Publication Cover
Cybernetics and Systems
An International Journal
Volume 54, 2023 - Issue 7
115
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Optimized Deep Neural Model-Based Intrusion Detection and Mitigation System for Vehicular Ad-Hoc Network

&

References

  • Alfadhli, S. A., S. Lu, K. Chen, and M. Sebai. 2020. MFSPV: A multi-factor secured and lightweight privacy-preserving authentication scheme for VANETs. IEEE Access 8:142858–74. doi:10.1109/ACCESS.2020.3014038.
  • Al-Heety, O. S., Z. Zakaria, M. Ismail, M. M. Shakir, S. Alani, and H. Alsariera. 2020. A comprehensive survey: Benefits, services, recent works, challenges, security, and use cases for SDN-VANET. IEEE Access 8:91028–47. doi:10.1109/ACCESS.2020.2992580.
  • Aloysius, G., and B. R. Rajakumar. 2013. Fuzzy aided ant colony optimization algorithm to solve optimization problem, intelligent informatics. Advances in Intelligent Systems and Computing 182:207–15.
  • Anand, S. 2020. Intrusion detection system for wireless mesh networks via improved whale optimization. Journal of Networking and Communication Systems 3 (4):9–16.
  • Ankush Thorat, V. 2021. Cloud intrusion detection using modified crow search optimized based neural network. Journal of Networking and Communication Systems 4 (2):9–15.
  • Ayoub, A., A.-R. I. Al-Ghuwairi, T. Almalkawi, M. Alauthman, and A. Al-Dubai. 2021. Machine learning-driven optimization for intrusion detection in smart vehicular networks. Wireless Personal Communications 117 (4):3129–52. doi:10.1007/s11277-020-07797-y.
  • Badreddine, C., A. Beni-Hssane, M. E. Fissaoui, and M. Erritali. 2019. Road traffic congestion detection in VANET networks. Procedia Computer Science 151:1158–63. doi:10.1016/j.procs.2019.04.165.
  • Basant, S., S. Biswas, and S. Karmakar. 2018. A game theory based multi layered intrusion detection framework for VANET. Future Generation Computer Systems 82:12–28. doi:10.1016/j.future.2017.12.008.
  • Chaker, A. K., L. N. Carlos, T. Calafate, and A. Lakas. 2017. TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs. Vehicular Communications 9:254–67. doi:10.1016/j.vehcom.2016.11.010.
  • Deepak, R., and D. Doye. 2018. Traffic-aware routing protocol in VANET using adaptive autoregressive crow search algorithm. Journal of Networking and Communication Systems 1 (1):36–42.
  • Deepak, R., and D. Doye. 2019. Traffic-aware routing in urban VANET using PSO model. Journal of Networking and Communication Systems 2 (2):29–36.
  • Dimitrios, K., and A. Argyriou. 2018. Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning. Vehicular Communications 13:56–63.
  • Fatih, S., and S. Sen. 2017. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61:33–50. doi:10.1016/j.adhoc.2017.03.006.
  • Fei, L., Z. Jiayan, E. Szczerbicki, S. Jiaqi, L. Ruxiang, and D. Renhong. 2020. Deep learning-based intrusion system for vehicular ad hoc networks. Computers, Materials & Continua 65 (1):653–81. doi:10.32604/cmc.2020.011264.
  • Gad Abdallah, R., A. A. Nashat, and T. M. Barkat. 2021. Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access 9:142206–17.
  • Gali, M. 2021. Deep learning based optimization algorithm for cyber security intrusion detection system. Journal of Networking and Communication Systems 4 (2).
  • Gao, Y., H. Wu, B. Song, Y. Jin, X. Luo, and X. Zeng. 2019. A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–71. doi:10.1109/ACCESS.2019.2948382.
  • Hamssa, H., A. Ellatif Samhat, C. Bassil, and A. Laouiti. 2017. VANet security challenges and solutions: A survey. Vehicular Communications 7:7–20. doi:10.1016/j.vehcom.2017.01.002.
  • Hichem, S., and S. Mohammed Senouci. 2015. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Computers & Electrical Engineering 43:33–47. doi:10.1016/j.compeleceng.2015.02.018.
  • Iwendi, C., M. Uddin, J. A. Ansere, P. Nkurunziza, J. H. Anajemba, and A. K. Bashir. 2018. On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access 6:47258–67. doi:10.1109/ACCESS.2018.2864111.
  • Jay, R., S. Vithlani, and C. Gohel. 2016. Securing VANET by preventing attacker node using watchdog and Bayesian network theory. Procedia Computer Science 79:649–56.
  • Junwei, L., M. Ma, M. Sadiq, and Y. Kai-Hau. 2019. A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology. Knowledge-Based Systems 163:611–23. doi:10.1016/j.knosys.2018.09.022.
  • Junwei, L., and M. Ma. 2020. FS-MOEA: A novel feature selection algorithm for IDSs in vehicular networks. IEEE Transactions on Intelligent Transportation Systems 23 (1):368–82.
  • Junwei, L., and M. Ma. 2021. ECF-MRS: An efficient and collaborative framework with Markov-based reputation scheme for IDSs in vehicular networks. IEEE Transactions on Information Forensics and Security 16:278–90. doi:10.1109/TIFS.2020.3013211.
  • Junwei, L., J. Chen, Y. Zhu, and R. Yu. 2018. A novel intrusion detection system for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing Journal 75:712–27. doi:10.1016/j.asoc.2018.12.001.
  • Junwei, L., Q. Lin, J. Chen, and Y. Zhu. 2019. A filter model based on hidden generalized mixture transition distribution model for intrusion detection system in Vehicle Ad Hoc Networks. IEEE Transactions on Intelligent Transportation Systems 21 (7):2707–22. doi:10.1109/TITS.2019.2905415.
  • Li, X., Y. Han, J. Gao, and J. Niu. 2020. Secure hierarchical authentication protocol in VANET. IET Information Security 14 (1):99–110. doi:10.1049/iet-ifs.2019.0249.
  • Man, Z., L. Han, H. Lu, and C. Fu. 2020. Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant. Computer Networks 172:107174. doi:10.1016/j.comnet.2020.107174.
  • Marsaline Beno, M., I. R. Valarmathi, S. M. Swamy, and B. R. Rajakumar. 2014. Threshold prediction for segmenting tumour from brain MRI scans. International Journal of Imaging Systems and Technology 24 (2):129–137.
  • Mukund Wagh, B., and N. Gomathi. 2019. Improved GWO-CS algorithm-based optimal routing strategy in VANET. Journal of Networking and Communication Systems 2 (1):34–42.
  • Neeraj, K., and N. Chilamkurti. 2014. Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering 40 (6):1981–96. doi:10.1016/j.compeleceng.2014.01.009.
  • Ninu Preetha, N. S., G. Brammya, R. Ramya, S. Praveena, D. Binu, and B. R. Rajakumar. 2018. Grey wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometrics 7 (5):490–9.
  • Poongodi, M., M. Hamdi, A. Sharma, M. Ma, and P. K. Singh. 2019. DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access 7:183532–44. doi:10.1109/ACCESS.2019.2960367.
  • Raghad, B., O. Alhussein, H. Otrok, and S. Muhaidat. 2016. Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET. Vehicular Communications 5:9–17.
  • Rajakumar, B. R. 2013. Impact of static and adaptive mutation techniques on genetic algorithm. International Journal of Hybrid Intelligent Systems 10 (1):11–22. doi:10.3233/HIS-120161.
  • Rajakumar, B. R. 2018. Optimization using lion algorithm: A biological inspiration from lion’s social behavior. Evolutionary Intelligence, Special Issue on Nature Inspired Algorithms for High Performance Computing in Computer Vision 11:1–2.
  • Sedjelmaci, S., I. H. Brahmi, N. Ansari, and M. H. Rehmani. 2021. Cyber security framework for vehicular network based on a hierarchical game. IEEE Transactions on Emerging Topics in Computing 9 (1):429–40. doi:10.1109/TETC.2018.2890476.
  • Sparsh, S., and A. Kau. 2018. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular Communications 12:138–64. doi:10.1016/j.vehcom.2018.04.005.
  • Sparsh, S., and A. Kaul. 2018. Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET. Vehicular Communications 12:23–38. doi:10.1016/j.vehcom.2017.12.003.
  • Tanweer, M. R., S. Suresh, and N. Sundararajan. 2015. Self regulating particle swarm optimization algorithm. Information Sciences 294:182–202. doi:10.1016/j.ins.2014.09.053.
  • Veeraiah, N., and B. T. Krishna. 2018. Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naive Bayes rule. Multimedia Research 1 (1):27–32.
  • Wang, J., H. Chen, and Z. Sun. 2020. Context-aware quantification for VANET security: A Markov chain-based scheme. IEEE Access. 8:173618–26. doi:10.1109/ACCESS.2020.3017557.
  • Wei, L., J. Cui, Y. Xu, J. Cheng, and H. Zhong. 2021. Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs. IEEE Transactions on Information Forensics and Security 16:1681–95. doi:10.1109/TIFS.2020.3040876.
  • Zaidi, K., M. B. Milojevic, V. Rakocevic, A. Nallanathan, and M. Rajarajan. 2016. Host-based intrusion detection for VANETs: A statistical approach to rogue node detection. IEEE Transactions on Vehicular Technology 65 (8):6703–14. doi:10.1109/TVT.2015.2480244.
  • Zhang, T., and Q. Zhu. 2018. Distributed privacy-preserving collaborative intrusion detection systems for VANETs. IEEE Transactions on Signal and Information Processing over Networks 4 (1):148–61. doi:10.1109/TSIPN.2018.2801622.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.