507 research outputs found
Attack Classification and Detection for Misbehaving Vehicles using ML/DL
Vehicle ad hoc networks are a crucial component of the next Intelligent Transportation System created to build a reliable and secure connection between various network components to establish a safe and effective transportation network. Because of open nature of VANETs become vulnerable to numerous assaults such forgery, Denial-of-Service (DoS), and false reports, which can ultimately cause traffic jams or accidents The earlier study concentrated on misbehaving vehicles rather than RSUs. Proposed method integrates data from two subsequent BSMs for testing and training by employing machine learning (ML) methods. The framework merges the data from two BSMs in the right manner and utilizes machine learning/Deep learning methodology which identify the running vehicle as a legal or hostile one
A new procedure for misbehavior detection in vehicular ad-hoc networks using machine learning
Misbehavior detection in vehicular ad hoc networks (VANETs) is performed to improve the traffic safety and driving accuracy. All the nodes in the VANETs communicate to each other through message logs. Malicious nodes in the VANETs can cause inevitable situation by sending message logs with tampered values. In this work, various machine learning algorithms are used to detect the primarily five types of attacks namely, constant attack, constant offset attack, random attack, random offset attack, and eventual attack. Firstly, each attack is detected by different machine learning algorithms using binary classification. Then, the new procedure is created to do the multi classification of the attacks on best chosen algorithm from different machine learning techniques. The highest accuracy in case of binary classification is obtained with Naïve Bayes (100%), decision tree (100%), and random forest (100%) in type1 attack, decision tree (100%) in type2 attack, and random forest (98.03%, 95.56%, and 95.55%) in Type4, Type8 and Type16 attack respectively. In case of new procedure for multi-classification, the highest accuracy is obtained with random forest (97.62%) technique. For this work, VeReMi dataset (a public repository for the malicious node detection in VANETs) is used
A comprehensive survey of V2X cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version
Towards a Reliable Machine Learning Based Global Misbehavior Detection in C-ITS: Model Evaluation Approach
International audienceGlobal misbehavior detection in Cooperative Intelligent Transport Systems (C-ITS) is carried out by a central entity named Misbe-havior Authority (MA). The detection is based on local misbehavior detection information sent by Vehicle's On-Board Units (OBUs) and by RoadSide Units (RSUs) called Misbehavior Reports (MBRs) to the MA. By analyzing these Misbehavior Reports (MBRs), the MA is able to compute various misbehavior detection information. In this work, we propose and evaluate different Machine Learning (ML) based solutions for the internal detection process of the MA. We show through extensive simulation and several detection metrics the ability of solutions to precisely identify different misbehavior types
A Survey on the Applications of Frontier AI, Foundation Models, and Large Language Models to Intelligent Transportation Systems
This survey paper explores the transformative influence of frontier AI,
foundation models, and Large Language Models (LLMs) in the realm of Intelligent
Transportation Systems (ITS), emphasizing their integral role in advancing
transportation intelligence, optimizing traffic management, and contributing to
the realization of smart cities. Frontier AI refers to the forefront of AI
technology, encompassing the latest advancements, innovations, and experimental
techniques in the field, especially AI foundation models and LLMs. Foundation
models, like GPT-4, are large, general-purpose AI models that provide a base
for a wide range of applications. They are characterized by their versatility
and scalability. LLMs are obtained from finetuning foundation models with a
specific focus on processing and generating natural language. They excel in
tasks like language understanding, text generation, translation, and
summarization. By leveraging vast textual data, including traffic reports and
social media interactions, LLMs extract critical insights, fostering the
evolution of ITS. The survey navigates the dynamic synergy between LLMs and
ITS, delving into applications in traffic management, integration into
autonomous vehicles, and their role in shaping smart cities. It provides
insights into ongoing research, innovations, and emerging trends, aiming to
inspire collaboration at the intersection of language, intelligence, and
mobility for safer, more efficient, and sustainable transportation systems. The
paper further surveys interactions between LLMs and various aspects of ITS,
exploring roles in traffic management, facilitating autonomous vehicles, and
contributing to smart city development, while addressing challenges brought by
frontier AI and foundation models. This paper offers valuable inspiration for
future research and innovation in the transformative domain of intelligent
transportation.Comment: This paper appears in International Conference on Computer and
Applications (ICCA) 202
RSU-Based Online Intrusion Detection and Mitigation for VANET
Secure vehicular communication is a critical factor for secure traffic
management. Effective security in intelligent transportation systems (ITS)
requires effective and timely intrusion detection systems (IDS). In this paper,
we consider false data injection attacks and distributed denial-of-service
(DDoS) attacks, especially the stealthy DDoS attacks, targeting the integrity
and availability, respectively, in vehicular ad-hoc networks (VANET). Novel
statistical intrusion detection and mitigation techniques based on centralized
communications through roadside units (RSU) are proposed for the considered
attacks. The performance of the proposed methods are evaluated using a traffic
simulator and a real traffic dataset. Comparisons with the state-of-the-art
solutions clearly demonstrate the superior performance of the proposed methods
in terms of quick and accurate detection and localization of cyberattacks
Intrusion Detection System for Platooning Connected Autonomous Vehicles
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication is vulnerable to a variety of cyber atacks such as spoofing or jamming attacks. In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment. The IDS would reduce the risk of traffic disruption and accident caused as a result of cyber-attacks. The detection engine of the presented IDS is based on the ML algorithms Random Forest (RF), k-Nearest Neighbour (k-NN) and One-Class Support Vector Machine (OCSVM), as well as data fusion techniques in a cross-layer approach. To the best of the authors’ knowledge, the proposed IDS is the first in literature that uses a cross-layer approach to detect both spoofing and jamming attacks against the communication of connected vehicles platooning. The evaluation results of the implemented IDS present a high accuracy of over 90% using training datasets containing both known and unknown attacks
Position Falsification Detection in VANET with Consecutive BSM Approach using Machine Learning Algorithm
Vehicular ad-hoc network (VANET) is an emerging technology for vehicle-to-vehicle communication vital for reducing road accidents and traffic congestion in an Intelligent Transportation System (ITS). VANET communication is vulnerable to various attacks and cryptographic techniques are used for message integrity and authentication of vehicles in order to ensure security and privacy for vehicular communications. However, if there is an inside attacker additional measures are necessary to ensure the correctness of the transmitted data. A basic safety message (BSM) is broadcasted by each vehicle in the network periodically to transmit its status. Position falsification is an attack where the attacker broadcasts a false BSM position, leading to congestion or even accidents. It becomes imperative to detect and identify the attacker to ensure safety in the network. Although many trust-based models are researched in the past, this research proposes a feasible and efficient data-centric approach to detect malicious behavior, using machine learning (ML) algorithms.The proposed Machine Learning based misbehavior detection system utilizes labelled dataset called Vehicular Reference Misbehavior Dataset (VeReMi). VeReMi dataset offers five different types of position falsification attacks with different vehicle and attacker densities. This ML-based model uses two consecutive BSM approach to detect these attacks. Model classification on the Road-side Unit detects and could revoke malicious nodes from the network, reducing computational overhead on vehicles
- …