Affiliation:
1. Computers and AI dept , Military Technical College , Cairo , Egypt ,
Abstract
Abstract
This paper addresses the vulnerability of vehicular ad hoc networks (VANETs) to malicious attacks, specifically focusing on position falsification attacks. Detecting misbehaving vehicles in VANETs is challenging due to the dynamic nature of the network topology and vehicle mobility. The paper considers five types (constant attack, constant offset attack, random attack, random offset attack, and eventually stop attack) of position falsification attacks with varying traffic and attack densities, considered the most severe attacks in VANETs. To improve the detection of these attacks, a novel travel distance feature and an enhanced two-stage detection approach are proposed for classifying position falsification attacks in VANETs. The approach involves deploying the misbehavior detection system within roadside units (RSUs) by offloading computational work from vehicles (onboard units, or OBUs) to RSUs. The performance of the proposed approach was evaluated against different classifiers, including a wide range of paradigms (KNN, Decision Tree, and Random Forest), using the VeReMi dataset. Experimental results indicate that the proposed method based on Random Forest achieved an accuracy of 99.9% and an F1-Score of 99.9%, which are better not only than those achieved by KNN and Decision Tree but also than the most recent approaches in the literature survey.
Reference24 articles.
1. Kim, J.-W., Kim, J.-W. and Jeon, D.-K. (2018) A cooperative communication protocol for QoS provisioning in ieee 802.11 p/wave vehicular networks. Italian National Conference on Sensors. DOI:10.3390/s18113622.
2. Rajkumar, M.N., Nithya, M. and HemaLatha, P. (2016) Overview of Vanet with its Features and Security Attacks. International Research Journal of Engineering and Technology (IRJET), 3(1), 137–142.
3. Bassiony, I.S. and Salama, G. (2022) Detection approaches for position falsification attack in VANET. In: 13th International Conference on Electrical Engineering (ICEENG). DOI:10.1109/ICEENG49683.2022.9781915.
4. Govindan, H., Jacob, L., Babu, A.V. (2011) Bit-based fairness in ieee802. 11p mac for vehicle-to-infrastructure networks. In: Proceedings of the 2011 international conference on Advanced Computing, Networking and Security. DOI:10.1007/978-3-642-29280-4_39.
5. Azees, M., Vijayakumar, P. and Jegatha Deborah, L. (2016) Comprehensive survey on security services in vehicular ad-hoc networks. IET Intelligent Transport Systems Journal, 10(6), 379–388. DOI:10.1049/iet-its.2015.0072.