Browse > Article

An Anomaly Detection Method for the Security of VANETs  

Oh, Sun-Jin (세명대학교 정보통신학부)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.10, no.2, 2010 , pp. 77-83 More about this Journal
Abstract
Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.
Keywords
VANETs; MANETs; Anomaly Detection; Rough Set;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," Proc. in Mobile Computing and Networking, pp. 243–254, 2000.
2 C. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," Proc. in ACM SIG-COMM'94 Conference on Communications Architectures, Protocols and Applications, pp. 234–244, 1994.
3 W. Franz and C. Maihoefer, "Geographical addressing and forwarding in fleetnet," Proc. in Mobile Computing and Networking, 2002.
4 H. Fuessler, M. Mauve, H. Hartenstein, M. Kaesemann, and D. Vollmer, "A Comparison of Routing Strategies for Vehicular Ad Hoc Networks," Department of Computer Science, University of Mannheim, Mannheim, Tech. Rep. TR-3-2002, 2002.
5 T. Leinmueller, E. Schoch, F. Kargl, and C. Maihoefer, "Influence of Falsified Position Data on Geographic Ad-hoc Routing," Proc. in ESAS 2005, 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, 2005.
6 C. Cai et al., "Constructing an Efficient Mobility Profile of Ad-Hoc for Mobility-Pattern-Based Anomaly Detection in MANET," Proc. in the Global Telecommunications Conference, pp. 1-5, 2006.
7 The PReVENT WILLWARN subproject website. [Online]. Available: http://www.prevent-ip.org/en/prevent_subprojects/safe_speedandsafe_following/willwarn/
8 The PReVENT project website. [Online]. Available: http://www.prevent-ip.org/
9 Hongmei Deng et al., "Agent-based Distributed Intrusion Detection Methodology for MANETs," Proc. of the 2006 International Conference on Security & Management, pp. 200-206, 2006.
10 D. Stern et al., "A General Cooperative Intrusion Detection Architecture for MANETs," Proc. of the 3rd IEEE International Workshop on Information Assurance, pp. 57-70, 2005.
11 R.Jensen and Q. Shen, Fuzzy-Rough Sets for Descriptive Dimensionality Reduction, Proc. of the 11th International Conference on Fuzzy Systems, pp. 29-34., 2002.
12 Z. Pawlak, Rough Sets Theoretical Aspects of Reasoning about Data, Kluwer Academic Pub., 1991.