An Attacks Detection Mechanism for Intelligent Transport System
Autor(a) principal: | |
---|---|
Data de Publicação: | 2020 |
Outros Autores: | , |
Tipo de documento: | Artigo de conferência |
Idioma: | eng |
Título da fonte: | Repositório Institucional da UNESP |
Texto Completo: | http://dx.doi.org/10.1109/BigData50022.2020.9378309 http://hdl.handle.net/11449/206167 |
Resumo: | The increase in computational technologies for means of transport, especially vehicles, has provided great benefits through Intelligent Transport Systems (ITS). Drivers, passengers, and pedestrians rely on computer applications that aim to protect human life, including agility in handling emergencies, improvements in traffic, and even leisure and entertainment resources. Communication and data exchange are from vehicles to vehicles (V2V) and from vehicles to road infrastructures (V2I) being carried out through the architecture of the vehicular ad hoc network (VANET). However, this type of network differs from traditional ones, as it operates in a highly dynamic environment, originated by the rapid mobility between its nodes and with short connection intervals. Wireless vehicle communication adopts the IEEE 802.11p standard, allowing vehicles to operate outside a basic set of services. Given these characteristics, numerous threats, vulnerabilities, and denial of service attacks can occur. Prioritizing the safety of life and protecting VANET against this type of attack, a security mechanism is proposed. The mechanism works to detect anomalies through a simple and robust statistical model in the search for extreme values (outliers). Median Absolute Deviation detects large amounts of MAC frames and ARP requests, characteristics of DoS / DDoS from malicious vehicles. Through extensive stages of simulations using the NS-3 and SUMO simulators, the mechanism showed excellent efficiency in detection rates and minimum rates of false positives and false negatives. |
id |
UNSP_308e9f12538b8b6b89c38f952a842b76 |
---|---|
oai_identifier_str |
oai:repositorio.unesp.br:11449/206167 |
network_acronym_str |
UNSP |
network_name_str |
Repositório Institucional da UNESP |
repository_id_str |
2946 |
spelling |
An Attacks Detection Mechanism for Intelligent Transport Systemdenial of serviceinformation securityIntelligent Transport Systemsintrusion detection systemVANETThe increase in computational technologies for means of transport, especially vehicles, has provided great benefits through Intelligent Transport Systems (ITS). Drivers, passengers, and pedestrians rely on computer applications that aim to protect human life, including agility in handling emergencies, improvements in traffic, and even leisure and entertainment resources. Communication and data exchange are from vehicles to vehicles (V2V) and from vehicles to road infrastructures (V2I) being carried out through the architecture of the vehicular ad hoc network (VANET). However, this type of network differs from traditional ones, as it operates in a highly dynamic environment, originated by the rapid mobility between its nodes and with short connection intervals. Wireless vehicle communication adopts the IEEE 802.11p standard, allowing vehicles to operate outside a basic set of services. Given these characteristics, numerous threats, vulnerabilities, and denial of service attacks can occur. Prioritizing the safety of life and protecting VANET against this type of attack, a security mechanism is proposed. The mechanism works to detect anomalies through a simple and robust statistical model in the search for extreme values (outliers). Median Absolute Deviation detects large amounts of MAC frames and ARP requests, characteristics of DoS / DDoS from malicious vehicles. Through extensive stages of simulations using the NS-3 and SUMO simulators, the mechanism showed excellent efficiency in detection rates and minimum rates of false positives and false negatives.Paulista State University - UnespUniversity of Sao Paulo - Usp Institute of Mathematical and Computer Sciences - IcmcClemson University School of ComputingPaulista State University - UnespUniversidade Estadual Paulista (Unesp)Universidade de São Paulo (USP)School of ComputingPastori Valentini, Edivaldo [UNESP]Ipolito Meneguette, RodolfoAlsuhaim, Adil2021-06-25T10:27:43Z2021-06-25T10:27:43Z2020-12-10info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObject2453-2461http://dx.doi.org/10.1109/BigData50022.2020.9378309Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020, p. 2453-2461.http://hdl.handle.net/11449/20616710.1109/BigData50022.2020.93783092-s2.0-85103861927Scopusreponame:Repositório Institucional da UNESPinstname:Universidade Estadual Paulista (UNESP)instacron:UNESPengProceedings - 2020 IEEE International Conference on Big Data, Big Data 2020info:eu-repo/semantics/openAccess2021-10-22T21:54:17Zoai:repositorio.unesp.br:11449/206167Repositório InstitucionalPUBhttp://repositorio.unesp.br/oai/requestopendoar:29462021-10-22T21:54:17Repositório Institucional da UNESP - Universidade Estadual Paulista (UNESP)false |
dc.title.none.fl_str_mv |
An Attacks Detection Mechanism for Intelligent Transport System |
title |
An Attacks Detection Mechanism for Intelligent Transport System |
spellingShingle |
An Attacks Detection Mechanism for Intelligent Transport System Pastori Valentini, Edivaldo [UNESP] denial of service information security Intelligent Transport Systems intrusion detection system VANET |
title_short |
An Attacks Detection Mechanism for Intelligent Transport System |
title_full |
An Attacks Detection Mechanism for Intelligent Transport System |
title_fullStr |
An Attacks Detection Mechanism for Intelligent Transport System |
title_full_unstemmed |
An Attacks Detection Mechanism for Intelligent Transport System |
title_sort |
An Attacks Detection Mechanism for Intelligent Transport System |
author |
Pastori Valentini, Edivaldo [UNESP] |
author_facet |
Pastori Valentini, Edivaldo [UNESP] Ipolito Meneguette, Rodolfo Alsuhaim, Adil |
author_role |
author |
author2 |
Ipolito Meneguette, Rodolfo Alsuhaim, Adil |
author2_role |
author author |
dc.contributor.none.fl_str_mv |
Universidade Estadual Paulista (Unesp) Universidade de São Paulo (USP) School of Computing |
dc.contributor.author.fl_str_mv |
Pastori Valentini, Edivaldo [UNESP] Ipolito Meneguette, Rodolfo Alsuhaim, Adil |
dc.subject.por.fl_str_mv |
denial of service information security Intelligent Transport Systems intrusion detection system VANET |
topic |
denial of service information security Intelligent Transport Systems intrusion detection system VANET |
description |
The increase in computational technologies for means of transport, especially vehicles, has provided great benefits through Intelligent Transport Systems (ITS). Drivers, passengers, and pedestrians rely on computer applications that aim to protect human life, including agility in handling emergencies, improvements in traffic, and even leisure and entertainment resources. Communication and data exchange are from vehicles to vehicles (V2V) and from vehicles to road infrastructures (V2I) being carried out through the architecture of the vehicular ad hoc network (VANET). However, this type of network differs from traditional ones, as it operates in a highly dynamic environment, originated by the rapid mobility between its nodes and with short connection intervals. Wireless vehicle communication adopts the IEEE 802.11p standard, allowing vehicles to operate outside a basic set of services. Given these characteristics, numerous threats, vulnerabilities, and denial of service attacks can occur. Prioritizing the safety of life and protecting VANET against this type of attack, a security mechanism is proposed. The mechanism works to detect anomalies through a simple and robust statistical model in the search for extreme values (outliers). Median Absolute Deviation detects large amounts of MAC frames and ARP requests, characteristics of DoS / DDoS from malicious vehicles. Through extensive stages of simulations using the NS-3 and SUMO simulators, the mechanism showed excellent efficiency in detection rates and minimum rates of false positives and false negatives. |
publishDate |
2020 |
dc.date.none.fl_str_mv |
2020-12-10 2021-06-25T10:27:43Z 2021-06-25T10:27:43Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/conferenceObject |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://dx.doi.org/10.1109/BigData50022.2020.9378309 Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020, p. 2453-2461. http://hdl.handle.net/11449/206167 10.1109/BigData50022.2020.9378309 2-s2.0-85103861927 |
url |
http://dx.doi.org/10.1109/BigData50022.2020.9378309 http://hdl.handle.net/11449/206167 |
identifier_str_mv |
Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020, p. 2453-2461. 10.1109/BigData50022.2020.9378309 2-s2.0-85103861927 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
2453-2461 |
dc.source.none.fl_str_mv |
Scopus reponame:Repositório Institucional da UNESP instname:Universidade Estadual Paulista (UNESP) instacron:UNESP |
instname_str |
Universidade Estadual Paulista (UNESP) |
instacron_str |
UNESP |
institution |
UNESP |
reponame_str |
Repositório Institucional da UNESP |
collection |
Repositório Institucional da UNESP |
repository.name.fl_str_mv |
Repositório Institucional da UNESP - Universidade Estadual Paulista (UNESP) |
repository.mail.fl_str_mv |
|
_version_ |
1799964454154141696 |