An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
详细信息    查看全文
  • 作者:Neeraj Kumar ; Jaskaran Preet Singh ; Rasmeet S. Bali ; Sudip Misra
  • 关键词:Vehicular cloud ; Clustering ; Multimedia healthcare applications ; Intrusion detection ; Learning
  • 刊名:Cluster Computing
  • 出版年:2015
  • 出版时间:September 2015
  • 年:2015
  • 卷:18
  • 期:3
  • 页码:1263-1283
  • 全文大小:1,888 KB
  • 参考文献:1.Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 217鈥?41 (2012)CrossRef
    2.Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE. 99(7), 1162鈥?182 (2011)CrossRef
    3.Schoch, E., Kargl, F., Weber, M., Leinmuller, T.: Communication patterns in VANETs. IEEE Commun. Mag. 46(11), 119鈥?25 (2008)CrossRef
    4.Jakubiak, J., Koucheryavy, Y.: State of the art and research challenges for VANETs. In: 5th IEEE Consumer Communications and Networking Conference, CCNC 2008, pp. 912鈥?16 (2008)
    5.Papadimitratos, P., La Fortelle, A., Evenssen, K., Brignolo, R., Cosenza, S.: Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 47(11), 84鈥?5 (2009)CrossRef
    6.Eltoweissy, M., Olariu, S., Younis, M.: Towards autonomous vehicular clouds. Ad Hoc Netw. 37(4), 1鈥?6 (2010)CrossRef
    7.Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J Netw. Comput. Appl. 36(1), 42鈥?7 (2013)CrossRef
    8.Doukas, C., Pliakas, T., Maglogiannis, I.: Mobile healthcare information management utilizing cloud computing and android OS. In: Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference, IEEE, pp. 1037鈥?040 (2010)
    9.Nadeem, T., Shankar, P., Iftode, L.: A comparative study of data dissemination models for VANETs. In: 3rd IEEE Annual International Conference on Mobile and Ubiquitous Systems, pp. 1鈥?0. (2006)
    10.Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P.H., Shen, X.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88鈥?5 (2008)CrossRef
    11.Sumra, I.A., Ahmad, I., Hasbullah, H., Bin Ab Manan, J.L.: Classes of attacks in VANET. In: 2011 IEEE Saudi International Electronics, Communications and Photonics Conference (SIECPC), pp. 1鈥?(2011)
    12.Isaac, J.T., Zeadally, S., Cmara, J.S.: Security attacks and solutions for vehicular ad hoc networks. IET Commun. 4(7), 894鈥?03 (2010)MathSciNet CrossRef MATH
    13.Uzcategui, R., Acosta-Marum, G.: Wave: a tutorial. IEEE Commun. Mag. 47(5), 126鈥?33 (2009)CrossRef
    14.Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Comput. Commun. 31(12), 2883鈥?897 (2008)CrossRef
    15.Ghosh, M., Varghese, A., Kherani, A.A., Gupta, A.: Distributed misbehavior detection in VANETs. IEEE Wireless Communications and Networking Conference, WCNC 2009, 1鈥? (2009)
    16.Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: IEEE Vehicular Technology Conference (VTC Fall), pp. 1鈥? (2011)
    17.Bibmeyer, N., Stresing, C., Bayarou, K.M.: Intrusion detection in vanets through verification of vehicle movement data. In: IEEE Vehicular Networking Conference (VNC), pp. 166鈥?73 (2010)
    18.Vieira, K., Schulter, A., Westphall, C., Westphall, C.M.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38鈥?3 (2010)CrossRef
    19.Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.G.H.: Distributed intrusion detection in clouds using mobile agents. In: Third IEEE International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP鈥?9), pp. 175鈥?80 (2009)
    20.Mazzariello, C., Bifulco, R., Canonico, R.: Integrating a network ids into an open source cloud computing environment. In: 2010 IEEE Sixth International Conference on Information Assurance and Security (IAS), pp. 265鈥?70 (2010)
    21.Li, F., Wang, Y.: Routing in vehicular ad hoc networks: a survey. IEEE Veh Technol. Mag. 2(2), 12鈥?2 (2007)CrossRef
    22.Bali, R.S., Kumar, N., Rodrigues, J.J.: Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions. Veh. Commun. 1(3), 134鈥?52 (2014)CrossRef
    23.Almalag, M.S., Weigle, M.C.: Using traffic flow for cluster formation in vehicular ad-hoc networks. In: 35th IEEE Conference on Local Computer Networks (LCN), pp. 631鈥?36 (2010)
    24.Souza, E., Nikolaidis, I., Gburzynski, P.: A new aggregate local mobility (ALM) clustering algorithm for VANETs. In: 2010 IEEE International Conference on Communications (ICC), pp. 1鈥? (2010)
    25.Qian, Y., Moayeri, N.: Design of secure and application-oriented VANETs. IEEE Veh. Technol. Conf. VTC Spring 2008, 2794鈥?799 (2008)
    26.Wasef, A., Rongxing, L., Xiaodong, L., Xuemin, S.: Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE Wirel. Commun. 17(5), 22鈥?8 (2010)CrossRef
    27.Dror, E., Avin, C., Lotker, Z.: Fast randomized algorithm for hierarchical clustering in vehicular ad-hoc networks. In: The 10th IEEE IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pp. 1鈥? (2011)
    28.Rawshdeh, Z.Y., Mahmud, S.M.: Toward strongley connected clustering structure in vehicular ad hoc networks. In: 70th IEEE Vehicular Technology Conference Fall (VTC 2009-Fall), pp. 1鈥? (2009)
    29.Wang, Z., Liu, L., Zhou, M., Ansari, N.: A position-based clustering technique for ad hoc intervehicle communication. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 38(2), 201鈥?08 (2008)CrossRef
    30.Kayis, O., Acarman, T.: Clustering formation for inter-vehicle communication. IEEE Intell. Transp. Syst. Conf. ITSC 2007, 636鈥?41 (2007)
    31.Mafra, P.M., Fraga, J.S., Santin, A.O.: Algorithms for a distributed IDS in MANETs. J. Comput. Syst. Sci. 80(3), 554鈥?70 (2014)CrossRef MATH
    32.Zhang, D., Yeo, C.K.: Distributed court system for intrusion detection in mobile ad hoc networks. Comput. & Secur. 30(8), 555鈥?70 (2011)CrossRef
    33.Dietzel, S., Petit, J., Heijenk, G., Kargl, F.: Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols. IEEE Trans. Veh. Technol. 62(4), 1505鈥?518 (2013)CrossRef
    34.Gazdar, T., Benslimane, A., Rachedi, A., Belghith, A.: A trust-based architecture for managing certificates in vehicular ad hoc networks. In: IEEE International Conference on Communications and Information Technology (ICCIT-2012), pp. 180鈥?85 (2012)
    35.Lauf, A.P., Peters, R.A., Robinson, W.H.: A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Netw. 8(3), 253鈥?66 (2010)CrossRef
    36.Marchang, N., Datta, R.: Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Netw. 6(4), 508鈥?23 (2008)CrossRef
    37.Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1151鈥?167 (2008)CrossRef
    38.Kumar, N., Misra, S., Rodrigues, J.P.C., Obaidat, M.S.: Networks of learning automata: a performance analysis study. IEEE Wirel. Commun. Mag. 21(6), 41鈥?7 (2014)CrossRef
    39.Misra, S., Krishna, P.V., Saritha, V.: LACAV: an energy efficient channel assignment mechanism for vehicular ad hoc networks. J. Supercomput. 62(3), 1241鈥?262 (2012)CrossRef
    40.Kumar, N., Kim, J.: ELACCA: efficient learning automata based cell clustering algorithm for wireless sensor networks. Wirel. Person. Commun. 73(4), 1495鈥?512 (2013)CrossRef
    41.Kumar, N., Chilamkurti, N., Rodrigues, J.P.C.: Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks. Comput. Commun. 39(1), 22鈥?2 (2014)CrossRef
    42.Kumar, N., Chilamkurti, N., Park, J.H.: ALCA: agent learning based clustering algorithm in vehicular adhoc networks. Person. Ubiquitous Comput. 18(8), 1683鈥?692 (2013)CrossRef
    43.Kumar, N., Misra, S., Obaidat, M.S.: Collaborative learning automata-based routing for rescue operations in dense urban regions using vehicular sensor networks. IEEE Syst. J. doi:10.鈥?109/鈥婮SYST.鈥?014.鈥?335451
    44.Kumar, N., Lee, J.H., Rodrigues, J.P.C.: Intelligent mobile video surveillance system as a bayesian coalition game in vehicular sensor networks: learning automata approach. IEEE Trans. Intell. Transp. Syst. doi:10.鈥?109/鈥婽ITS.鈥?014.鈥?354372 (2014)
    45.Kumar, N., Lee, J.H.: Collaborative learning automata based channel assignment with topology preservation scheme for wireless mesh networks under QoS constraints. IEEE Syst. J. doi:10.鈥?109/鈥婮SYST.鈥?014.鈥?355113
    46.Kumar, N., Chilamkurti, N.: Collaborative trust aware intelligent intrusion detection in VANETs. Comput. Electr. Eng. 40(6), 1981鈥?996 (2014)CrossRef
    47.Kumar, N., Chilamkurti, N., Misra, S.C.: Bayesian coalition game for internet of things: an ambient intelligence approach. IEEE Commun. Mag. 53(1), 48鈥?5 (2015)CrossRef
    48.Kumar, N., Lin, C.C.: Reliable multicast as a bayesian coalition game for a non-stationary environment in vehicular ad hoc networks: a learning automata based approach. Int. J. Adhoc Ubiquitous Comput. (In Press)
    49.Kumar, N., Iqbal, R., Misra, S., Rodrigues, J.J.P.C.: Bayesian coalition game for contention-aware reliable data forwarding in vehicular mobile cloud. Future Gener. Comput. Syst. 48(7), 60鈥?2 (2015)CrossRef
    50.Kumar, N., Tyagi, S., Deng, D.J.: LA-EEHSC: learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks. J. Netw Comput. Appl. 46(11), 264鈥?79 (2014)CrossRef
    51.Kumar, N., Misra, S., Rodrigues, J.J.P.C.: An intelligent approach for building a secure decentralized public key infrastructure in VANET. J. Comput. Syst. Sci. 81(6), 1042鈥?058 (2015)CrossRef
    52.Kumar, N., Misra, S., Rodrigues, J.J.P.C., Obaidat, M.S.: Coalition games for spatio-temporal big data in internet of vehicles environment: a comparative analysis. IEEE Internet Things J. doi:10.鈥?109/鈥婮IOT.鈥?015.鈥?388588
    53.Kumar, N., Rodrigues, J.J.P.C., Chilamkurti, N.: Bayesian coalition game as-a-service for content distribution in internet of vehicles. IEEE Internet Things J. 1(6), 544鈥?55 (2014)CrossRef
    54.Bali, R., Kumar, N., Rodrigues, J.J.P.C.: Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions. Veh. Commun. 1(3), 134鈥?52 (2014)CrossRef
    55.Dua, A., Kumar, N., Bawa, S.: QoS-aware data dissemination for dense urban regions in vehicular ad hoc networks. Mobile Netw. Appl. doi:10.鈥?007/鈥媠11036-014-0553-4
    56.Kumar, N., Kim, J.: Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks. Math. Comput. Model. 58(1/2), 3鈥?4 (2013)CrossRef
    57.Dua, A., Kumar, N., Bawa, S., Rodrigues, J.J.P.C.: An intelligent context-aware congestion resolution protocol for data dissemination in vehicular ad hoc networks. Mobile Netw. Appl. 20(2), 181鈥?00 (2015)CrossRef
    58.Kumar, N., Rodrigues, J.J.P.C., Lloret, J., Dua, A.: Replication-aware data dissemination for vehicular ad hoc networks using location determination. Mobile Netw. Appl. 20(2), 251鈥?67 (2015)CrossRef
    59.Kumar, N., Kaur, K., Misra, S.C., Iqbal, R.: An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Netw. Appl. doi:10.鈥?007/鈥媠12083-015-0332-4
    60.Kumar, N., Misra, S., Chilamkurti, N., Lee, J., Rodrigues, J.J.P.C.: Bayesian coalition negotiation game as a utility for secure energy management in a vehicles-to-grid environment. IEEE Trans. Depend. Secure Comput. doi:10.鈥?109/鈥婽DSC.鈥?015.鈥?415489
    61.Kumar, N., Zeadally, S., Rodrigues, J.J.P.C.: QoS-aware hierarchical web caching scheme for online video streaming applications in internet-based vehicular ad hoc networks. IEEE Trans. Ind. Electron. doi:10.鈥?109/鈥婽IE.鈥?015.鈥?425364
    62.Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557鈥?568 (2008)CrossRef
    63.Mafra, P.M., Fraga, J.S., Santin, A.O.: A distributed IDS for ad hoc networks. In: Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 478鈥?83 (2012)
    64.European Commission Information Society. Internet of Things in 2020: a Roadmap for the Future. http://鈥媤ww.鈥媔ot-visitthefuture.鈥媏u
    65.Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of SUMO-simulation of urban mobility. Int. J. Adv. Syst. Meas. 5(3/4), 128鈥?38 (2012)
  • 作者单位:Neeraj Kumar (1)
    Jaskaran Preet Singh (2)
    Rasmeet S. Bali (2)
    Sudip Misra (3)
    Sana Ullah (4)

    1. Department of Computer Science and Engineering, Thapar University, Patiala, Punjab, India
    2. Department of Computer Science and Engineering, Chandigarh University, Chandigarh, Punjab, India
    3. School of Information Technology, IIT Kharagpur, Kharagpur, W.B., India
    4. Polytechnic Institute of Porto, Porto, Portugal
  • 刊物类别:Computer Science
  • 刊物主题:Processor Architectures
    Operating Systems
    Computer Communication Networks
  • 出版者:Springer Netherlands
  • ISSN:1573-7543
文摘
In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes. Keywords Vehicular cloud Clustering Multimedia healthcare applications Intrusion detection Learning
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.