2016
DOI: 10.1016/j.eswa.2015.12.006
|View full text |Cite
|
Sign up to set email alerts
|

CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
49
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 108 publications
(50 citation statements)
references
References 34 publications
0
49
1
Order By: Relevance
“…In particular, many activities have been done, such as dataset preparation, environmental noise injection, communication simulation, and misbehavior simulation. Similar to related studies [2,20,29,35,76,77], the Matlab tool [78] has been used for simulating the environmental noises, vehicle communication, and misbehaving vehicles.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, many activities have been done, such as dataset preparation, environmental noise injection, communication simulation, and misbehavior simulation. Similar to related studies [2,20,29,35,76,77], the Matlab tool [78] has been used for simulating the environmental noises, vehicle communication, and misbehaving vehicles.…”
Section: Methodsmentioning
confidence: 99%
“…Road collisions are increasing, and they are being expected to be the fifth leading cause of death by 2030 [1,2]. Annually, millions of people lose their lives on roads worldwide due to traffic accidents [1], with 40 times more suffering from injuries.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, a Nash equilibrium was examined. In Reference , the cooperative monitoring of communication between the vehicles was extended to build a training data set, which was analyzed by support vector machine (SVM) learning techniques in an incremental fashions to classify cooperative and malicious vehicular nodes. The model was based on top of QoS‐OSLR protocol and used for the maintenance of clusters and increasing the lifetime of the network by using mobility metric protocols during cluster formations.…”
Section: Countermeasures To Handle Attacks In Vanetmentioning
confidence: 99%
“…They overcome the mobility and network vulnerability of cluster member nodes during the initialization phase of distributed ad hoc networks, and select the appropriate cluster head node according to the mobility state and trust level of nodes, which effectively reduce the communication overhead. In addition, based on the existing dynamic link routing protocol, Wahab et al [10] reduced the size of training dataset by restricting data collection and storage, and adopted the classification technology of support vector machine (SVM) to implement collaborative monitoring between vehicles in online and incremental manner, and reduced the cost of exchanging results between nodes by transporting the final decision in some data clusters. This scheme improves the accuracy of intrusion detection to a certain extent.…”
mentioning
confidence: 99%