Alheeti, KMA and Al-ani, MS and McDonald-Maier, KD (2018) A hierarchical detection method in external communication for self-driving vehicles based on TDMA. PLoS ONE, 13 (1). e0188760-e0188760. DOI https://doi.org/10.1371/journal.pone.0188760
Alheeti, KMA and Al-ani, MS and McDonald-Maier, KD (2018) A hierarchical detection method in external communication for self-driving vehicles based on TDMA. PLoS ONE, 13 (1). e0188760-e0188760. DOI https://doi.org/10.1371/journal.pone.0188760
Alheeti, KMA and Al-ani, MS and McDonald-Maier, KD (2018) A hierarchical detection method in external communication for self-driving vehicles based on TDMA. PLoS ONE, 13 (1). e0188760-e0188760. DOI https://doi.org/10.1371/journal.pone.0188760
Abstract
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Cluster Analysis; Communication; Algorithms; Automobile Driving; Computer Security; Computer Communication Networks |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science T Technology > TL Motor vehicles. Aeronautics. Astronautics |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 16 Jan 2018 09:51 |
Last Modified: | 30 Oct 2024 19:35 |
URI: | http://repository.essex.ac.uk/id/eprint/21158 |
Available files
Filename: journal.pone.0188760.pdf
Licence: Creative Commons: Attribution 3.0