Internet-of-Vehicles intrusion detection system based on hidden Markov model

An intrusion detection system and Internet of Vehicles technology, applied in the field of intrusion detection systems for Internet of Vehicles based on hidden Markov model, can solve the problems of Internet of Vehicles hazards, solutions are no longer easy, and Internet of Vehicles performance is different

Active Publication Date: 2020-10-20
NORTHEASTERN UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security problems in the computer network have long been exposed, and many problems have been effectively solved. However, due to the endless attacks in the Internet of Vehicles and the particularity of the field of the Internet of Vehicles, the same security problems not only behave differently in the Internet of Vehicles, and security solutions cannot be applied effectively
[0004] The Internet of Vehicles is a new generation of networks that are mainly data-centric, while some traditional networks are address-centric, so attacks that have little impact and damage on traditional networks will have a very large impact on the Internet of Vehicles. Hazardous
In addition, due to its dynamic topology, the Internet of Vehicles makes the security issues in the Internet of Vehicles more complicated, and the solution is no longer easy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-Vehicles intrusion detection system based on hidden Markov model
  • Internet-of-Vehicles intrusion detection system based on hidden Markov model
  • Internet-of-Vehicles intrusion detection system based on hidden Markov model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] figure 2 Demonstrates the relationship between vehicle speed and density and traffic flow in the Green shield model

[0083] image 3 Schematic diagram of a black hole attacking vehicle

[0084] Figure 4 Shows the structure of the DNN

[0085] Figure 5 The simple and easy-to-operate system designed by the present invention is shown.

[0086] The graph structure of the hidden Markov model is as follows: Image 6 shown.

[0087] The hidden Markov model in the Internet of Vehicles proposed by the present invention is as follows: Figure 8 as shown,

[0088] Figure 9 In the flow chart, the pre-detection module will obtain the prediction chain from the update module in real time and update it to its own prediction table. When receiving a message, the pre-detection module will judge whether the ID of the message exists in the prediction table. Update the hidden Markov model, and then judge whether the ID is a "normal" node or an "abnormal" node according to the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of intrusion detection algorithms in the Internet of Vehicles, and particularly relates to an Internet-of-Vehicles intrusion detection system based on a hidden Markov model. The system is used for intrusion detection of a False alert attack, a Sybil attack, a Black hole attack and a DoS attack in the Internet of Vehicles. The system mainly comprises a pre-detection module, a DNN-based detection center module, an updating module used for recording a vehicle state and generating a hidden Markov model, and a response center module used for generating a responsesignal, and under the normal operation state of the Internet of Vehicles, the modules jointly guarantee efficient operation of the Internet of Vehicles. Under the attack detection state, the components supplement each other to jointly complete an attack monitoring defense process. Compared with the DNN-based IDS, the Internet-of-Vehicles intrusion detection system has the advantages that the detection precision, overhead and detection time are improved, the detection precision is higher, the average detection time is far shorter than that of an IDS based on DNN, meanwhile, the expenditure is lower, compared with an IDS using state switching, the expenditure of a pre-detection mechanism used in the method is lower, and more computing resources are saved.

Description

technical field [0001] The invention belongs to the field of intrusion detection algorithms in the Internet of Vehicles, in particular to an intrusion detection system for the Internet of Vehicles based on a hidden Markov model. The system is used for intrusion detection of False alert attack, Sybil attack, Black hole attack and DoS attack in the Internet of Vehicles. Background technique [0002] As an important concept in the Internet of Things, the Internet of Vehicles has not only become a hot spot in academic research, but also has been widely used in the engineering field. Whether it is the Internet of Things or the Internet, the security issues behind it are the primary concerns, and these security issues are specifically manifested in severe traffic jams, increasing fuel consumption year by year, and a steady stream of traffic accidents. However, due to the rapid growth of the national economy year by year, the sales volume of automobiles has also doubled thereupon,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q10/04G06N3/08G06N3/04G06K9/62
CPCH04L63/1425H04L63/1416G06N3/084G06Q10/04G06N3/045G06F18/214
Inventor 毕远国郝晨阳李凤云黄子烜项天敖
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products