2021 International Conference on Information Networking (ICOIN) 2021
DOI: 10.1109/icoin50884.2021.9333942
|View full text |Cite
|
Sign up to set email alerts
|

SVM-based Detection of False Data Injection in Intelligent Transportation System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…The data set obtained from a one-way four-lane highway simulation using MATLAB and NS-3 was tested in the SVMbased IDS model and it was concluded that it has high accuracy in detecting malicious information. The system has also been shown to reduce traffic congestion by reducing malicious packets [24]. I. Bolodurina et al examined the efficiency of various ML algorithms in identifying new features to increase the efficiency of ML methods used in intrusion detection applications in VANETs.…”
Section: A Trust Managementmentioning
confidence: 99%
“…The data set obtained from a one-way four-lane highway simulation using MATLAB and NS-3 was tested in the SVMbased IDS model and it was concluded that it has high accuracy in detecting malicious information. The system has also been shown to reduce traffic congestion by reducing malicious packets [24]. I. Bolodurina et al examined the efficiency of various ML algorithms in identifying new features to increase the efficiency of ML methods used in intrusion detection applications in VANETs.…”
Section: A Trust Managementmentioning
confidence: 99%
“…Considering the vulnerability of traditional communication, a state estimation and control algorithm against FDIAs was developed. 31 In Cabelin et al, 32 a machine learning-based detection and identification method against FDIAs was proposed. However, the above learning-based detection methods relay on the training of historical data.…”
Section: Introductionmentioning
confidence: 99%
“…To respond to the FDI attacks timely, scholars have carried out some research on the security of vehicle networking systems under FDI attacks [16][17][18][19][20]. In [16], L. Guo et al investigated the covert characteristics of FDI attacks and gave the optimal attack strategies with respect to the cyber-physical system of intelligent vehicle networking.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the FDI attack was modeled as an additive attack that affects the vehicle platoon, and a new assessment method was developed [17]. To detect and identify the FDI attacks, a machine learning-based detection method is proposed in [18]. In [19], a fuzzy theory and deep learning-based detection are developed by considering the impact of FDI attacks on the load frequency control system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation