6 research outputs found

    Towards a Reliable Machine Learning Based Global Misbehavior Detection in C-ITS: Model Evaluation Approach

    Get PDF
    International audienceGlobal misbehavior detection in Cooperative Intelligent Transport Systems (C-ITS) is carried out by a central entity named Misbe-havior Authority (MA). The detection is based on local misbehavior detection information sent by Vehicle's On-Board Units (OBUs) and by RoadSide Units (RSUs) called Misbehavior Reports (MBRs) to the MA. By analyzing these Misbehavior Reports (MBRs), the MA is able to compute various misbehavior detection information. In this work, we propose and evaluate different Machine Learning (ML) based solutions for the internal detection process of the MA. We show through extensive simulation and several detection metrics the ability of solutions to precisely identify different misbehavior types

    A Misbehavior Authority System for Sybil Attack Detection in C-ITS

    Get PDF
    International audienceGlobal misbehavior detection is an important back-end mechanism in Cooperative Intelligent Transport Systems (C-ITS). It is based on the local misbehavior detection information sent by Vehicle's On-Board Units (OBUs) and by RoadSide Units (RSUs) called Misbehavior Reports (MBRs) to the Mis-behavior Authority (MA). By analyzing these reports, the MA provides more accurate and robust misbehavior detection results. Sybil attacks pose a significant threat to the C-ITS systems. Their detection and identification may be inaccurate and confusing. In this work, we propose a Machine Learning (ML) based solution for the internal detection process of the MA. We show through extensive simulation that our solution is able to precisely identify the type of the Sybil attack and provide promising detection accuracy results

    Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs

    Get PDF
    Background: The architecture of Software Defined Networking (SDN) integrated with Vehicular Ad-hoc Networks (VANETs) is considered a practical method for handling large-scale, dynamic, heterogeneous vehicular networks, since it offers flexibility, programmability, scalability, and a global understanding. However, the integration with VANETs introduces additional security vulnerabilities due to the deployment of a logically centralized control mechanism. These security attacks are classified as internal and external based on the nature of the attacker. The method adopted in this work facilitated the detection of internal position falsification attacks. Objective: This study aimed to investigate the performance of k-NN, SVM, Naïve Bayes, Logistic Regression, and Random Forest machine learning (ML) algorithms in detecting position falsification attacks using the Vehicular Reference Misbehavior (VeReMi) dataset. It also aimed to conduct a comparative analysis of two ensemble classification models, namely voting and stacking for final decision-making. These ensemble classification methods used the ML algorithms cooperatively to achieve improved classification. Methods: The simulations and evaluations were conducted using the Python programming language. VeReMi dataset was selected since it was an application-specific dataset for VANETs environment. Performance evaluation metrics, such as accuracy, precision, recall, F-measure, and prediction time were also used in the comparative studies. Results: This experimental study showed that Random Forest ML algorithm provided the best performance in detecting attacks among the ML algorithms. Voting and stacking were both used to enhance classification accuracy and reduce time required to identify an attack through predictions generated by k-NN, SVM, Naïve Bayes, Logistic Regression, and Random Forest classifiers. Conclusion: In terms of attack detection accuracy, both methods (voting and stacking) achieved the same level of accuracy as Random Forest. However, the detection of attack using stacking could be achieved in roughly less than half the time required by voting ensemble. Keywords: Machine learning methods, Majority voting ensemble, SDN-based VANETs, Security attacks, Stacking ensemble classifiers, VANETs

    Proof of Travel for Trust-Based Data Validation in V2I Communication Part I: Methodology

    Full text link
    Previous work on misbehavior detection and trust management for Vehicle-to-Everything (V2X) communication can identify falsified and malicious messages, enabling witness vehicles to report observations about high-criticality traffic events. However, there may not exist enough "benign" vehicles with V2X connectivity or vehicle owners who are willing to opt-in in the early stages of connected-vehicle deployment. In this paper, we propose a security protocol for the communication between vehicles and infrastructure, titled Proof-of-Travel (POT), to answer the research question: How can we transform the power of cryptography techniques embedded within the protocol into social and economic mechanisms to simultaneously incentivize Vehicle-to-Infrastructure (V2I) data sharing activities and validate the data? The key idea is to determine the reputation of and the contribution made by a vehicle based on its distance traveled and the information it shared through V2I channels. In particular, the total vehicle miles traveled for a vehicle must be testified by digital signatures signed by each infrastructure component along the path of its movement. While building a chain of proofs of spatial movement creates burdens for malicious vehicles, acquiring proofs does not result in extra cost for normal vehicles, which naturally want to move from the origin to the destination. The proof of travel for a vehicle can then be used to determine the contribution and reward by its altruistic behaviors. We propose short-term and long-term incentive designs based on the POT protocol and evaluate their security and performance through theoretical analysis and simulations

    Self-reliant misbehavior detection in V2X networks

    Full text link
    The safety and efficiency of vehicular communications rely on the correctness of the data exchanged between vehicles. Location spoofing is a proven and powerful attack against Vehicle-to-everything (V2X) communication systems that can cause traffic congestion and other safety hazards. Recent work also demonstrates practical spoofing attacks that can confuse intelligent transportation systems at road intersections. In this work, we propose two self-reliant schemes at the application layer and the physical layer to detect such misbehaviors. These schemes can be run independently by each vehicle and do not rely on the assumption that the majority of vehicles is honest. We first propose a scheme that uses application-layer plausibility checks as a feature vector for machine learning models. Our results show that this scheme improves the precision of the plausibility checks by over 20% by using them as feature vectors in KNN and SVM classifiers. We also show how to classify different types of known misbehaviors, once they are detected. We then propose three novel physical layer plausibility checks that leverage the received signal strength indicator (RSSI) of basic safety messages (BSMs). These plausibility checks have multi-step mechanisms to improve not only the detection rate, but also to decrease false positives. We comprehensively evaluate the performance of these plausibility checks using the VeReMi dataset (which we enhance along the way) for several types of attacks. We show that the best performing physical layer plausibility check among the three considered achieves an overall detection rate of 83.73% and a precision of 95.91%. The proposed application-layer and physical-layer plausibility checks provide a promising framework toward the deployment of on self-reliant misbehavior detection systems

    Machine Learning Use-Cases in C-ITS Applications

    Get PDF
    In recent years, the development of Cooperative Intelligent Transportation Systems (C-ITS) have witnessed significant growth thus improving the smart transportation concept. The ground of the new C-ITS applications are machine learning algorithms. The goal of this paper is to give a structured and comprehensive overview of machine learning use-cases in the field of C-ITS. It reviews recent novel studies and solutions on CITS applications that are based on machine learning algorithms. These works are organised based on their operational area, including self-inspection level, inter-vehicle level and infrastructure level. The primary objective of this paper is to demonstrate the potential of artificial intelligence in enhancing C-ITS applications
    corecore