Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network

被引:1
|
作者
Abdelkreem, Eslam [1 ]
Hussein, Sherif [2 ]
Tammam, Ashraf [1 ]
机构
[1] Arab Acad Sci Technol & Maritime Transport, Fac Engn, Comp Engn Dept, Cairo, Egypt
[2] Mil Tech Coll, Comp & AI Dept, Cairo, Egypt
关键词
VANET; Feature engineering techniques; Position falsification attacks; VeReMi dataset; Machine learning; Misbehavior detection schemes; MISBEHAVIOR DETECTION; COMPREHENSIVE SURVEY; CHALLENGES; ALGORITHMS; SECURITY;
D O I
10.1007/s10207-024-00830-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vehicular ad-hoc network is a technology that enables vehicles to interact with each other and the surrounding infrastructure, aiming to enhance road safety and driver comfort. However, it is susceptible to various security attacks. Among these attacks, the position falsification attack is regarded as one of the most serious, in which the malicious nodes tamper with their transmitted location. Thus, developing effective misbehavior detection schemes capable of detecting such attacks is crucial. Many of these schemes employ machine learning techniques to detect misbehavior based on the features of the exchanged messages. However, the studies that identify the impact of feature engineering on schemes' performance and highlight the most efficient features and algorithms are limited. This paper conducts a comprehensive literature survey to identify the key features and algorithms used in the literature that lead to the best-performing models. Then, a comparative study using the VeReMi dataset, which is publicly available, is performed to assess six models implemented using three different machine learning algorithms and two feature sets: one comprising selected and derived features and the other including all message features. The findings show that two of the suggested models that employ feature engineering perform almost equally to existing studies in identifying two types of position falsification attacks while exhibiting performance improvements in detecting other types. Furthermore, the results of evaluating the proposed models using another simulation exhibit a substantial improvement achieved by employing feature engineering techniques, where the average accuracy of the models is increased by 6.31-47%, depending on the algorithm used.
引用
收藏
页码:1939 / 1961
页数:23
相关论文
共 50 条
  • [1] Detection and Identification of Attacks in Vehicular Ad-Hoc Network
    Jeffane, Khaoula
    Ibrahimi, Khalil
    2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2016, : P58 - P62
  • [2] Securing Vehicular Ad-hoc Networks from Data Falsification Attacks
    Rawat, Danda B.
    Bista, Bhed Bahadur
    Yan, Gongjun
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 99 - 102
  • [3] Position Forging Attacks in Vehicular Ad Hoc Networks: Implementation, Impact and Detection
    Grover, Jyoti
    Gaur, Manoj Singh
    Laxmi, Vijay
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 701 - 706
  • [4] Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks
    Zhong, Hong
    Yang, Fan
    Wei, Lu
    Zhang, Jing
    Gu, Chengjie
    Cui, Jie
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT III, 2022, 13473 : 249 - 260
  • [5] Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks
    Zhang, Zhaoyi
    Lai, Yingxu
    Chen, Ye
    Wei, Jingwen
    Wang, Yuhang
    AD HOC NETWORKS, 2023, 141
  • [6] Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
    Grover, Jyoti
    Kumar, Deepak
    Sargurunathan, M.
    Gaur, M. S.
    Laxmi, Vijay
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 473 - 482
  • [7] Reliable Position Based Routing Algorithm in Vehicular Ad-hoc Network
    Park, KyeongDeuk
    Kim, HyunDong
    Lee, SuKyoung
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 344 - 349
  • [8] Early Detection of Incident using Vehicular Ad-hoc Network
    Singh, Bharat
    Hasbullah, Halabi
    Nayan, Md. Yunus
    Tahlan, Bhumit
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [9] Intrusion Detection Scheme in Vehicular Ad-Hoc Complex Network
    Zhang, Hong
    CICTP 2020: TRANSPORTATION EVOLUTION IMPACTING FUTURE MOBILITY, 2020, : 5250 - 5257
  • [10] Security methods against Black Hole attacks in Vehicular Ad-Hoc Network
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,