Skip to main content

Intrusion Detection Scheme for Autonomous Driving Vehicles

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Included in the following conference series:

  • 1671 Accesses

Abstract

With the recent breakthroughs, autonomous driving vehicles (ADVs) are promising to bring transformative changes to our transportation systems. However, recent hacks have demonstrated numerous vulnerabilities in these emerging systems from software to control. Safety is becoming one of the major barriers for the wider adoption of ADVs. ADVs connect to vehicular ad-hoc networks (VANETs) to communicate with each other. However, malicious nodes can falsify information and threaten the safety of passengers and other vehicles with catastrophic consequences. In this work, we present a novel reputation-based intrusion detection scheme to detect malicious ADVs through dynamic credit and reputation evaluation. To further encourage user’s participation, an incentive mechanism is also built for ADVs in the intrusion detection system. We demonstrate the feasibility and effectiveness of our proposed system through extensive simulation, compared with current representative approaches. Simulation results show that our proposed scheme can acquire better intrusion detection results, reduced false positive ratio, and improved user participation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bierstedt, J., Gooze, A., Gray, C., Raykin, L., Walters, J.: Effects of next-generation vehicles on travel demand and highway capacity. FP Think Working Group 2, 11 (2014)

    Google Scholar 

  2. Guo, J., Zhang, Y., Chen, X., Yousefi, S., Guo, C., Wang, Y.: Spatial stochastic vehicle traffic modeling for VANETs. IEEE Trans. Intell. Transp. Syst. 19(2), 416–425 (2018)

    Article  Google Scholar 

  3. Tangade, S., Manvi, S.S., Lorenz, P.: Trust management scheme based on hybrid cryptography for secure communications in VANETs. IEEE Trans. Veh. Technol. 69(5), 5232–5243 (2020)

    Article  Google Scholar 

  4. Singh, P.K., Singh, R., Nandi, S.K., Ghafoor, K.Z., Rawat, D.B., Nandi, S.: Blockchain-based adaptive trust management in internet of vehicles using smart contract. IEEE Trans. Intell. Transp. Syst. (2020)

    Google Scholar 

  5. Kumar, M., Jain, V., Jain, A., Bisht, U.S., Gupta, N.: Evaluation of black hole attack with avoidance scheme using aodv protocol in vanet. J. Discrete Math. Sci. Cryptogr. 22(2), 277–291 (2019)

    Article  Google Scholar 

  6. Anand, S. J. V., Pranav, I., Neetish, M., Narayanan, J.: Network intrusion detection using improved genetic k-means algorithm. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2441–2446, Bangalore (2018). https://doi.org/10.1109/ICACCI.2018.8554710

  7. Sedjelmaci, H., Senouci, S. M.: A new intrusion detection framework for vehicular networks. In: IEEE International Conference on Communications (ICC), Sydney, NSW, pp. 538–543 (2014). https://doi.org/10.1109/ICC.2014.6883374

  8. Sedjelmaci, H., Senouci, S.M., Feham, M.: An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. Netw. 6(10), 1211–1224 (2013)

    Article  Google Scholar 

  9. Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wireless Netw. 9(5), 545–556 (2003)

    Article  Google Scholar 

  10. Amiri, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: International Conference on Innovation (2014)

    Google Scholar 

  11. Bismeyer, N., Stresing, C., Bayarou, K. M.: Intrusion detection in VANETs through verification of vehicle movement data (2010)

    Google Scholar 

  12. Sedjelmaci, H., Bouali, T., Senouci, S.M.: Detection and prevention from misbehaving intruders in vehicular networks. In: IEEE Global Communications Conference, vol. 2, pp. 39–44 (2015)

    Google Scholar 

  13. Nguyen, A., Mokdad, L., Othman, J.: DJAVAN: detecting jamming attacks in vehicle ad hoc networks. Perform. Eval. 87, 405–410 (2013)

    Google Scholar 

  14. Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Jose, CA, pp. 1–8 (2006). https://doi.org/10.1109/MOBIQ.2006.340422

  15. Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell.: Theory Pract. (IJCITP) 5(1), 1–8 (2006)

    Google Scholar 

  16. Xu, Q.Y., Su, Z., Wang, Y.T., Dai, M.H.: A trustworthy content caching and bandwidth allocation scheme with edge computing for smart campus. IEEE Access 6, 63868–63879 (2018)

    Article  Google Scholar 

  17. Hu, H., Lu, R., Zhang, Z., Shao, J.: Replace: a reliable trust-based platoon service recommendation scheme in vanet. IEEE Trans. Veh. Technol. 66(2), 1–1 (2016)

    Google Scholar 

  18. Khabbaz, M.J., Fawaz, W.F., Assi, C.M.: A simple free-flow traffific model for vehicular intermittently connected networks. IEEE Trans. Intell. Transp. Syst. 13(3), 1312–1326 (2012)

    Article  Google Scholar 

  19. Xing, R., Su, Z., Zhang, N.: Trust-evaluation-based intrusion detection and reinforcement learning in autonomous driving. IEEE Netw. 33(5), 54–60 (2019)

    Article  Google Scholar 

  20. Gingold, H., Xue, F.: On asymptotic summation of potentially oscillatory difference systems. J. Math. Anal. Appl. 330(2), 1068–1092 (2007)

    Article  MathSciNet  Google Scholar 

  21. Le, V., Lin, Y.W., Wang, X.M., Feng, Z.Y., Zhang, P.: A cell based dynamic spectrum management scheme with interference mitigation for cognitive networks. In: VTC Spring 2008 - IEEE Vehicular Technology Conference, pp. 1594–1598 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhou Su .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhai, W., Su, Z. (2020). Intrusion Detection Scheme for Autonomous Driving Vehicles. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics