Open Access   Article Go Back

IDS Vehicle Attack Detection and Prevention using Network Environment

Prajwal Gaikwad1 , Palash Saroware2 , Akshata Gaikwad3 , Shubhangi Tudme4 , Kajal Pardeshi5

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 1041-1046, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.10411046

Online published on Apr 30, 2019

Copyright © Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi, “IDS Vehicle Attack Detection and Prevention using Network Environment,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1041-1046, 2019.

MLA Style Citation: Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi "IDS Vehicle Attack Detection and Prevention using Network Environment." International Journal of Computer Sciences and Engineering 7.4 (2019): 1041-1046.

APA Style Citation: Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi, (2019). IDS Vehicle Attack Detection and Prevention using Network Environment. International Journal of Computer Sciences and Engineering, 7(4), 1041-1046.

BibTex Style Citation:
@article{Gaikwad_2019,
author = {Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi},
title = {IDS Vehicle Attack Detection and Prevention using Network Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1041-1046},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4163},
doi = {https://doi.org/10.26438/ijcse/v7i4.10411046}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.10411046}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4163
TI - IDS Vehicle Attack Detection and Prevention using Network Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Prajwal Gaikwad, Palash Saroware, Akshata Gaikwad, Shubhangi Tudme, Kajal Pardeshi
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1041-1046
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
2041 241 downloads 164 downloads
  
  
           

Abstract

We have been witnessing a continual transformation of the automotive industry, whereby new technologies are integrated into the vehicles, changing the traditional concept as we know it and improving safety, performance and efficiency. The vehicular revolution is fuelling the automotive industries, most significant transformation seen in decades. However, as modern vehicles become more connected they also become much more vulnerable to cyber-attacks. A fully working Intrusion Detection System approach is proposed to protect connected vehicles (fleets and individuals) against such attacks. We present a new approach for detecting anomalies, tailored to the temporal nature of our domain. However, as vehicles become more connected, they also become more vulnerable to remote cyber-attacks, as researchers have recently been pointing out. It is demonstrated how, in cases where it is possible to compromise cars internal network, it becomes possible to control a wide range of essential functions: disabling the brakes, selectively braking individual wheels, stopping the engine, etc.

Key-Words / Index Term

Intrusion Detection, Anomaly Detection, IDS systems and platforms, Vehicle Network Security

References

[1] Bayrem Triki, Slim Rekhis, Mhamed Chammem, Noureddine Boudriga, “A privacy preseriving solution for the protection against Sybil attacks in vehicular adhoc networks”, Wireless and Mobile Networking Conference, 2013.
[2] Chen Chen, Xin Wang, Weili Han, Binyu Zang, “A robust detection of the Sybil attack in urban VANETs”, ICDCS Workshop 2009.
[3] W. Chang, J. Wu, “A survey of Sybil attack in Networks”, .Sensor Networks for Sustainable Development, CRC Press.
[4] S. Park, B. Aslam, D. Turgut, Cliff C. Zou, “Defence Against Sybil Attack in Vehicular Ad-hoc Network Based on Roadside Unit Support”, In MILCOM, pages
1-7, 2009.
[5] Bo Yu, Chang-Zhong Xu, Bin Xiao, “Detecting Sybil Attacks in VANETs”, In: Journal of Parallel and Distributed Computing 73.6 (2013), pp. 746 –756.
[6] Mina Rahbari, Mohammad Ali Jabreil Jamali, “Efficient Detection of Sybil Attack Based on Cryptography in VANET”, International Journal of Network Security &
Its Applications (IJNSA) (November 2011).
[7] Shan Chang, Yong Qi, Hongzi Zhu,Jizhong Zhao, Xuemin(Sherman) Shen, “Footprint: Detecting Sybil Attacks in Urban Vehicular Networks”, Parallel and
Distributed Systems, IEEE Transactions on, vol. 23. no. 6, 2012, pp. 1103-1114; DOI 10.1109/tpds.2011.263.
[8] Kenza Mekliche, Dr. Samira Moussaoui, “L-P2DSA: Location-based Privacy-Preserving Detection of Sybil Attacks”, 11th international symposium on programming
and systems (April 2013), pp. 187-192.
[9] Rasheed Hussain, Heekuck oh, “On Secure and Privacy Aware Sybil Attack Detection in Communication”, In Journal of Wireless Personal Communication, DOI: 10.1007/s11277-014-1659-5.
[10] Tong Zhou, Romit R. Choudhury, P. Ning, K. Chakrabarty, “P2DAP- Sybil Attacks Detection in Vehicular Ad-hoc Networks”, IEEE Journal on Selected Areas in Communications 29(3), 582–594 (2011).