Abstract
Vehicular ad-hoc network (VANET) plays an essential role in helping the development of smart cars and intelligent transportation systems. By easing congestion and speeding up data transfer, VANET makes it possible for connected cars to function more smoothly. However, VANETs are affected by different types of cyber attacks, such as distributed denial of services (DDoS) attacks. A digital twin (DT) is a replica of a physical system that operates in tandem with the actual thing, allowing for continuous monitoring and management. The DT prepares the way for the monitoring of a physical entity on a regular basis and for its automated management. The improved efficiency in keeping tabs on the physical world is largely attributable to DT. For this reason, academics are advocating for its use in a variety of settings. In this research, we use DT to solve the problem of identifying and stopping malignant nodes on a VANET infrastructure. In this paper, we proposed a framework that uses the concepts of DT for the identification of malignant nodes. Our suggested approach employs machine learning to distinguish between regular traffic and attack traffic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbas, N., Nasser, Y., Shehab, M., Sharafeddine, S.: Attack-specific feature selection for anomaly detection in software-defined networks, pp. 142–146 (2021). https://doi.org/10.1109/MENACOMM50742.2021.9678279
Akl, N., El Khoury, J., Mansour, C.: Trip-based prediction of hybrid electric vehicles velocity using artificial neural networks, pp. 60–65 (2021). https://doi.org/10.1109/IMCET53404.2021.9665641
Al-Hilo, A., Ebrahimi, D., Sharafeddine, S., Assi, C.: Vehicle-assisted RSU caching using deep reinforcement learning. IEEE Trans. Emerg. Top. Comput. (2021). https://doi.org/10.1109/TETC.2021.3068014
Barki, L., Shidling, A., Meti, N., Narayan, D.G., Mulla, M.M.: Detection of distributed denial of service attacks in software defined networks. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2576–2581. IEEE, Jaipur (2016). https://doi.org/10.1109/ICACCI.2016.7732445
Cvitić, I., Perakovic, D., Gupta, B.B., Choo, K.K.R.: Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J. 9(3), 2109–2123 (2021)
Deveci, M., Pamucar, D., Gokasar, I., Köppen, M., Gupta, B.B.: Personal mobility in metaverse with autonomous vehicles using Q-rung orthopair fuzzy sets based OPA-RAFSI model. IEEE Trans. Intell. Transp. Syst. (2022)
Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29–35 (2018). https://doi.org/10.1109/SPW.2018.00013
Erskine, S.K., Elleithy, K.M.: Secure intelligent vehicular network using fog computing. Electronics 8(4), 455 (2019)
Gupta, B.B., Li, K.C., Leung, V.C., Psannis, K.E., Yamaguchi, S., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J. Automatica Sinica 8(12), 1877–1890 (2021)
Khoury, J., Amine, K., Saad, R.: An initial investigation of the effects of a fully automated vehicle fleet on geometric design. J. Adv. Transp. 2019 (2019). https://doi.org/10.1155/2019/6126408
Mishra, A., Gupta, N., Gupta, B.: Defense mechanisms against DDoS attack based on entropy in SDN-cloud using pox controller. Telecommun. Syst. 77(1), 47–62 (2021)
Shidaganti, G.I., Inamdar, A.S., Rai, S.V., Rajeev, A.M.: SCEF: a model for prevention of DDoS attacks from the cloud. Int. J. Cloud Appl. Comput. (IJCAC) 10(3), 67–80 (2020)
Singh, A., Gupta, B.B.: Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions. Int. J. Semant. Web Inf. Syst. (IJSWIS) 18(1), 1–43 (2022)
Talkhestani, B.A., Jung, T., Lindemann, B., Sahlab, N., Jazdi, N., Schloegl, W., Weyrich, M.: An architecture of an intelligent digital twin in a cyber-physical production system. at-Automatisierungstechnik 67(9), 762–782 (2019)
Tarneberg, W., Skarin, P., Gehrmann, C., Kihl, M.: Prototyping intrusion detection in an industrial cloud-native digital twin. In: 2021 22nd IEEE International Conference on Industrial Technology (ICIT), Valencia, Spain, pp. 749–755. IEEE (2021). https://doi.org/10.1109/ICIT46573.2021.9453553
Tewari, A., Gupta, B.B.: Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int. J. Semant. Web Inf. Syst. (IJSWIS) 16(3), 20–34 (2020)
Tsobdjou, L.D., Pierre, S., Quintero, A.: An online entropy-based DDoS flooding attack detection system with dynamic threshold. IEEE Trans. Netw. Serv. Manage. 19(2), 1679–1689 (2022). https://doi.org/10.1109/TNSM.2022.3142254
Van Huynh, D., Khosravirad, S.R., Masaracchia, A., Dobre, O.A., Duong, T.Q.: Edge intelligence-based ultra-reliable and low-latency communications for digital twin-enabled metaverse. IEEE Wireless Commun. Lett. 11, 1733–1737 (2022). https://doi.org/10.1109/LWC.2022.3179207
Wahab, O.A., Bentahar, J., Otrok, H., Mourad, A.: Optimal load distribution for the detection of VM-based DDoS attacks in the cloud. IEEE Trans. Serv. Comput. 13(1), 114–129 (2017)
Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8. IEEE (2017)
Zhou, Z., Gaurav, A., Gupta, B.B., Lytras, M.D., Razzak, I.: A fine-grained access control and security approach for intelligent vehicular transport in 6G communication system. IEEE Trans. Intell. Transp. Syst. 23, 9726–9735 (2021)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Arya, V., Gaurav, A., Gupta, B.B., Hsu, CH., Baghban, H. (2023). Detection of Malicious Node in VANETs Using Digital Twin. In: Hsu, CH., Xu, M., Cao, H., Baghban, H., Shawkat Ali, A.B.M. (eds) Big Data Intelligence and Computing. DataCom 2022. Lecture Notes in Computer Science, vol 13864. Springer, Singapore. https://doi.org/10.1007/978-981-99-2233-8_15
Download citation
DOI: https://doi.org/10.1007/978-981-99-2233-8_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2232-1
Online ISBN: 978-981-99-2233-8
eBook Packages: Computer ScienceComputer Science (R0)