ML Approach
ML Approach
1 Introduction
The Vehicular Ad-hoc Network (VANET) is an emerging type of Mobile Ad-
hoc Networks (MANETs) with excellent applications in the intelligent traffic
system. Despite the promising future of VANETs, they are known to be sensitive
to various misbehaves, ranging from malicious attacks to random failures [15].
Considering the safety of vehicles is directly related to human lives, security is
one of the main challenges in VANETs. Various detection methods have been
proposed in the past decade to detect and mitigate Intrusions in VANETs. Most
of these presented methods overlook the security of senior units or just simply
rely on a set of predefined and fixed threshold(s) to secure the senior units.
However, senior units, Road Side Units (RSUs) and Cluster Heads (CHs)
(see Sect. 2.1), are not guaranteed to be safe in a VANET. Although RSUs are
built to be robust, yet intruders can still impair the system through physical
c Springer Nature Switzerland AG 2018
M. Qiu (Ed.): SmartCom 2018, LNCS 11344, pp. 417–426, 2018.
https://doi.org/10.1007/978-3-030-05755-8_41
418 Y. Zeng et al.
attacking RSUs or impersonating as an RSU [8]. Not to mention that CHs are
easier than RSUs to be impersonated or overtook [10]. The overlook of those
senior units’ security can lead to serious consequences [10]. Furthermore, con-
sidering the highly dynamic nature of VANETs, it is not achievable to find a set
of fixed thresholds to detect malicious nodes. In contrast, our online Machine
Learning based (ML-based) intrusion detection method can automatically deter-
mine whether a node is malicious or not considering all available data from the
VANET.
In addition, we argue that RSUs cannot be marked simply as either malicious
or cooperative, taken that cooperative RSUs might behave abnormally due to
the nature of VANETs. One example is illustrated in Fig. 1. We find that RSU
2 drops packets from all CHs that connected to because different reasons, which
will make it be detected as an intruder without further investigation. However,
it is actually a cooperative RSU which dops packages out of malicious intent.
Meanwhile, RSU 1 pretends to be a normal RSU and answers requests from CH 4
and CH 2, which will be classified as a cooperative RSU by most of the methods
presented, yet it is an intruder who might spoof other units in the VANET [3].
Both misclassifications will lead to extra costs and dangerous outcomes. Hence,
we clearly see from this example that a trust system, where RSUs are motivated
to provide trustworthy information, is required in order to mitigate the influence
of vulnerable nodes and fake RSUs.
presented in RSUs to detect malicious CHs. Finally, in local scale, online Support
Vector Machine (SVM) is trained and implemented to detect malicious vehicles
inside clusters.
This paper’s contribution can be summarized as follows: (1) We apply game
theory to secure senior units which proved to be more reliable than presented
works under the dramatically changing environment in VANETs. (2) ANN is
implemented in our methods in RSUs, which is known to be more precise than
most presented classification methods in VANETs. (3) We apply simplified SVM
in vehicles, which is a light-weight detection method that suits the resource-
constrained nature of vehicles. (4) To our best knowledge, this is the first through
intrusion detection method that concerning each level of nodes in detail. This
presented method is proved to outperform presented methods dramatically when
senior level nodes are damaged.
The rest of this article is divided into five sections. Section 2 presented back-
ground information and problem statements. The Senior2Local detection method
is elaborated in Sect. 3. The experimental result is shown in Sect. 4. Finally,
Sect. 5 gives the concluding remark of this paper.
2 Problem Statement
2.1 Backgrounds of VANETs
A VANET as a whole consists of RSUs, CHs, Multi-Point Relays (MPRs), and
normal vehicles. Each vehicle, including CH and MPR, is equipped with tech-
nologies that allow communications between each point possible.
Globally, RSUs are capable of communicating with other RSUs via physical
networks, e.g., data center network [6]. This character also empowers RSUs to
use cloud computing and regardless of the resource constraint. An RSU can
connect to every vehicle in the area that covered by its wireless network directly.
All those RSU-based connections together build up the global view of a VANET.
From the local perspective, this connection between RSU and its correlative
cars usually including several vehicular clusters. These clusters follow Vehicu-
lar Ad-Hoc Network Quality of Service Optimized Link State Routing (VANET
QoS-OLSR) [13], which is a clustering protocol that considers a trade-off between
the QoS requirements and the high mobility metrics in VANET. For every cluster
concerned, a CH is selected to facilitate the management of each cluster. Then,
these heads are responsible for selecting a set of specific vehicles charged of
transmitting the network topology information through messages called Topol-
ogy Control (TC) and forwarding the packets. Such nodes are called MPRs.
Problems can arise no matter globally or locally to impair the VANET due
to the vulnerability of RSUs and vehicles.
a specific RSU which is physically vulnerable, then, there are chances that the
data transmitted through this RSU is not trust-worthy. Another issue is the
impersonation [8]. Intruders can impersonate as RSUs, spoofing service adver-
tisements or safety messages. Those two major issues with RSUs are illustrated
in Fig. 2.
In Fig. 1, only RSU 1 is working properly. RSU 1 can exchange data with
CH 4 and oversees the related cars in the cluster continuously. Hence security
actions can take place as expected, a high security of this area can be ensured.
RSU 2 is actually a vehicular intruder impersonating as a normal RSU.
Firstly, this leads CH 3 and other cooperative cars in the area covered by RSU 2,
e.g., NODE 4 and NODE 5, try to exchange important data with this intruder,
hence important information of cars can be leaked, and extra transporting con-
sumption is required. Secondly, this intruder can take cover for CH 2, which is
a malicious CH performing malicious actions. This directly leads MPR 2 and
NODE 2, which all are malicious vehicles, take malicious actions barbarically,
which might even cost massive death.
RSU 3 is an RSU which is physically damaged which cannot receive packages
from CH 1 or CH 4. Despite the driving experience in the related area is damp-
ened, the malicious CH 1 will remain undetected. This failure of detecting CH 1
leads NODE 1 and MPR 1 continuously perform malicious actions barbarically,
which surely will damage the whole VANET.
Locally, if intruders remain undetected, especially when intruders play a roll
in the cluster, serious consequences can happen [9]. One dangerous scenario is
when the head of the cluster is malicious. As a CH, it can perform malicious
actions without being detected by other vehicles. Malicious CHs can send fake
data or spam to other members in the cluster. More dangerously, a malicious CH
Senior2Local Intrusion Detection Method 421
can take cover for other malicious nodes in the cluster. It can choose a malicious
node as an MPR, which can perform Denial of Service (DoS) or inject fake data
to other clusters. If the CH is not malicious, however, malicious nodes in the
cluster can be isolated and a trust-worthy node can be chosen as MPR. Hence,
the guarantee of CH is trust-worthy is important for the whole cluster.
As RSUs are not guaranteed to be cooperative constantly, we assume RSUs
can be intruders or real RSUs which have chances to perform packages drop, like
examples mentioned in [8]. As for CHs, different from other presented methods
which regard them as trust-worthy all the time, we treat them same as other
normal vehicles, which can be overtaken by intruders.
In this section, we will illustrate the details of our proposed ML-based intru-
sion detection method for VANETs. Senior2Local Intrusion Detection method
is divided into two functional modules: Global Intrusion Detection and Propaga-
tion, Local Intrusion Detection and Propagation.
In this process, our presented model will firstly analyze all the CHs in the cluster
based on pre-trained ANN that is implemented in RSUs. Although ANNs can
detect intruders effectively, they normally require a high computational resource
to train and implement. In a VANET, only RSUs are concerned as unlimited in
the resource, which is suitable to use ANN to detect malicious CHs. The ANN
in our proposed method is firstly trained and tested on a fuzzification dataset
which was collected from a trace file that was generated utilizing GloMoSim 2.03
[14] to model the VANET and its environment. This fuzzification ANN-based
detector is inspired by the work [1], yet we will only use this ANN in RSUs to
detect malicious CHs. Furthermore, we trained our ANN to output a real number
ranging from −1 to 1, which denotes the belief of the CH being cooperative or
malicious. If the number is positive, then the CH is marked as cooperative,
otherwise, it is marked as malicious. The absolute value of the number BasBili,
denotes the basic belief of CH being that way. The total accuracy of the training
process is 99.97%. The true positive rate on testing data is 99.91%, and the true
negative rate on testing data is 99.84%.
After we implement this well-trained ANN, RSUs are able to detect malicious
CHs that connected directly to themselves individually. Then, a trust system
is built up to evaluate each RSU’s credit. Trust is constructed by exchanging
detection belief about CHs based on their previous interactions. Practically, fake
RSUs may be tempted to collusion with each other to provide fake detection
results over CHs, which may lead to misleading results. To overcome scenarios
that most multiple RSUs are imprisoned by intruders, we adopt the credibility
update function and a belief function transplanted from [11] with the aim of
422 Y. Zeng et al.
only when two CHs contacts. This exchange of the M aliSet and the CoopSet
can prevent malicious vehicles run away from a cluster to a new cluster with-
out being noticed. After the detection and propagation, further monitoring will
only concern those cooperative nodes, and malicious nodes will be banned from
cluster to cluster for security reasons.
Accuracy Rate
(1)
= 100% × Number of Correctly Detected Malicious Nodes
Total Number of Detected Malicious Nodes
similar fake data with others. The fake data is actually generated from the real
detection results, yet we let those fake RSUs report malicious when they detect
cooperative nodes, and vice versa.
99
98.5 98
Attack Detection Rate(%)
97
97.5 96
Accuracy(%)
Senior2Local 95 Senior2Local
96.5
SVM-case 94 SVM-case
CEAP CEAP
93
95.5
92
94.5 91
90
93.5 89
50 100 150 200 50 100 150 200
Number of Vehicles Number of Vehicles
5 Conclusion
In this paper, we presented Senior2Local, a novel ML-based intrusion detection
method for VANETs. We used game theory to build a trust system for RSUs.
ANN is implemented in our model based on trust-worthy RSUs to securing CHs.
After removing malicious CHs, a light-weight SVM is used to detect malicious
MPRs cluster to cluster locally. The experimental result shows that Senior2Local
is more robust and trust-worthy comparing to presented ML-based detection
methods.
426 Y. Zeng et al.
References
1. Alheeti, K.M.A., Gruebler, A., McDonald-Maier, K.D.: An intrusion detection sys-
tem against black hole attacks on the communication network of self-driving cars.
In: 2015 Sixth International Conference on Emerging Security Technologies (EST),
pp. 86–91. IEEE (2015)
2. Chim, T.W., Yiu, S., Hui, L.C., Li, V.O.: Security and privacy issues for inter-
vehicle communications in vanets. In: 6th Annual IEEE Communications Society
Conference on Sensor, Mesh and Ad Hoc Communications and Networks Work-
shops, 2009, SECON Workshops 2009, pp. 1–3. IEEE (2009)
3. Gai, K., Qiu, M., Ming, Z., Zhao, H., Qiu, L.: Spoofing-jamming attack strategy
using optimal power distributions in wireless smart grid networks. IEEE Trans.
Smart Grid 8(5), 2431–2439 (2017)
4. Kumar, N., Chilamkurti, N.: Collaborative trust aware intelligent intrusion detec-
tion in vanets. Comput. Electr. Eng. 40(6), 1981–1996 (2014)
5. Li, W., Joshi, A., Finin, T.: SVM-case: an SVM-based context aware security
framework for vehicular ad-hoc networks. In: 2015 IEEE 82nd Vehicular Technol-
ogy Conference (VTC Fall), pp. 1–5. IEEE (2015)
6. Liu, J., Wan, J., Zeng, B., Wang, Q., Song, H., Qiu, M.: A scalable and quick-
response software defined vehicular network assisted by mobile edge computing.
IEEE Commun. Mag. 55(7), 94–100 (2017)
7. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile
adhoc networks. In: Proceedings of the 6th Annual International Conference on
Mobilecomputing and Networking, pp. 255–265. ACM (2000)
8. Qian, Y., Moayeri, N.: Design of secure and application-oriented VANETs. In: 2008
IEEE Vehicular Technology Conference, VTC Spring 2008, pp. 2794–2799. IEEE
(2008)
9. Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric
secure data scheme using attribute-based semantic access controls for mobile clouds
in financial industry. Futur. Gener. Comput. Syst. 80, 421–429 (2018)
10. Sharma, S., Kaul, A.: A survey on intrusion detection systems and honeypot based
proactive security mechanisms in VANETs and VANET cloud. Vehic. Commun.
(2018)
11. Wahab, O.A., Bentahar, J., Otrok, H., Mourad, A.: Towards trustworthy multi-
cloud services communities: a trust-based hedonic coalitional game. IEEE Trans.
Serv. Comput. 11(1), 184–201 (2018)
12. Wahab, O.A., Mourad, A., Otrok, H., Bentahar, J.: CEAP: SVM-based intelligent
detection model for clustered vehicular ad hoc networks. Expert. Syst. Appl. 50,
40–54 (2016)
13. Wahab, O.A., Otrok, H., Mourad, A.: Vanet QoS-OLSR: QoS-based clustering
protocol for vehicular ad hoc networks. Comput. Commun. 36(13), 1422–1435
(2013)
14. Zeng, X., Bagrodia, R., Gerla, M.: GloMoSim: a library for parallel simulation
of large-scale wireless networks. In: ACM SIGSIM Simulation Digest, vol. 28, pp.
154–161. IEEE Computer Society (1998)
15. Zhu, M., et al.: Public vehicles for future urban transportation. IEEE Trans. Intell.
Transp. Syst. 17(12), 3344–3353 (2016)