Performance Analysis of Attack detection in Simulation of Vehicular Networks
Title: – Attack detection in Simulation of Vehicular Networks using Machine Learning
======================================================================
Implementation Plan:
==================
Step 1: Initially, we start with configuring the SUMO Map.
Step 2: Next, we construct a Network consisting of 50-Vehicle, 4-RSU and 1-Gateway.
Step 3: Next, we implement the Identity-Based Cryptography (IBC) for Vehicle and RSU Communication and we will check trust worthiness for each vehicle using a Reputation Based System.
Step 4: Next, we Collect and Preprocess the simulation Data from the Vehicles.
Step 5: Next, we Train a Convolutional Neural Network (CNN) Model for the Attack Classification Process.
Step 6: Finally, we plot Performance for the following metrics:
6.1: Number of Epochs vs Accuracy (%)
6.2: Number of Epochs vs Precision (%)
6.3: Number of Epochs vs Recall (%)
6.4: Number of Epochs vs F1-Score (%)
6.5: False Positive Rate (%) vs True Positive Rate (%)
Software Requirements:
———————————-
1. Development Tools: Omnet++ 4.6 with python and above (if needed), SUMO
2. Operating System: Windows 10 [64-bit]
Note:
———
1. We make a simulation based process only, not a real time process.
2. If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
3. Please note that this implementation plan does not include any further steps after it is put into implementation.
4. If the above plan satisfies your requirement, please confirm us soon.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |