Logo do repositório

An Attacks Detection Mechanism for Intelligent Transport System

dc.contributor.authorPastori Valentini, Edivaldo [UNESP]
dc.contributor.authorIpolito Meneguette, Rodolfo
dc.contributor.authorAlsuhaim, Adil
dc.contributor.institutionUniversidade Estadual Paulista (Unesp)
dc.contributor.institutionUniversidade de São Paulo (USP)
dc.contributor.institutionSchool of Computing
dc.date.accessioned2021-06-25T10:27:43Z
dc.date.available2021-06-25T10:27:43Z
dc.date.issued2020-12-10
dc.description.abstractThe increase in computational technologies for means of transport, especially vehicles, has provided great benefits through Intelligent Transport Systems (ITS). Drivers, passengers, and pedestrians rely on computer applications that aim to protect human life, including agility in handling emergencies, improvements in traffic, and even leisure and entertainment resources. Communication and data exchange are from vehicles to vehicles (V2V) and from vehicles to road infrastructures (V2I) being carried out through the architecture of the vehicular ad hoc network (VANET). However, this type of network differs from traditional ones, as it operates in a highly dynamic environment, originated by the rapid mobility between its nodes and with short connection intervals. Wireless vehicle communication adopts the IEEE 802.11p standard, allowing vehicles to operate outside a basic set of services. Given these characteristics, numerous threats, vulnerabilities, and denial of service attacks can occur. Prioritizing the safety of life and protecting VANET against this type of attack, a security mechanism is proposed. The mechanism works to detect anomalies through a simple and robust statistical model in the search for extreme values (outliers). Median Absolute Deviation detects large amounts of MAC frames and ARP requests, characteristics of DoS / DDoS from malicious vehicles. Through extensive stages of simulations using the NS-3 and SUMO simulators, the mechanism showed excellent efficiency in detection rates and minimum rates of false positives and false negatives.en
dc.description.affiliationPaulista State University - Unesp
dc.description.affiliationUniversity of Sao Paulo - Usp Institute of Mathematical and Computer Sciences - Icmc
dc.description.affiliationClemson University School of Computing
dc.description.affiliationUnespPaulista State University - Unesp
dc.format.extent2453-2461
dc.identifierhttp://dx.doi.org/10.1109/BigData50022.2020.9378309
dc.identifier.citationProceedings - 2020 IEEE International Conference on Big Data, Big Data 2020, p. 2453-2461.
dc.identifier.doi10.1109/BigData50022.2020.9378309
dc.identifier.scopus2-s2.0-85103861927
dc.identifier.urihttp://hdl.handle.net/11449/206167
dc.language.isoeng
dc.relation.ispartofProceedings - 2020 IEEE International Conference on Big Data, Big Data 2020
dc.sourceScopus
dc.subjectdenial of service
dc.subjectinformation security
dc.subjectIntelligent Transport Systems
dc.subjectintrusion detection system
dc.subjectVANET
dc.titleAn Attacks Detection Mechanism for Intelligent Transport Systemen
dc.typeTrabalho apresentado em evento
dspace.entity.typePublication

Arquivos

Coleções