Self-healing AIS with Entropy Based SVM and Bayesian Aggregate Model for the Prediction and Isolation of Malicious Nodes Triggering DoS Attacks in VANET

Full Text (PDF, 771KB), PP.90-105

Views: 0 Downloads: 0

Author(s)

Rama Mercy. S. 1,* G. Padmavathi 1

1. Avinashilingam Institute for Home Science and Higher Education for Women, Bharathi Park Rd, near Forest College Campus, Saibaba Colony, Coimbatore, Tamil Nadu 641043, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2023.03.07

Received: 23 Dec. 2022 / Revised: 27 Feb. 2023 / Accepted: 3 Apr. 2023 / Published: 8 Jun. 2023

Index Terms

DoS Attacks, RSU, Cluster Network, Kernel Density Estimation, Pearson Aggregate Model, On-board Unit

Abstract

Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traffic monitoring and vehicular safety. Security risks are the main problems in VANET. To handle the security threats and to increase the performance of VANETs, this paper proposes an enhanced trust based aggregate model. In the proposed system, a novel adaptive nodal attack detection approach - entropy-based SVM with linear regression addresses the trust factor with kernel density estimation generating the trustiness value thereby classifying the malicious nodes against the trusted nodes in VANETs. Defending the VANETs is through a novel reliance node estimation approach - Bayesian self-healing AIS with Pearson correlation coefficient aggregate model isolating the malicious node thereby the RSU cluster communication getting secure. Furthermore, even a reliable node may be exploited to deliver harmful messages and requires the authority of both the data and the source node to be carried out by the onboard units of the vehicles getting the reports of incident. DoS attacks (Denial of Service) disrupting the usual functioning of the network leads to inaccessible network to its intended users thereby endangering human lives. The proposed system is explicitly defending the VANET against DoS attacks as it predicts the attack without compromising the performance of the VANET handling nodes with various features and functions based on evaluating the maliciousness of attacking nodes accurately and isolating the intrusion. Furthermore, the performance evaluations prove the effectiveness of the proposed work with increased detection rate by 97%, reduced energy consumption by 39% and reduced latency by 25% compared to the existing studies.

Cite This Paper

Rama Mercy. S., G. Padmavathi, "Self-healing AIS with Entropy Based SVM and Bayesian Aggregate Model for the Prediction and Isolation of Malicious Nodes Triggering DoS Attacks in VANET", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.3, pp.90-105, 2023. DOI:10.5815/ijcnis.2023.03.07

Reference

[1]Hamdi, Mustafa Maad, et al., "A review of applications, characteristics, and challenges in vehicular ad hoc networks (VANETs)," 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, 2020.
[2]Hassija, Vikas, et al., "Dagiov: A framework for vehicle-to-vehicle communication using directed acyclic graph and game theory," IEEE Transactions on Vehicular Technology, vol. 69, no. 4, pp. 4182-4191, 2020.
[3]Hossain, Mohammad Asif, et al., "Comprehensive survey of machine learning approaches in cognitive radio-based vehicular ad hoc networks," IEEE Access, vol. 8, pp. 78054-78108, 2020.
[4]Wang, Yu, et al., "Efficient Privacy-Preserving Authentication Scheme with Fine-Grained Error Location for Cloud-Based VANET," IEEE Transactions on Vehicular Technology, vol. 70, no. 10, pp. 10436-10449, 2021.
[5]Khatri, Sahil, et al., "Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges," Peer-to-Peer Networking and Applications, vol. 14, no. 3, pp. 1778-1805, 2021.
[6]Jan, Sagheer Ahmed, et al., "A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues," IEEE Access, vol. 9, pp. 153701-153726, 2021.
[7]Malhi, Avleen Kaur, ShaliniBatra, and Husanbir Singh Pannu, "Security of vehicular ad-hoc networks: A comprehensive survey," Computers & Security, vol. 89, pp. 101664, 2020.
[8]Adhikary, Kaushik, et al., "Hybrid algorithm to detect DDoS attacks in VANETs," Wireless Personal Communications, vol. 114, no. 4, pp. 3613-3634, 2020.
[9]Xiao, Shunyuan, et al., "Secure Distributed Adaptive Platooning Control of Automated Vehicles Over Vehicular Ad-Hoc Networks Under Denial-of-Service Attacks," IEEE Transactions on Cybernetics, 2021.
[10]Kolandaisamy, Raenu, et al., "A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 6, pp. 6599-6612, 2021.
[11]Fatemidokht, Hamideh, et al., "Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems," IEEE Transactions on Intelligent Transportation Systems, 2021.
[12]Mahmudova, Shafagat, "Developing an algorithm for the application of Bayesian method to software using artificial immune systems," Soft Computing, pp. 1-7, 2021.
[13]Lang, Wangjie, et al., "Artificial Intelligence-based Technique for Fault Detection and Diagnosis of EV Motors: A Review," IEEE Transactions on Transportation Electrification, 2021.
[14]Dagdia, ZainebChelly, Pavel Avdeyev, and MdShamsuzzohaBayzid, "Biological computation and computational biology: survey, challenges, and discussion," Artificial Intelligence Review, pp. 1-67, 2021.
[15]Kanwal, Summrina, Amir Hussain, and Kaizhu Huang, "Novel Artificial Immune Networks-based optimization of shallow machine learning (ML) classifiers." Expert Systems with Applications, vol. 165, pp. 113834, 2021.
[16]Zhang, Jun, et al., "Deep learning based attack detection for cyber-physical system cybersecurity: A survey, IEEE/CAA Journal of AutomaticaSinica, vol. 9, no. 3, pp. 377-391, 2021.
[17]Fatemidokht, Hamideh, et al., "Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems," IEEE Transactions on Intelligent Transportation Systems, 2021.
[18]Brown, James, and Mohd Anwar, "Blacksite: human-in-the-loop artificial immune system for intrusion detection in internet of things," Human-Intelligent Systems Integration, vol. 3, no. 1, pp. 55-67, 2021.
[19]N. Nishanth, and A. Mujeeb, "Modeling and detection of flooding-based denial-of-service attack in wireless ad hoc network using Bayesian inference," IEEE Systems Journal, vol. 15, no. 1, pp. 17-26, 2020.
[20]Alharthi, Abdullah, Qiang Ni, and Richard Jiang, "A Privacy-Preservation Framework based on Biometrics Blockchain (BBC) to Prevent Attacks in VANET," IEEE Access, 2021.
[21]M. Poongodi, et al., "Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics," IEEE Access, vol. 7, pp. 158481-158491, 2019.
[22]Yang, Anjia, et al., "DeQoS attack: Degrading quality of service in VANETs and its mitigation," IEEE Transactions on Vehicular Technology, vol. 68, no. 5, pp. 4834-4845, 2019.
[23]Zamani, Nurfatihah, et al., "A study on customer satisfaction towards ambiance, service and food quality in Kentucky Fried Chicken (KFC), Petaling Jaya," Malaysian Journal of Social Sciences and Humanities (MJSSH), vol. 5, no. 4, pp. 84-96, 2020.
[24]M. Poongodi, et al., "Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics," IEEE Access, vol. 7, pp. 158481-158491, 2019.
[25]L. Huang, “Design of an IoT DDoS attack prediction system based on data mining technology,” J Supercomput., vol. 78, pp. 4601–4623, 2022. https://doi.org/10.1007/s11227-021-04055-1