2018
DOI: 10.4236/wet.2018.94007
|View full text |Cite
|
Sign up to set email alerts
|

Classification Approach for Intrusion Detection in Vehicle Systems

Abstract: Vehicular ad hoc networks (VANETs) enable wireless communication among Vehicles and Infrastructures. Connected vehicles are promising in Intelligent Transportation Systems (ITSs) and smart cities. The main objective of VANET is to improve the safety, comfort, driving efficiency and waiting time on the road. VANET is unlike other ad hoc networks due to its unique characteristics and high mobility. However, it is vulnerable to various security attacks due to the lack of centralized infrastructure. This is a seri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 80 publications
(30 citation statements)
references
References 41 publications
(34 reference statements)
0
29
0
Order By: Relevance
“…The LR, DT, K-NN and LR, recorded lower accuracy of 0.342, 0.969 and 0.568, respectively. Equally, our are BFF-IDS outperforms other models proposed in [13,[34][35][36] which recorded average accuracies of 0.928, 0.970, (0.974, 0.965) and 0.980, respectively. Although only [34] used the same set of data as us, others' datasets were equally collected and created from the same source.…”
Section: ) the Federated Forest Model Evaluation Against Other Modelsmentioning
confidence: 70%
“…The LR, DT, K-NN and LR, recorded lower accuracy of 0.342, 0.969 and 0.568, respectively. Equally, our are BFF-IDS outperforms other models proposed in [13,[34][35][36] which recorded average accuracies of 0.928, 0.970, (0.974, 0.965) and 0.980, respectively. Although only [34] used the same set of data as us, others' datasets were equally collected and created from the same source.…”
Section: ) the Federated Forest Model Evaluation Against Other Modelsmentioning
confidence: 70%
“…In the existing automotive applications, the TML and DL-based IDSs have obvious advantages in detecting various malicious messages [ 18 , 19 , 20 ]. Bozdal et al [ 21 ] and Lokman et al [ 22 ] reviewed the security threats and challenges of the automotive CAN bus system, and discuss some potential security solutions.…”
Section: Background and Related Workmentioning
confidence: 99%
“…• Fuzzy attack: The attacker in this type of attack sends messages by befooling the identifiers in any order using a constant data hampering the functioning of the system. The attacker needs to study a vehicle for a long time to observe the identifiers behavior in order to change its pattern [18].…”
Section: Security Threats and Attacks In Iov Environmentmentioning
confidence: 99%
“…They also explained bit optimization and link-NFA. Alshammari et al [18] explained an IDS based on controller area network protocol which provides a bus for the messages to flow without revealing the sender and receiver information. Various factors like rate of flow of messages over the bus can detect an attack.…”
Section: B Authenticationmentioning
confidence: 99%