JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2014, Vol. 44 ›› Issue (1): 29-34.doi: 10.6040/j.issn.1672-3961.0.2013.192

• Articles • Previous Articles     Next Articles

Intrusion detection scheme based on traffic scenarios in vehicular adhoc networks

LI Chun-yan, LIU Yi-liang, WANG Liang-min*   

  1. School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
  • Received:2013-10-21 Online:2014-02-20 Published:2013-10-21

Abstract:

To reduce various intrusion behaviors   that might damage  the drivers and passengers in vehicular ad-hoc networks (VANETs), a mixed intrusion detection scheme (MIDS) based on different traffic scenarios was proposed. While the vehicles were running on the same road, message integrity method (MIM) was used, otherwise VOTE method was chosen. When the network condition was allowed, the corresponding scenario information could be requested to prove the reality of alert messages. The simulation results showed that the proposed method outperformed the existing intrusion detection methods in terms of communication delay and detection rate. Meanwhile, this method could overcome the limitations of existing schemes and could detect many intrusion behaviors efficiently.

Key words: vehicular ad-hoc networks, intrusion behaviors, mixed intrusion detection scheme, intrusion detection

[1] XIAO Miaomiao, WEI Benzheng, YIN Yilong. A hybrid intrusion detection system based on BFOA and K-means algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 115-119.
[2] WANG Hao, HUA Ji-xue, FAN Xiao-shi. Intrusion detection technology based on twin support vector machine [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(6): 53-56.
[3] XIA Zhan-guo, WAN Ling, CAI Shi-yu, SUN Peng-hui. A semi-supervised clustering algorithm oriented to intrusion detection [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(6): 1-7.
[4] DING Yan, LI Yong-zhong*. Research on intrusion detection algorithm based on PCA and semisupervised clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 41-46.
[5] LIU Yuan-xun,XU Qiu-liang,YUN Xiao-chun . Research on IDS-faced general-purpose application-level protocol identification technology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 65-69 .
[6] GAO Xiao-wei,JIANG Xiao-yun . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(6): 107-110 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!