Skip to main content
Log in

Protocol misbehavior detection framework using machine learning classification in vehicular Ad Hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

A novel approach is proposed to detect protocol misbehavior using state-of-the-art machine learning frameworks and entropy. Nodes in Vehicular Ad Hoc Networks (VANETs) use broadcast protocols to efficiently disseminate safety information, but nodes do not always behave according to the routing protocols. Misbehavior can be caused by a targeted attack, where an attacking vehicle can intentionally send or route malicious packets to harm. Due to the dynamic nature of nodes in VANETs and routing complexity, unintentional misbehavior can also happen due to hardware or software failures in the vehicle. We are not concerned with the targeted attacks, but rather explore how the unintentional misbehavior, which can cause statistical multi-hop routing protocols to operate as basic flooding protocols, can be detected and accurately classified. These methods and detection techniques are based on the IEEE 802.11p MAC layer and weighted p-persistence multi-hop routing protocol. The linear classification was done using the TensorFlow framework and evaluations were performed using the VEINS simulator using the p-persistence broadcast protocol in a US city area.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Han, C.-K., & Choi, H.-K. (2009). Effective discovery of attacks using entropy of packet dynamics. IEEE Network, 23, 5.

    Article  Google Scholar 

  2. Androulidakis, G., Chatzigiannakis, V., & Papavassiliou, S. (2009). Network anomaly detection and classification via opportunistic sampling. IEEE Network, 23(1), 6–12.

    Article  Google Scholar 

  3. Ranjan, S., et al. (2007). Dowitcher: Effective worm detection and containment in the internet core. In INFOCOM 2007. 26th IEEE international conference on computer communications. IEEE.

  4. Eckhoff, D., & Christoph, S. (2012). A multi-channel IEEE 1609.4 and 802.11 p EDCA model for the veins framework. In Proceedings of 5th ACM/ICST international conference on simulation tools and techniques for communications, networks and systems: 5th ACM/ICST international workshop on OMNet++. (Desenzano, Italy). OMNeT.

  5. Hohn, N., & Veitch, D. (2003). Inverting sampled traffic. In Proceedings of 3rd ACM SIGCOMM conference on Internet measurement. Miami Beach, Florida, USA.

  6. Duffield, N., Lund, C., & Thorup, M. (2005). Estimating flow distributions from sampled flow statistics. IEEE/ACM Transactions on Networking (TON), 13(5), 933–946.

    Article  Google Scholar 

  7. Grover, J., et al. (2011). Machine learning approach for multiple misbehavior detection in VANET. In International conference on advances in computing and communications. Springer, Berlin.

  8. Slavik, M., & Imad, M. (2011) "Applying machine learning to the design of multi-hop broadcast protocols for VANET." Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International. IEEE, 2011.

  9. Mejri, M. N., & Jalel, B.-O. (2014). Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks. In Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. ACM.

  10. Lai, W. K., Lin, M.-T., & Yang, Y.-H. (2015). A machine learning system for routing decision-making in urban vehicular Ad Hoc networks. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2015/374391.

    Article  Google Scholar 

  11. So, S., Prinkle, S., & Jonathan, P. (2018). Integrating plausibility checks and machine learning for misbehavior detection in VANET. In 2018 17th IEEE international conference on machine learning and applications (ICMLA). IEEE.

  12. Van der Heijden, R. W., Thomas, L., & Frank K. (2018). Veremi: A dataset for comparable evaluation of misbehavior detection in vanets. In International conference on security and privacy in communication systems. Springer, Cham.

  13. Gyawali, S., & Yi Q. (2019). Misbehavior detection using machine learning in vehicular communication networks. In ICC 2019–2019 IEEE international conference on communications (ICC). IEEE.

  14. Khan, U., Agrawal, S., & Silakari, S. (2015). A detailed survey on misbehavior node detection techniques in vehicular Ad Hoc networks. Information Systems Design and Intelligent Applications. https://doi.org/10.1007/978-81-322-2250-7_2.

    Article  Google Scholar 

  15. Salahuddin, M. A., Al-Fuqaha, A., & Guizani, M. (2015). Software-defined networking for RSU clouds in support of the internet of vehicles. IEEE Internet of Things Journal, 2(2), 133–144. https://doi.org/10.1109/JIOT.2014.2368356.

    Article  Google Scholar 

  16. Ghaleb, F. A., Zainal, A., Rassam, M. A., & Mohammed, F. (2017). An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications. In 2017 IEEE conference on application, information and network security (AINS) (pp. 13–18), Miri. https://doi.org/10.1109/AINS.2017.8270417

  17. Singh, P. K., Dash, M. K., Mittal, P., Nandi, S. K., & Nandi, S. (2019). Misbehavior detection in C-ITS using deep learning approach. Thermal Stresses Advanced Theory and Applications. https://doi.org/10.1007/978-3-030-16657-1_60.

    Article  Google Scholar 

  18. Contreras-Castillo, J., Zeadally, S., & Guerrero Ibañez, J. A. (2016). Solving vehicular ad hoc network challenges with Big Data solutions. IET Networks, 5(4), 81–84. https://doi.org/10.1049/iet-net.2016.0001.

    Article  Google Scholar 

  19. Alshammari, A., Zohdy, M. A., Debnath, D., & Corser, G. (2018). Classification approach for intrusion detection in vehicle systems. Wireless Engineering and Technology, 9, 79–94.

    Article  Google Scholar 

  20. Androulidakis, G., & Papavassiliou, S. (2008). Improving network anomaly detection via selective flow-based sampling. IET Communications, 2(3), 399–409.

    Article  Google Scholar 

  21. Sharshembiev, K., Seong-Moo Y., & Elbasher, E. (2018). Broadcast storm mitigation from unintentional misbehavior in vehicular ad hoc networks. In Computing and communication workshop and conference (CCWC), 2018 IEEE 8th Annual. IEEE.

  22. Sharshembiev, K., Seong-Moo Y., & Elbasher, E. (2019). Fail-Safe mechanism using entropy based misbehavior classification and detection in vehicular Ad Hoc networks. In IEEE international conference on cyber, physical and social computing (CPSCom-2019), Atlanta, USA.

  23. Abadi, M., & Agarwal, A., Barham, P., & Tensor, F. (2016). Large-scale machine learning on heterogeneous distributed systems. In Proceedings of the 12th USENIX symposium on operating systems design and implementation (OSDI’16) (Savannah, GA, USA.

  24. Ng, A. Y. (2004). Feature selection, L 1 versus L 2 regularization, and rotational invariance. In Proceedings of the twenty-first international conference on Machine learning. ACM.

  25. Shi, Y., & Wu, H. (2018). Data aggregation for road functionality detection based on machine leaning and vanet. Journal of Computers (Taiwan)., 29, 161–173. https://doi.org/10.3966/199115992018042902016.

    Article  Google Scholar 

  26. Thomas, R. W., & Vidal, J. M. (2017). Toward detecting accidents with already available passive traffic information. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1–4), Las Vegas, NV, https://doi.org/10.1109/CCWC.2017.7868428.

  27. El-Sayed, H., Sankar, S., Daraghmi, Y.-A., Tiwari, P., Rattagan, E., Mohanty, M., et al. (2018). Accurate traffic flow prediction in heterogeneous vehicular networks in an intelligent transport system using a supervised non-parametric classifier. Sensors, 18(6), 1696.

    Article  Google Scholar 

  28. Roscher, K., Nitsche, T., & Knorr, R. (2017). Know thy neighbor-a data-driven approach to neighborhood estimation in VANETs. In 2017 IEEE 86th vehicular technology conference (VTC-Fall) Toronto, ON (pp. 1–5) https://doi.org/10.1109/VTCFall.2017.8288303.

  29. Tang, Y., Cheng, N., Wen, Wu., Wang, M., Dai, Y., & Shen, X. (2019). Delay-minimization routing for heterogeneous VANETs with machine learning based mobility prediction. IEEE Transactions on Vehicular Technology, 68(4), 3967–3979.

    Article  Google Scholar 

  30. Jeong, Y. N., Su, R. S., & Byung, K. L. (2016). The lightweight autonomous vehicle self-diagnosis (LAVS) using machine learning based on sensors and multi-protocol IoT gateway. Sensors, 19(11), 2534.

    Article  Google Scholar 

  31. Benslimane, A., & Nguyen-Minh, H. (2016). Jamming attack model and detection method for beacons under multichannel operation in vehicular networks. IEEE Transactions on Vehicular Technology, 66(7), 6475–6488.

    Article  Google Scholar 

  32. Nguyen-Minh, H., Benslimane, A., & Deng, D.-J. (2016). Reliable broadcasting using polling scheme based receiver for safety applications in vehicular networks. Vehicular Communications, 4, 1–14.

    Article  Google Scholar 

  33. Benslimane, A. (2004). Optimized dissemination of alarm messages in vehicular Ad-Hoc networks (VANET). In 7th IEEE international conference HSNMC 2004, Toulouse France, LNCS 3079 (pp. 655–666), Springer Publisher.

  34. Sommer, C., German, R., & Dressler, F. (2010). Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Transactions on mobile computing, 10(1), 3–15.

    Article  Google Scholar 

  35. Krauß, S. (1998). Microscopic modeling of traffic flow: Investigation of collision free vehicle dynamics (Doctoral dissertation).

  36. Brockfeld, E., & Wagner, P. (2004). Testing and benchmarking of microscopic traffic flow simulation models. In Proceedings of 10th World conference transport research (WCTR).

  37. Sharshembiev, K. (xxxx). https://github.com/kumarshb/veins_research

  38. Johnson, J. M., & Khoshgoftaar, T. M. (2019). Survey on deep learning with class imbalance. Journal of Big Data, 6(1), 27.

    Article  Google Scholar 

  39. Walker, S. H., & Duncan, D. B. (1967). Estimation of the probability of an event as a function of several independent variables. Biometrika, 54(1–2), 167–179.

    Article  MathSciNet  Google Scholar 

  40. Beyer, K., Goldstein, J., Ramakrishnan, R., & Shaft, U. (1999). When is nearest neighbor meaningful? In Proceeding of international conference database theory (pp. 217–235).

  41. Box, G. E., & Tiao, G. C. (2011). Bayesian inference in statistical analysis (Vol. 40). New York: Wiley.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seong-Moo Yoo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharshembiev, K., Yoo, SM. & Elmahdi, E. Protocol misbehavior detection framework using machine learning classification in vehicular Ad Hoc networks. Wireless Netw 27, 2103–2118 (2021). https://doi.org/10.1007/s11276-021-02565-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-021-02565-7

Keywords

Navigation