| dc.creator | Kosmanos D., Pappas A., Aparicio-Navarro F.J., Maglaras L., Janicke H., Boiten E., Argyriou A. | en |
| dc.date.accessioned | 2023-01-31T08:44:29Z | |
| dc.date.available | 2023-01-31T08:44:29Z | |
| dc.date.issued | 2019 | |
| dc.identifier | 10.1109/SEEDA-CECNSM.2019.8908528 | |
| dc.identifier.isbn | 9781728147574 | |
| dc.identifier.uri | http://hdl.handle.net/11615/75162 | |
| dc.description.abstract | The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors' knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks. © 2019 IEEE. | en |
| dc.language.iso | en | en |
| dc.source | 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM 2019 | en |
| dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076346899&doi=10.1109%2fSEEDA-CECNSM.2019.8908528&partnerID=40&md5=d7f0ec0e5563bb1907bfe9492eddf9e4 | |
| dc.subject | Autonomous vehicles | en |
| dc.subject | Computer aided design | en |
| dc.subject | Computer crime | en |
| dc.subject | Data fusion | en |
| dc.subject | Decision trees | en |
| dc.subject | Intrusion detection | en |
| dc.subject | Jamming | en |
| dc.subject | Nearest neighbor search | en |
| dc.subject | Network security | en |
| dc.subject | Social networking (online) | en |
| dc.subject | Support vector machines | en |
| dc.subject | Vehicle to vehicle communications | en |
| dc.subject | Cross-layer approach | en |
| dc.subject | Data fusion technique | en |
| dc.subject | Intrusion Detection Systems | en |
| dc.subject | K nearest neighbours (k-NN) | en |
| dc.subject | One-class support vector machines (OCSVM) | en |
| dc.subject | Secure wireless communication | en |
| dc.subject | Vehicular Adhoc Networks (VANETs) | en |
| dc.subject | Wireless communications | en |
| dc.subject | Vehicular ad hoc networks | en |
| dc.subject | Institute of Electrical and Electronics Engineers Inc. | en |
| dc.title | Intrusion detection system for platooning connected autonomous vehicles | en |
| dc.type | conferenceItem | en |