Back to Search
Start Over
Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspections
- Source :
- ICDCN
- Publication Year :
- 2019
- Publisher :
- ACM, 2019.
-
Abstract
- For many Intelligent Transportation System (ITS) applications, periodic transmission of beacon messages by a source vehicle is paramount for providing the unhindered service and to maintain its accuracy. A malicious source vehicle could deny beacon messages of a target ITS application and intelligently cover-up this denial with signal loss faced due to wireless channel error and surrounding environment obstacles. In this context, we propose a lightweight technique to detect a beacon denial attacker using Auto-Correlation Function (ACF). This technique possesses higher detection accuracy in comparison to fixed threshold scheme which depends upon the number of beacon messages denied by the source vehicle. Furthermore, we propose a random vehicle inspection scheme for inspecting randomly chosen set of vehicles for beacon denial attack. In addition to reducing computational overhead, the advantage of this scheme is that an attacker with knowledge about detection algorithm cannot decide the time and place of inspection. Simulation results confirm the accurate and lightweight nature of the proposed technique.
- Subjects :
- 050210 logistics & transportation
Computer science
business.industry
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
05 social sciences
Autocorrelation
Real-time computing
020302 automobile design & engineering
Context (language use)
02 engineering and technology
Intrusion detection system
0203 mechanical engineering
Transmission (telecommunications)
0502 economics and business
Wireless
business
Intelligent transportation system
Vehicle inspection
Communication channel
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 20th International Conference on Distributed Computing and Networking
- Accession number :
- edsair.doi...........032257765f7fec5a135be4820ddd65bf
- Full Text :
- https://doi.org/10.1145/3288599.3288616