{"title":"在VANETs中通过验证车辆运动数据进行入侵检测","authors":"N. Bißmeyer, Christian Stresing, K. Bayarou","doi":"10.1109/VNC.2010.5698232","DOIUrl":null,"url":null,"abstract":"Many Intrusion Detection approaches for Vehicular ad hoc networks (VANETs) are proposed. However, not moving fake vehicles and vehicles with a plausible mobility model are not considered in other approaches. In this paper we propose an innovative signature based intrusion detection method that verifies vehicle movement data by applying a plausibility model. With our approach a single fake vehicle can be identified based on the plausibility model even if it simulates an autonomously valid movement. The results from the intrusion detection can be used to detect on the one hand road side attackers simulating faked traffic congestions and on the other hand attackers that try to deny real congestions by inserting moving vehicles into the network.","PeriodicalId":257339,"journal":{"name":"2010 IEEE Vehicular Networking Conference","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"72","resultStr":"{\"title\":\"Intrusion detection in VANETs through verification of vehicle movement data\",\"authors\":\"N. Bißmeyer, Christian Stresing, K. Bayarou\",\"doi\":\"10.1109/VNC.2010.5698232\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many Intrusion Detection approaches for Vehicular ad hoc networks (VANETs) are proposed. However, not moving fake vehicles and vehicles with a plausible mobility model are not considered in other approaches. In this paper we propose an innovative signature based intrusion detection method that verifies vehicle movement data by applying a plausibility model. With our approach a single fake vehicle can be identified based on the plausibility model even if it simulates an autonomously valid movement. The results from the intrusion detection can be used to detect on the one hand road side attackers simulating faked traffic congestions and on the other hand attackers that try to deny real congestions by inserting moving vehicles into the network.\",\"PeriodicalId\":257339,\"journal\":{\"name\":\"2010 IEEE Vehicular Networking Conference\",\"volume\":\"88 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"72\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE Vehicular Networking Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/VNC.2010.5698232\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Vehicular Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VNC.2010.5698232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion detection in VANETs through verification of vehicle movement data
Many Intrusion Detection approaches for Vehicular ad hoc networks (VANETs) are proposed. However, not moving fake vehicles and vehicles with a plausible mobility model are not considered in other approaches. In this paper we propose an innovative signature based intrusion detection method that verifies vehicle movement data by applying a plausibility model. With our approach a single fake vehicle can be identified based on the plausibility model even if it simulates an autonomously valid movement. The results from the intrusion detection can be used to detect on the one hand road side attackers simulating faked traffic congestions and on the other hand attackers that try to deny real congestions by inserting moving vehicles into the network.