Abstract
An essential element in the smart city vision is providing safe and secure journeys via intelligent vehicles and smart roads. Vehicular ad hoc networks (VANETs) have played a significant role in enhancing road safety where vehicles can share road information conditions. However, VANETs share the same security concerns of legacy ad hoc networks. Unlike exiting works, we consider, in this paper, detection a common attack where nodes modify safety message or drop them. Unfortunately, detecting such a type of intrusion is a challenging problem since some packets may be lost or dropped in normal VANET due to congestion without malicious action. To mitigate these concerns, this paper presents a novel scheme for minimizing the invalidity ratio of VANET packets transmissions. In order to detect unusual traffic, the proposed scheme combines evidences from current as well as past behaviour to evaluate the trustworthiness of both data and nodes. A new intrusion detection scheme is accomplished through a four phases, namely, rule-based security filter, Dempster–Shafer adder, node’s history database, and Bayesian learner. The suspicion level of each incoming data is determined based on the extent of its deviation from data reported from trustworthy nodes. Dempster–Shafer’s theory is used to combine multiple evidences and Bayesian learner is adopted to classify each event in VANET into well-behaved or misbehaving event. The proposed solution is validated through extensive simulations. The results confirm that the fusion of different evidences has a significant positive impact on the performance of the security scheme compared to other counterparts.
Similar content being viewed by others
References
Alrawashdeh, K., & Purdy, C. (2016). Toward an online anomaly intrusion detection system based on deep learning. In 15th IEEE international conference on machine learning and applications (ICMLA) (pp. 195–200). IEEE.
Alsarhan, A., Al-Dubai, A. Y., Min, G., Zomaya, A. Y., & Bsoul, M. (2018). A new spectrum management scheme for road safety in smart cities. IEEE Transactions on Intelligent Transportation Systems, 19(11), 3496–3506.
Altwaijry, H. (2013). Bayesian based intrusion detection system. In IAENG transactions on engineering technologies (pp. 29–44). Springer.
Bahrololum, M., Salahi, E., & Khaleghi, M. (2009). Anomaly intrusion detection design using hybrid of unsupervised and supervised neural network. International Journal of Computer Networks & Communications (IJCNC), 1(2), 26–33.
Bhoi, S. K., & Khilar, P. M. (2013). Vehicular communication: A survey. IET Networks, 3(3), 204–217.
Bitam, S., Mellouk, A., & Zeadally, S. (2015). Vanet-cloud: A generic cloud computing model for vehicular ad hoc networks. IEEE Wireless Communications, 22(1), 96–102.
Farid, D. M., & Rahman, M. Z. (2010). Attribute weighting with adaptive nbtree for reducing false positives in intrusion detection. arXiv preprint arXiv:1005.0919.
Han, J., Kamber, M., & Pei, J. (2011). Data mining concepts and techniques (3rd ed.). Burlington: Morgan Kaufmann.
Huang, Z., Ruj, S., Cavenaghi, M. A., Stojmenovic, M., & Nayak, A. (2014). A social network approach to trust management in vanets. Peer-to-Peer Networking and Applications, 7(3), 229–242.
Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PloS ONE, 11(6), e0155781.
Katar, C. (2006). Combining multiple techniques for intrusion detection. International Journal of Computer Science and Network Security, 6(2B), 208–218.
Kumar, A., Singh, J. R., Singh, D., & Dewang, R. K. (2016). A historical feedback based misbehavior detection (hfmd) algorithm in vanet. In 2nd International conference on computational intelligence and networks (CINE) (pp. 15–22). IEEE.
Lo, N. W., & Tsai, H. C. (2007). Illusion attack on vanet applications-a message plausibility problem. In IEEE Globecom workshops (pp. 1–8). IEEE.
Ludwig, S. A. (2017). Intrusion detection of multiple attack classes using a deep neural net ensemble. In IEEE Symposium series on computational intelligence (SSCI) (pp. 1–7). IEEE.
Minhas, U. F., Zhang, J., Tran, T., & Cohen, R. (2010). A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 41(3), 407–420.
Narla, S. R. (2013). The evolution of connected vehicle technology: From smart drivers to smart cars to self-driving cars. ITE Journal, 83(7), 22–26.
Sedjelmaci, H., Senouci, S. M., & Abu-Rgheff, M. A. (2014). An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks. IEEE Internet of Things Journal, 1(6), 570–577.
Shafer, G. (1976). A mathematical theory of evidence (Vol. 42). Princeton: Princeton University Press.
Sharma, S., & Kaul, A. (2018). A survey on intrusion detection systems and honeypot based proactive security mechanisms in vanets and vanet cloud. Vehicular Communications, 12, 138–164.
Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.
Soleymani, S. A., Abdullah, A. H., Zareei, M., Anisi, M. H., Vargas-Rosales, C., Khan, M. K., et al. (2017). A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access, 5, 15619–15629.
Sun, G., Sun, S., Sun, J., Yu, H., Du, X., & Guizani, M. (2019). Security and privacy preservation in fog-based crowd sensing on the internet of vehicles. Journal of Network and Computer Applications, 134, 89–99.
Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S. N., & Kherani, A. A. (2010). Application of secondary information for misbehavior detection in vanets. In International conference on research in networking (pp. 385–396). Springer.
Wang, J., Zhang, Y., Wang, Y., & Gu, X. (2016). Rprep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled vanets. International Journal of Distributed Sensor Networks, 12(3), 6138251.
Zaidi, K., Milojevic, M. B., Rakocevic, V., Nallanathan, A., & Rajarajan, M. (2015). Host-based intrusion detection for vanets: A statistical approach to rogue node detection. IEEE Transactions on Vehicular Technology, 65(8), 6703–6714.
Zhang, C., Chen, K., Zeng, X., & Xue, X. (2018). Misbehavior detection based on support vector machine and dempster-shafer theory of evidence in vanets. IEEE Access, 6, 59860–59870.
Zhang, J., Huang, L., Xu, H., Xiao, M., Guo, W. (2012). An incremental bp neural network based spurious message filter for vanet. In International conference on cyber-enabled distributed computing and knowledge discovery (pp. 360–367). IEEE.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alsarhan, A., Al-Ghuwairi, AR., Almalkawi, I.T. et al. Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks. Wireless Pers Commun 117, 3129–3152 (2021). https://doi.org/10.1007/s11277-020-07797-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07797-y