学与通信工程学院,江苏 镇江 212013
2. 国网三门峡供电公司,河南 三门峡 472000
作者简介:
基金信息:
The National Natural Science Fundation of China(61272074);The Natural Science Foundation of Jiangsu Province(BK2011464);Blue Project of Jiangsu Province Outstanding Young Academic Leaders;Zhenjiang City Industrial Support Project(GY2013030)
Yi-liang LIU, Ya-li SHI, Hao FENG, et al. Intrusion detection scheme based on neural network in vehicle network[J]. Journal on Communications, 2014, 35(Z2): 233-239.
DOI:
Yi-liang LIU, Ya-li SHI, Hao FENG, et al. Intrusion detection scheme based on neural network in vehicle network[J]. Journal on Communications, 2014, 35(Z2): 233-239. DOI: 10.3969/j.issn.1000-436x.2014.z2.032.
Intrusion detection scheme based on neural network in vehicle network
Vehicle networking intrusion detection solutions (IDS) can be used to confirm the authenticity of the events described in the notice of traffic incidents.The current Vehicle networking IDS frequently use detection scheme based on the consistency of redundant data
to reduce dependence on redundant data
an intrusion detection scheme based on neural network is presented.The program can be described as a lot of traffic event types
and the integrated use of the back-propagation (BP) and support vector machine (SVM) two learning algorithms.The two algorithms respectively applicable to personal safety driving fast and efficient transportation system with high detection applications.Simulation results and performance analysis show that our scheme has a faster speed intrusion detection
and has a high detection rate and low false alarm rate.
关键词
Keywords
references
ISAAC J T , ZEADALLY S , CAMARA J S . Security attacks and solutions for vehicular ad hoc networks [J ] . IET Communications , 2010 , 4 ( 7 ): 894 - 903 .
RAYA M , HUBAUX J P . Securing vehicular ad hoc networks [J ] . Journal of Computer Security , 2007 , 15 ( 1 ): 39 - 68 .
STUDER A , BAI F , BELLUR B , et al . Flexible,extensible,and efficient VANET authentication [J ] . Journal of Communications and Networks , 2009 , 11 ( 6 ): 574 - 588 .
WASEF A , SHEN X M . EMAP:Expedite message authentication protocol for vehicular ad hoc networks [J ] . IEEE Transactions on Mobile Computing , 2013 , 12 ( 1 ): 78 - 89 .
GOLLE P , GREENE D H , STADDON J . Detecting and correcting malicious data in VANETs [A ] . Proceedings of the First International Workshop on Vehicular Ad Hoc Networks [C ] . Philadelphia,PA , 2004 . 29 - 37 .
PETIT J , FEIRI M , KARGL F . Spoofed data detection in VANETs using dynamic thresholds [A ] . 2011 IEEE Vehicular Networking Conference (VNC) [C ] . Amsterdam , 2011 . 25 - 32 .
PETIT J , MAMMERI Z . Dynamic consensus for secured vehicular ad hoc networks [A ] . 2011 IEEE 7th International Conference on Wireless and Mobile Computing,Networking and Communications [C ] . Wuhan , 2011 . 1 - 8 .
DIETZEL S , PETIT J , HEIJENK G , et al . Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols [J ] . IEEE Transactions on Vehicular Technology , 2013 , 62 ( 4 ): 1505 - 1518 .
KIM T H J , STUDER A , DUBEY R , et al . VANET alert endorsement using multi-source filters [A ] . Proceeding of the Seventh International Workshop on Vehicular Ad Hoc Networks [C ] . Chicago,IL , 2010 . 51 - 60 .
RAYA M , PAPADIMITRATOS P , AAD I , et al . Eviction of misbehaving and faulty nodes in vehicular networks [J ] . IEEE Journal on Selected Areas in Communications , 2007 , 25 ( 8 ): 1557 - 1568 .
HSIAO H C , STUDER A , DUBEY R , et al . Efficient and secure threshold-based event validation for VANETs [A ] . Proceedings of the Fourth ACM Conference on Wireless Network Security [C ] . New York,NY,USA , 2011 . 163 - 174 .
LI X J , WANG L M . A rapid certification protocol from bilinear pairing for vehicular ad hoc networks [A ] . Trust,Security and Privacy in Computing and Communcations [C ] . 2012 . 890 - 895 .