Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
Tài liệu tham khảo
K.M.A. Alheeti, A. Gruebler, K. D. McDonald-Maier, An intrusion detection system against malicious attacks on the communication network of driverless cars, in: 2015 Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), IEEE, 2015, pp. 916–921.
M.O. Cherif, Optimization of v2v and v2i communications in an operated vehicular network, France (2010) (Ph.D. thesis).
Saleem, 2015, Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges, J. Netw. Comput. Appl., 50, 15, 10.1016/j.jnca.2014.12.002
Cherif, 2013, Efficient data dissemination in cooperative vehicular networks, Wirel. Commun. Mob. Comput., 13, 1150, 10.1002/wcm.1171
T. Umer, M. Amjad, N. Shah, Z. Ding, Modeling vehicles mobility for connectivity analysis in vanet, in: Intelligent Transportation Systems, Springer, 2016, pp. 221–239.
H. Sedjelmaci, T. Bouali, S.M. Senouci, Detection and prevention from misbehaving intruders in vehicular networks, in: 2014 IEEE Global Communications Conference, IEEE, 2014, pp. 39–44.
H. Sedjelmaci, S.M. Senouci, A new intrusion detection framework for vehicular networks, in: 2014 IEEE International Conference on Communications (ICC), IEEE, 2014, pp. 538–543.
Sedjelmaci, 2013, An efficient intrusion detection framework in cluster-based wireless sensor networks, Secur. Commun. Netw., 6, 1211, 10.1002/sec.687
S. Yousefi, M.S. Mousavi, M. Fathy, Vehicular ad hoc networks (vanets): challenges and perspectives, in: 2006 Proceedings of the 6th International Conference on ITS Telecommunications, IEEE, 2006, pp. 761–766.
Hu, 2003, Sead: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad hoc Netw., 1, 175, 10.1016/S1570-8705(03)00019-2
Hu, 2005, Ariadne: a secure on-demand routing protocol for ad hoc networks, Wirel. Netw., 11, 21, 10.1007/s11276-004-4744-y
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, A secure routing protocol for ad hoc networks, in: Network Protocols, 2002. Proceedings. in: Proceedings of the 10th IEEE International Conference on, IEEE, 2002, pp. 78–87.
S. Yi, P. Naldurg, R. Kravets, Security-aware ad hoc routing for wireless networks, in: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, ACM, 2001, pp. 299–302.
A. A. Pirzada, C. McDonald, Secure routing protocols for mobile ad hoc wireless networks, Advanced Wired and Wireless Networks.
P. Papadimitratos, Z. J. Haas, Secure routing for mobile ad hoc networks, in: the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002, 2002, pp. 193–204.
Zapata, 2002, Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mob. Comput. Commun. Rev., 6, 106, 10.1145/581291.581312
P. Papadimitratos, Z.J. Haas, Secure link state routing for mobile ad hoc networks, in: Proceedings of the IEEE Symposium on Applications and the Internet Workshops, 2003, pp. 379–383.
B. Lu, U. W. Pooch, Cooperative security-enforcement routingin mobile ad hoc networks, in: IEEE 4th International Workshop on Mobile andWireless Communications Network, 2002, pp. 157–161.
S.S. Doumit, D.P. Agrawal, Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks, in: IEEE Military Communications Conference, MILCOM’03, 2003, vol. 1, 2003, pp. 609–614.
Shin, 2010, An experimental study of hierarchical intrusion detection for wireless industrial sensor networks, IEEE Trans. Ind. Inform., 6, 744, 10.1109/TII.2010.2051556
Akan, 2009, Cognitive radio sensor networks, IEEE Netw., 23, 34, 10.1109/MNET.2009.5191144
K.M.A. Alheeti, A. Gruebler, K.D. McDonald-Maier, A. Fernando, Prediction of dos attacks in external communication for self-driving vehicles using a fuzzy petri net model, in: 2016 IEEE International Conference on Consumer Electronics (ICCE), 2016, pp. 502–503.
A. Mitrokotsa, R. Mavropodi, C. Douligeris, Intrusion detection of packet dropping attacks in mobile ad hoc networks, in: Proceedings of the International Conference on Intelligent Systems And Computing: Theory And Applications, 2006, pp. 111–118.
A. Chaudhary, V. Tiwari, A. Kumar, Design an anomaly based fuzzy intrusion detection system for packet dropping attack in mobile ad hoc networks, in: IEEE International Advance Computing Conference (IACC), 2014, pp. 256–261.
C. A. Kerrache, A. Lakas, N. Lagraa, Detection of intelligent malicious and selfish nodes in vanet using threshold adaptive control, in: Electronic Devices, Systems and Applications (ICEDSA), 2016 Proceedings of the 5th International Conference on, IEEE, 2016, pp. 1–4.
K. Zaidi, M. Milojevic, V. Rakocevic, A. Nallanathan, M. Rajarajan, Host based intrusion detection for vanets: A statistical approach to rogue node detection.
K.M.A. Alheeti, A. Gruebler, K.D. McDonald-Maier, On the detection of grey hole and rushing attacks in self-driving vehicular networks, in: 7th IEEE Computer Science and Electronic Engineering Conference (CEEC), 2015, pp. 231–236.
R. Coussement, B. Amar Bensaber, I. Biskri, Decision support protocol for intrusion detection in vanets, in: Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, ACM, 2013, pp. 31–38.
R. Baiad, H. Otrok, S. Muhaidat, J. Bentahar, Cooperative cross layer detection for blackhole attack in vanet-olsr, in: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, 2014, pp. 863–868.
T.K. Marve, N.U. Sambhe, A review on cross layer intrusion detection system in wireless ad hoc network, in: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2015, pp. 1–4.
R. Shrestha, K.-H. Han, D.-Y. Choi, S.-J. Han, A novel cross layer intrusion detection system in manet, in: Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, pp. 647–654.
Akyildiz, 2006, Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey, Comput. Netw., 50, 2127, 10.1016/j.comnet.2006.05.001
R.H.S. driving Car Sensors, Researcher Hacks Self-driving Car Sensors, 〈http://spectrum.ieee.org/cars-that-think/transportation/self-driving/researcher-hacks-selfdriving-car-sensors〉, March 2015.
G. Samara, W.A. Al-Salihy, R. Sures, Security issues and challenges of vehicular ad hoc networks (vanet), in: Proceedings of the 4th International Conference on New Trends in Information Science and Service Science (NISS), 2010, pp. 393–398.
Mejri, 2014, Survey on vanet security challenges and possible cryptographic solutions, Veh. Commun., 1, 53, 10.1016/j.vehcom.2014.05.001
D. Tian, Y. Wang, G. Lu, G. Yu, A vehicular ad hoc networks intrusion detection system based on busnet, in: Proceedings of the 2nd International Conference on Future Computer and Communication (ICFCC), vol. 1, 2010, pp. V1-225.
R. Bronte, H. Shahriar, H.M. Haddad, A signature-based intrusion detection system for web applications based on genetic algorithm, in: Proceedings of the 9th International Conference on Security of Information and Networks, ACM, 2016, pp. 32–39.
Ping, 2008, Distributed intrusion detection for mobile ad hoc networks, J. Syst. Eng. Electron., 19, 851, 10.1016/S1004-4132(08)60163-2
T.N.S. ns 2, The network Simulator - ns-2, www.isi.edu/nsnam/ns (June 2014).
Harri, 2009, Mobility models for vehicular ad hoc networks: a survey and taxonomy, IEEE Commun. Surv. Tutor., 11, 19, 10.1109/SURV.2009.090403
C..C.C. Consortium, Car 2 car communication consortium, www.car-2-car.org/index.php?Id=5 (June 2011).
Rashid, 2016, Applications of wireless sensor networks for urban areas: a survey, J. Netw. Comput. Appl., 60, 192, 10.1016/j.jnca.2015.09.008
J. Breu, A. Brakemeier, M. Menth, Analysis of cooperative awareness message rates in vanets, in: Proceedings of the 13th International Conference on ITS Telecommunications (ITST), 2013, pp. 8–13.
S. Chettibi, Y. Labeni, A. Boulkour, Trace file analyzer for ad hoc routing protocols simulation with ns2, in: 2015 Proceedings of the First International Conference on New Technologies of Information and Communication (NTIC), 2015, pp. 1–6.
Using artificial intelligence to create a low cost self-driving car, 〈http://budisteanu.net/Download/ISEF20220Autonomous20car20Doc20particle.pdf〉 (Jule 2015).
T. Rasymas, V. Rudžionis, Evaluation of methods to combine different speech recognizers, in: Federated Conference on Computer Science and Information Systems (FedCSIS), 2015, pp. 1043–1047.
D.S., Statistical data mining and machine learning, Tech. rep., Department of Statistics Oxford (2016).
S. Bhattacharyya, A. Khasnobish, S. Chatterjee, A. Konar, D. Tibarewala, Performance analysis of lda, qda and knn algorithms in left-right limb movement classification from eeg data, in: 2010 International Conference on Systems in Medicine and Biology (ICSMB), 2010, pp. 126–131.
Baek, 2016, Hybrid kernel density estimation for discriminant analysis with information complexity and genetic algorithm, Knowl.-Based Syst., 99, 79, 10.1016/j.knosys.2016.01.046
Friedman, 1989, Regularized discriminant analysis, J. Am. Stat. Assoc., 84, 165, 10.1080/01621459.1989.10478752
Chen, 2000
K.M.A. Alheeti, A. Gruebler, K.D. McDonald-Maier, An intrusion detection system against black hole attacks on the communication network of self-driving cars, in: 2015 Proceedings of the Sixth International Conference on Emerging Security Technologies (EST), 2015, pp. 86–91.
K.-c. Lan, C.-M. Chou, Realistic mobility models for vehicular ad hoc network (vanet) simulations, in: . in: Proceedings of the 8th International Conference on ITS Telecommunications, ITST, 2008, pp. 362–366.
R. Caruana, A. Niculescu-Mizil, Data mining in metric space: an empirical analysis of supervised learning performance criteria, in: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge discovery and Data Mining, ACM, 2004, pp. 69–78.
Creech, 2014, A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns, IEEE Trans. Comput., 63, 807, 10.1109/TC.2013.13