Abstract
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well as semi-automobile vehicles. Such vehicles rely heavily on data management and the exchange of Cooperative Awareness Messages (CAMs) for external communication with the environment. VANETs are vulnerable to a variety of attacks, including Black Hole, Gray Hole, wormhole, and rush attacks. These attacks are aimed at disrupting traffic between cars and on the roadside. The discovery of Black Hole attack has become an increasingly critical problem due to widespread adoption of autonomous and connected vehicles (ACVs). Due to the critical nature of ACVs, delay or failure of even a single packet can have disastrous effects, leading to accidents. In this work, we present a neural network-based technique for detection and prevention of rushed Black and Gray Hole attacks in vehicular networks. The work also studies novel systematic reactions protecting the vehicle against dangerous behavior. Experimental results show a superior detection rate of the proposed system in comparison with state-of-the-art techniques.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference41 articles.
1. Dhyani, I., Goel, N., Sharma, G., and Mallick, B. (2017). Advances in Computer and Computational Sciences, Springer.
2. Millimeter-wave omnidirectional path loss data for small cell 5G channel modeling;MacCartney;IEEE Access,2015
3. Ali Zardari, Z., He, J., Zhu, N., Mohammadani, K.H., Pathan, M.S., Hussain, M.I., and Memon, M.Q. (2019). A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet, 11.
4. Ali Alheeti, K.M., Gruebler, A., and McDonald-Maier, K. (2016). Intelligent intrusion detection of gray hole and rushing attacks in self-driving vehicular networks. Computers, 5.
5. Irwin, R. (2014). Violence against Health Workers in Complex Security Environments, SIPRI.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献