Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Securing solar energy-harvesting road-side unit using an embedded cooperative-hybrid intrusion detection system

This study deals with the design and implementation of an Embedded Cooperative-Hybrid Intrusion Detection System (ECHIDS) for a solar energy harvested Road Side Unit(RSU). In order to offer a high level of defense against the various attacks and to cope against the limited processing and energy resources of RSU, we suggest a cooperative IDS approach. In this approach, the RSUs do not depend only on their local view to make conclusions about the security status of their network, but also cooperate with their VANET server by exchanging security reports to create a more global and precise idea about the security situation of the whole network, the possible attacks and their origins. The other main contribution in this paper is the attempt to insert a Hybrid Intrusion Detection System functionality (combines all the three IDS techniques :signature based IDS, anomaly based IDS and behavioral based IDS) into the RSU itself. Each one of these IDSs has its own resistance strategy against certain classes of attacks which enhances RSUs’ immunity. The suggested IDS was prototyped using an experimental model based on the Ubicom IP2022 network processor development kit and different practical tests were performed to evaluate the effectiveness of the suggested solutions.

References

    1. 1)
      • 13. Xiao, K., Zheng, J., Wang, X., et al: ‘A novel peer-to-peer intrusion detection system using mobile agents in MANETs’. Sixth Int. Conf. on Parallel and Distributed Computing, Applications and Technologies, 2005.
    2. 2)
      • 5. Filippini, I., Malandrino, F., Cesana, M., et al: ‘Non-cooperative RSU deployment in vehicular networks’. WONS Conf., 2012.
    3. 3)
      • 9. Nasser, N., Chen, Y.: ‘Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks’. ICC 2007 Conf., 2007.
    4. 4)
      • 26. Liao, C., Chang, J., Lee, I., et al: ‘A trust model for vehicular network-based incident reports’. 2013 IEEE Fifth Int. Symp. on Wireless Vehicular Communications (WiVeC), Dresden, 2013.
    5. 5)
      • 21. Meyer, N., Njeukam, J., Petit, J., et al: ‘Central misbehavior evaluation for VANETs based on mobility data plausibility’. Proc. Ninth ACM Int. Workshop on Vehicular Inter-Networking, Systems, and Applications – VANET'12, 2012.
    6. 6)
      • 23. Chang, S., Qi, Y., Zhu, H., et al: ‘Footprint: detecting Sybil attacks in urban vehicular networks’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, pp. 11031114.
    7. 7)
      • 19. Erritali, M., El Ouahidi, B.: ‘A survey on VANET intrusion detection systems’. Proc. 2013 Int. Conf. on Systems, Control, Signal Processing and Informatics, 2013.
    8. 8)
      • 8. Michiardi, P., Molva, R.: ‘Core A collaborative reputation mechanism to enforce node cooperation in MANET’. Communication and Multimedia Security Conf. (CMCS'02), September 2002.
    9. 9)
      • 29. Ali, Q.I., Lazim, S., Fathi, E.: ‘Securing wireless sensor network (WSN) using embedded intrusion detection systems’, IJEEE J., 2012, 8 (1), pp. 5464.
    10. 10)
      • 6. Buchgger, S., Le Boudec, J.: ‘Performance analysis of the CONFIDANT protocol’. Proc. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc'02), Lausanne, Switzerland, June 2002, pp. 226336.
    11. 11)
      • 39. Singh, R., Singh, J.: ‘A performance metrics scorecard based approach to intrusion detection system evaluation for wireless network’, Glob. J. Comput. Sci. Technol. Netw. Web Secur., 2012, 12, (12), pp. 6678.
    12. 12)
      • 34. Zhang, L., Elsayed, H., Barka, E.: ‘A novel location service protocol in multi-hop clustering vehicular Ad Hoc networks’. Proc. Int. Conf. Innovations in Information Technology (IIT), 2011, pp. 386391.
    13. 13)
      • 36. Samara, G., Al-Salihy, W.A.H., Sures, R.: ‘Security issues and challenges of vehicular ad hoc networks (VANET)’. Fourth Int. Conf. on New Trends in Information Science and Service Science (NISS), 2010.
    14. 14)
      • 16. Marti, S., Giuli, T.J., Lai, K., et al: ‘Mitigating routing misbehavior in mobile ad hoc networks’. Proc. Sixth Annual ACM/IEEE Int. Conf. on Mobile Computing and Networking, 2000, pp. 255265.
    15. 15)
      • 28. Gerlach, M.: ‘Trust for vehicular applications’. Eighth Int. Symp. on Autonomous Decentralized Systems (ISADS'07), Sedona, 2007.
    16. 16)
      • 2. Barrachina, J., Garrido, P., Fogue, M., et al: ‘Road side unit deployment: a density-based approach’, IEEE Intell. Transp. Syst. Mag., 2013, 5, pp. 3039.
    17. 17)
      • 27. Zhang, J.: ‘A survey on trust management for VANETs’. 2011 IEEE Int. Conf. Advanced Information Networking and Applications (AINA), Biopolis, 2013.
    18. 18)
      • 40. Fink, G.A., Chappell, B.L., Turner, T.G., et al: ‘A metrics-based approach to intrusion detection system evaluation for distributed real-time systems’. WPDRTS Conf., 2002.
    19. 19)
      • 38. Ali, Q.I., Faher, F.: ‘Evaluation of routing protocols of wireless ad hoc for SCADA systems using OPNET simulator’. Second Scientific and Engineering Conf., 2013.
    20. 20)
      • 4. Ali, Q.I.: ‘Security issues of solar energy harvesting road side unit (RSU)’, IJEEE J., 2015, 11 (1), pp. 1831.
    21. 21)
      • 12. Krügel, C., Toth, T.: ‘Flexible, mobile agent based intrusion detection for dynamic networks’ (European Wireless, 2002).
    22. 22)
      • 25. Roman, J.: ‘Trust and reputation systems for wireless sensor networks’ (Troubador Publishing, 2009).
    23. 23)
      • 14. Gómez, J., Gil, C., Padilla, N., et al: ‘Design of a snort-based hybrid intrusion detection system’. IWANN 2009, 2009.
    24. 24)
      • 24. Bouassida, M.S., Guette, G., Shawky, M., et al: ‘Sybil nodes detection based on received signal strength variations within VANET’, Int. J. Netw. Secur., 2009, 9, (1), pp. 2233.
    25. 25)
      • 11. Kachirski, O., Guha, R.: ‘Effective intrusion detection using multiple sensors in wireless ad hoc networks’. 36th Annual Hawaii Int. Conf. on System Sciences, 2003.
    26. 26)
      • 37. Blum, L., Blum, M., Shub, M.: ‘A simple unpredictable pseudorandom number generator’, SIAM J. Comput., 1986, 15, (2), pp. 364383.
    27. 27)
      • 22. Grover, J., Laxmi, V., Gaur, M.: ‘Misbehavior detection based on ensemble learning in VANET’. inAdvanced Computing, Networking and Security, ser. Lecture Notes in Computer Science, (Springer, Berlin, Heidelberg, 2012), vol. 7135.
    28. 28)
      • 10. Huang, Y., Lee, W.: ‘A cooperative intrusion detection system for ad hoc networks’. First ACM Workshop Security of Ad Hoc and Sensor Networks, Fairfax, VA, 2003.
    29. 29)
      • 17. Kaur, H., Batish, S., Kakaria, A.: ‘An approach to detect the wormhole attack in vehicular ad hoc networkInt. J. Smart Sens. Ad Hoc Netw., 2012, 4, pp. 8689.
    30. 30)
      • 15. Aydın, M.A., Zaim, A.H., Ceylan, K.G.: ‘A hybrid intrusion detection system design for computer network security’, Comput. Electr. Eng. J., 2009, 35, pp. 517526.
    31. 31)
      • 32. Marti, S., Giuli, T.J., Lai, K., et al: ‘Mitigating routing misbehavior in mobile ad hoc networks’. Proc. Sixth Annual Int. Conf. on Mobile Computing and Networking (MobiCom'00), 2000, pp. 255265.
    32. 32)
      • 3. Ali, Q.I.: ‘Design, implementation & optimization of an energy harvesting system for VANETS’ road side units (RSU)’, IET Intell. Transp. Syst., 2014, 8, (3), pp. 298307.
    33. 33)
      • 31. Yasdi, R.: ‘Prediction of road traffic using a Neural Network Approach’, Neural Comput. Appl., 1999, 8, pp. 135142.
    34. 34)
      • 18. Sinha, A., Mishra, S.K.: ‘Preventing VANET from DOS & DDOS attack’, Int. J. Eng. Trends Technol., 2013, 4 (10), pp. 19.
    35. 35)
      • 35. Raya, M., Hubaux, J.-P.: ‘Securing vehicular ad hoc networks’, J. Comput. Secur., 2007, 15, pp. 3968.
    36. 36)
      • 1. Wu, T., Liao, W., Chang, C.: ‘A cost-effective strategy for road-side unit placement in vehicular networks’, IEEE Trans. Commun., 2012, 60, (8), pp. 22952303.
    37. 37)
      • 7. Zhang, Y., Lee, W.: ‘Intrusion detection in wireless ad hoc networks’. Sixth Int. Conf. on Mobile Computing and Networking, August 2000, pp. 275283.
    38. 38)
      • 30. Ali, Q.I., Lazim, S.: ‘Design & implementation of an embedded intrusion detection system for wireless applications’, IET Inf. Secur. J., 2012, 6, (3), pp. 171182.
    39. 39)
      • 20. Sharma, S., Sisodia, M.: ‘Network intrusion detection by using supervised and unsupervised machine learning techniques: a survey’, Int. J. Comput. Technol. Electron. Eng., 2011, 1 , pp. 1222.
    40. 40)
      • 33. Wang, Z., Liu, L., Zhou, M., et al: ‘A position-based clustering technique for ad hoc intervehicle communication’, IEEE Trans. Syst. Man Cybern. C, 2008, 38, (2), pp. 201208.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2014.0456
Loading

Related content

content/journals/10.1049/iet-ifs.2014.0456
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address