IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers

Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers
View Sample PDF
Author(s): Chong Han (University of Surrey, UK), Sami Muhaidat (Khalifa University, UAE), Ibrahim Abualhaol (Khalifa University, UAE), Mehrdad Dianati (University of Surrey, UK)and Rahim Tafazolli (University of Surrey, UK)
Copyright: 2015
Pages: 29
Source title: Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8473-7.ch010

Purchase

View Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers on the publisher's website for pricing and purchasing information.

Abstract

Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with timely information on road and traffic conditions, and achieving smooth traffic flow on the roads. Recently, the security of VANETs has attracted major attention for the possible presence of malicious elements, and the presence of altered messages due to channel errors in transmissions. In order to provide reliable and secure communications, Intrusion Detection Systems (IDSs) can serve as a second defense wall after prevention-based approaches, such as encryption. This chapter first presents the state-of-the-art literature on intrusion detection in VANETs. Next, the detection of illicit wireless transmissions from the physical layer perspective is investigated, assuming the presence of regular ongoing legitimate transmissions. Finally, a novel cooperative intrusion detection scheme from the MAC sub-layer perspective is discussed.

Related Content

Fani Antoniou, Marina Marinelli, Kleopatra Petroutsatou. © 2024. 31 pages.
Konstantinos Kirytopoulos, Vasileios Sarlis, Dimitris Marinakis, Theodoros Kalogeropoulos. © 2024. 26 pages.
Konstantina Ragazou, Ioannis Passas, Alexandros Garefalakis, Constantin Zopounidis. © 2024. 24 pages.
Vannie Naidoo, Rajen Chetty. © 2024. 19 pages.
Alexandros E. Grigoras, Georgios N. Aretoulis, Fani Antoniou, Stylianos Karatzas. © 2024. 30 pages.
Kleopatra Petroutsatou, Theodora Vagdatli, Marina Chronaki, Panagiota Samouilidou. © 2024. 24 pages.
Dimitra Korakaki, Stratos Kartsonakis, Evangelos Grigoroudis, Constantin Zopounidis. © 2024. 34 pages.
Body Bottom