Loading…

Complex attack detection scheme using history trajectory in internet of vehicles

The internet of vehicles technology provides convenience to drivers and prevents traffic accidents via wireless communication between road infrastructure and autonomous vehicles by sharing real-time traffic information. However, attackers can easily penetrate networks by exploiting the vulnerabiliti...

Full description

Saved in:
Bibliographic Details
Published in:Egyptian informatics journal 2022-09, Vol.23 (3), p.499-510
Main Authors: Chung, Wonjin, Cho, Taeho
Format: Article
Language:English
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c358t-4dab7b38837b7fe19e32be3506412f1f8a18ebb1fd3b0452fee5b26ffb5fe5663
container_end_page 510
container_issue 3
container_start_page 499
container_title Egyptian informatics journal
container_volume 23
creator Chung, Wonjin
Cho, Taeho
description The internet of vehicles technology provides convenience to drivers and prevents traffic accidents via wireless communication between road infrastructure and autonomous vehicles by sharing real-time traffic information. However, attackers can easily penetrate networks by exploiting the vulnerabilities of wireless communications. An attacker can falsify real-time traffic information and transmit it to a vehicle, causing traffic jams or preventing autonomous vehicles from receiving legitimate real-time traffic information. If autonomous vehicles do not receive accurate information, the arrival time at the destination can be affected, and accidents due to incorrect driving can occur. Because traffic accidents can cause casualties, they must be prevented. Various schemes have been proposed to detect attacks that occur on the internet of vehicles, and these security schemes can prevent traffic accidents by detecting attacks at high speeds. However, the existing schemes focus on quickly identifying a single attack but encounter difficulties when attempting to detect complex attacks that occur simultaneously. The proposed scheme uses a history trajectory to detect complex attacks. The proposed scheme stores behavioral information on all vehicles and road infrastructure using a control center. This information becomes a history trajectory that is used to detect attacks. Thereafter, when the vehicle is abnormally driven, the control center analyzes its driving path. When analyzing the vehicle driving process, the control center determines that an attack is being attempted when the road infrastructure or a vehicle makes an erroneous state transition. In addition, the type of attack is analyzed to identify compromised vehicles or road infrastructure and take measures to prevent further problems. Thus, the proposed scheme can detect complex attacks through history trajectory analysis. The experimental results demonstrate that in 80% of attempted attacks, the proposed scheme detects complex attacks with a probability of 97.56%.
doi_str_mv 10.1016/j.eij.2022.05.002
format article
fullrecord <record><control><sourceid>elsevier_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_6c42755e47d54e4493a948eced1c8f52</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1110866522000305</els_id><doaj_id>oai_doaj_org_article_6c42755e47d54e4493a948eced1c8f52</doaj_id><sourcerecordid>S1110866522000305</sourcerecordid><originalsourceid>FETCH-LOGICAL-c358t-4dab7b38837b7fe19e32be3506412f1f8a18ebb1fd3b0452fee5b26ffb5fe5663</originalsourceid><addsrcrecordid>eNp9kF1LwzAUhoMoOOZ-gHf9A635botXMvyCgV7odUjSky11a0cSh_v3pk68NBzI4YT34eRB6JrgimAib_oKfF9RTGmFRYUxPUMziltc8lrwczQjhOCykVJcokWMPc5HEsqFnKHX5bjbb-Gr0Clp-1F0kMAmPw5FtBvYQfEZ_bAuNj6mMRyLFHSf36fWD7kShAFSMbriABtvtxCv0IXT2wiL33uO3h_u35ZP5erl8Xl5tyotE00qeadNbVjTsNrUDkgLjBpgAktOqCOu0aQBY4jrmMFcUAcgDJXOGeFASMnm6PnE7Ubdq33wOx2OatRe_QzGsFY6pGklJS2ntRDA605w4LxluuUNWOiIbZygmUVOLBvGGAO4Px7BajKsepUNq8mwwkJlwzlze8pA_uTBQ1DRehgy1IdsKG_h_0l_A7tMhK0</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Complex attack detection scheme using history trajectory in internet of vehicles</title><source>ScienceDirect Freedom Collection</source><creator>Chung, Wonjin ; Cho, Taeho</creator><creatorcontrib>Chung, Wonjin ; Cho, Taeho</creatorcontrib><description>The internet of vehicles technology provides convenience to drivers and prevents traffic accidents via wireless communication between road infrastructure and autonomous vehicles by sharing real-time traffic information. However, attackers can easily penetrate networks by exploiting the vulnerabilities of wireless communications. An attacker can falsify real-time traffic information and transmit it to a vehicle, causing traffic jams or preventing autonomous vehicles from receiving legitimate real-time traffic information. If autonomous vehicles do not receive accurate information, the arrival time at the destination can be affected, and accidents due to incorrect driving can occur. Because traffic accidents can cause casualties, they must be prevented. Various schemes have been proposed to detect attacks that occur on the internet of vehicles, and these security schemes can prevent traffic accidents by detecting attacks at high speeds. However, the existing schemes focus on quickly identifying a single attack but encounter difficulties when attempting to detect complex attacks that occur simultaneously. The proposed scheme uses a history trajectory to detect complex attacks. The proposed scheme stores behavioral information on all vehicles and road infrastructure using a control center. This information becomes a history trajectory that is used to detect attacks. Thereafter, when the vehicle is abnormally driven, the control center analyzes its driving path. When analyzing the vehicle driving process, the control center determines that an attack is being attempted when the road infrastructure or a vehicle makes an erroneous state transition. In addition, the type of attack is analyzed to identify compromised vehicles or road infrastructure and take measures to prevent further problems. Thus, the proposed scheme can detect complex attacks through history trajectory analysis. The experimental results demonstrate that in 80% of attempted attacks, the proposed scheme detects complex attacks with a probability of 97.56%.</description><identifier>ISSN: 1110-8665</identifier><identifier>EISSN: 2090-4754</identifier><identifier>DOI: 10.1016/j.eij.2022.05.002</identifier><language>eng</language><publisher>Elsevier B.V</publisher><ispartof>Egyptian informatics journal, 2022-09, Vol.23 (3), p.499-510</ispartof><rights>2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c358t-4dab7b38837b7fe19e32be3506412f1f8a18ebb1fd3b0452fee5b26ffb5fe5663</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S1110866522000305$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,3549,27924,27925,45780</link.rule.ids></links><search><creatorcontrib>Chung, Wonjin</creatorcontrib><creatorcontrib>Cho, Taeho</creatorcontrib><title>Complex attack detection scheme using history trajectory in internet of vehicles</title><title>Egyptian informatics journal</title><description>The internet of vehicles technology provides convenience to drivers and prevents traffic accidents via wireless communication between road infrastructure and autonomous vehicles by sharing real-time traffic information. However, attackers can easily penetrate networks by exploiting the vulnerabilities of wireless communications. An attacker can falsify real-time traffic information and transmit it to a vehicle, causing traffic jams or preventing autonomous vehicles from receiving legitimate real-time traffic information. If autonomous vehicles do not receive accurate information, the arrival time at the destination can be affected, and accidents due to incorrect driving can occur. Because traffic accidents can cause casualties, they must be prevented. Various schemes have been proposed to detect attacks that occur on the internet of vehicles, and these security schemes can prevent traffic accidents by detecting attacks at high speeds. However, the existing schemes focus on quickly identifying a single attack but encounter difficulties when attempting to detect complex attacks that occur simultaneously. The proposed scheme uses a history trajectory to detect complex attacks. The proposed scheme stores behavioral information on all vehicles and road infrastructure using a control center. This information becomes a history trajectory that is used to detect attacks. Thereafter, when the vehicle is abnormally driven, the control center analyzes its driving path. When analyzing the vehicle driving process, the control center determines that an attack is being attempted when the road infrastructure or a vehicle makes an erroneous state transition. In addition, the type of attack is analyzed to identify compromised vehicles or road infrastructure and take measures to prevent further problems. Thus, the proposed scheme can detect complex attacks through history trajectory analysis. The experimental results demonstrate that in 80% of attempted attacks, the proposed scheme detects complex attacks with a probability of 97.56%.</description><issn>1110-8665</issn><issn>2090-4754</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>DOA</sourceid><recordid>eNp9kF1LwzAUhoMoOOZ-gHf9A635botXMvyCgV7odUjSky11a0cSh_v3pk68NBzI4YT34eRB6JrgimAib_oKfF9RTGmFRYUxPUMziltc8lrwczQjhOCykVJcokWMPc5HEsqFnKHX5bjbb-Gr0Clp-1F0kMAmPw5FtBvYQfEZ_bAuNj6mMRyLFHSf36fWD7kShAFSMbriABtvtxCv0IXT2wiL33uO3h_u35ZP5erl8Xl5tyotE00qeadNbVjTsNrUDkgLjBpgAktOqCOu0aQBY4jrmMFcUAcgDJXOGeFASMnm6PnE7Ubdq33wOx2OatRe_QzGsFY6pGklJS2ntRDA605w4LxluuUNWOiIbZygmUVOLBvGGAO4Px7BajKsepUNq8mwwkJlwzlze8pA_uTBQ1DRehgy1IdsKG_h_0l_A7tMhK0</recordid><startdate>202209</startdate><enddate>202209</enddate><creator>Chung, Wonjin</creator><creator>Cho, Taeho</creator><general>Elsevier B.V</general><general>Elsevier</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope></search><sort><creationdate>202209</creationdate><title>Complex attack detection scheme using history trajectory in internet of vehicles</title><author>Chung, Wonjin ; Cho, Taeho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c358t-4dab7b38837b7fe19e32be3506412f1f8a18ebb1fd3b0452fee5b26ffb5fe5663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chung, Wonjin</creatorcontrib><creatorcontrib>Cho, Taeho</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>Directory of Open Access Journals</collection><jtitle>Egyptian informatics journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chung, Wonjin</au><au>Cho, Taeho</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Complex attack detection scheme using history trajectory in internet of vehicles</atitle><jtitle>Egyptian informatics journal</jtitle><date>2022-09</date><risdate>2022</risdate><volume>23</volume><issue>3</issue><spage>499</spage><epage>510</epage><pages>499-510</pages><issn>1110-8665</issn><eissn>2090-4754</eissn><abstract>The internet of vehicles technology provides convenience to drivers and prevents traffic accidents via wireless communication between road infrastructure and autonomous vehicles by sharing real-time traffic information. However, attackers can easily penetrate networks by exploiting the vulnerabilities of wireless communications. An attacker can falsify real-time traffic information and transmit it to a vehicle, causing traffic jams or preventing autonomous vehicles from receiving legitimate real-time traffic information. If autonomous vehicles do not receive accurate information, the arrival time at the destination can be affected, and accidents due to incorrect driving can occur. Because traffic accidents can cause casualties, they must be prevented. Various schemes have been proposed to detect attacks that occur on the internet of vehicles, and these security schemes can prevent traffic accidents by detecting attacks at high speeds. However, the existing schemes focus on quickly identifying a single attack but encounter difficulties when attempting to detect complex attacks that occur simultaneously. The proposed scheme uses a history trajectory to detect complex attacks. The proposed scheme stores behavioral information on all vehicles and road infrastructure using a control center. This information becomes a history trajectory that is used to detect attacks. Thereafter, when the vehicle is abnormally driven, the control center analyzes its driving path. When analyzing the vehicle driving process, the control center determines that an attack is being attempted when the road infrastructure or a vehicle makes an erroneous state transition. In addition, the type of attack is analyzed to identify compromised vehicles or road infrastructure and take measures to prevent further problems. Thus, the proposed scheme can detect complex attacks through history trajectory analysis. The experimental results demonstrate that in 80% of attempted attacks, the proposed scheme detects complex attacks with a probability of 97.56%.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.eij.2022.05.002</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1110-8665
ispartof Egyptian informatics journal, 2022-09, Vol.23 (3), p.499-510
issn 1110-8665
2090-4754
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_6c42755e47d54e4493a948eced1c8f52
source ScienceDirect Freedom Collection
title Complex attack detection scheme using history trajectory in internet of vehicles
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T22%3A23%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Complex%20attack%20detection%20scheme%20using%20history%20trajectory%20in%20internet%20of%20vehicles&rft.jtitle=Egyptian%20informatics%20journal&rft.au=Chung,%20Wonjin&rft.date=2022-09&rft.volume=23&rft.issue=3&rft.spage=499&rft.epage=510&rft.pages=499-510&rft.issn=1110-8665&rft.eissn=2090-4754&rft_id=info:doi/10.1016/j.eij.2022.05.002&rft_dat=%3Celsevier_doaj_%3ES1110866522000305%3C/elsevier_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c358t-4dab7b38837b7fe19e32be3506412f1f8a18ebb1fd3b0452fee5b26ffb5fe5663%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true