2022
DOI: 10.3390/s22197612
|View full text |Cite
|
Sign up to set email alerts
|

RSU-Based Online Intrusion Detection and Mitigation for VANET

Abstract: Secure vehicular communication is a critical factor for secure traffic management. Effective security in intelligent transportation systems (ITS) requires effective and timely intrusion detection systems (IDS). In this paper, we consider false data injection attacks and distributed denial-of-service (DDoS) attacks, especially the stealthy DDoS attacks, targeting integrity and availability, respectively, in vehicular ad-hoc networks (VANET). Novel machine learning techniques for intrusion detection and mitigati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 70 publications
0
7
0
Order By: Relevance
“…Training TD3: Using the legitimately collected data and the data from simulated wormhole attacks, the TD3 algorithm is trained. The objective is to discover the policy that maximizes the predicted cumulative reward while separating patterns of wormhole attack from normal behavior [17].…”
Section: Functions Of Td3 In Detecting Wormhole Attacks In Vanetmentioning
confidence: 99%
“…Training TD3: Using the legitimately collected data and the data from simulated wormhole attacks, the TD3 algorithm is trained. The objective is to discover the policy that maximizes the predicted cumulative reward while separating patterns of wormhole attack from normal behavior [17].…”
Section: Functions Of Td3 In Detecting Wormhole Attacks In Vanetmentioning
confidence: 99%
“…13,14 It disrupts the fence between data constructions and coatings. 15,16 The regulator is positioned in the control layer. In the controller of SDN, the DDoS attacks concurrently attack its process.…”
Section: Intoductionmentioning
confidence: 99%
“…The SDN's control logic did not generate guidelines for packet promotion 13,14 . It disrupts the fence between data constructions and coatings 15,16 …”
Section: Intoductionmentioning
confidence: 99%
“…Some specific nodes (anchors) identify the location of their global location, and the remaining nodes control or control their position by measuring the geographic information of their neighbours. This location is used in wireless multihop networks, known as corporate ad hoc localization networks or automatically located network nodes, and its location is determined by sharing its information [5,6].…”
Section: Introductionmentioning
confidence: 99%