Securing solar energy-harvesting road-side unit using an embedded cooperative-hybrid intrusion detection system

2016 ◽  
Vol 10 (6) ◽  
pp. 386-402 ◽  
Author(s):  
Qutaiba Ibrahim Ali
2015 ◽  
Vol 11 (1) ◽  
pp. 18-31
Author(s):  
Qutaiba Ali

Vehicular network security had spanned and covered a wide range of security related issues. However solar energy harvesting Road Side Unit (RSU) security was not defined clearly, it is this aspect that is considered in this paper. In this work, we will suggest an RSU security model to protect it against different internal and external threats. The main goal is to protect RSU specific data (needed for its operation) as well as its functionality and accessibility. The suggested RSU security model must responds to many objectives, it should ensure that the administrative information exchanged is correct and undiscoverable (information authenticity and privacy), the source (e.g., VANET server) is who he claims to be (message integrity and source authentication) and the system is robust and available (using Intrusion Detection System (IDS)). In this paper, we suggest many techniques to strength RSU security and they were prototyped using an experimental model based on Ubicom IP2022 network processor development kit.


Internet of Things (IoT) is an emerging technology that makes network of physical objects which can identify, communicate and share information through Internet. The edge of IoT network are mostly simple sensors. The success of the IoT application depends on the quality of sensor data at the right time, this leads to the requirement of IoT devices be long term, self-sustaining and have the ability to harvest their required energy from deployed environment. Such devices incur additional security challenges because of prolonged life time and change in the life cycle of devices. A novel intrusion detection system is designed for energy harvesting 6LoWPAN based IoT network considering the energy scavenging characteristics of devices in addition to conventional IoT. The simulation results confirm that the proposed intrusion detection system is efficient and accurate in detecting the attacks.


Sign in / Sign up

Export Citation Format

Share Document