Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks

被引:0
作者
Elsadig, Muawia A. [1 ]
Altigani, Abdelrahman [2 ]
Mohamed, Yasir [3 ]
Mohamed, Abdul Hakim [3 ]
Kannan, Akbar [3 ]
Bashir, Mohamed [3 ]
Adiel, Mousab A. E. [4 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dammam 34212, Saudi Arabia
[2] Higher Coll Technol, Comp & Informat Sci, Al Ain 17561, U Arab Emirates
[3] Sharqiyah Univ, Coll Business Adm, Dept Informat Syst & Business Analyt, Ibra 400, Oman
[4] Sudan Audit Chamber, Port Sudan 33311, Sudan
关键词
VANETs; CICIDS2017; connected vehicles; cyber security; internet of things security; vehicular ad hoc networks; balanced dataset; imbalanced dataset; random oversampling; DoS; machine learning; deep learning; feature selection; PRIVACY-PRESERVING AUTHENTICATION; ARTIFICIAL-INTELLIGENCE; INTRUSION DETECTION; SCHEME; DEFENSE;
D O I
10.3390/wevj16060324
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. However, owing to their nature, the security of VANETs remains a significant concern. This study provides insightful information regarding VANET vulnerabilities and attacks. It investigates a number of security models that have recently been introduced to counter VANET security attacks with a focus on machine learning detection methods. This confirms that several challenges remain unsolved. Accordingly, this study introduces a lightweight machine learning model with a gain information feature selection method to detect VANET attacks. A balanced version of the well-known and recent dataset CISDS2017 was developed by applying a random oversampling technique. The developed dataset was used to train, test, and evaluate the proposed model. In other words, two layers of enhancements were applied-using a suitable feature selection technique and fixing the dataset imbalance problem. The results show that the proposed model, which is based on the Random Forest (RF) classifier, achieved excellent performance in terms of classification accuracy, computational cost, and classification error. It achieved an accuracy rate of 99.8%, outperforming all benchmark classifiers, including AdaBoost, decision tree (DT), K-nearest neighbors (KNNs), and multi-layer perceptron (MLP). To the best of our knowledge, this model outperforms all the existing classification techniques. In terms of processing cost, it consumes the least processing time, requiring only 69%, 59%, 35%, and 1.4% of the AdaBoost, DT, KNN, and MLP processing times, respectively. It causes negligible classification errors.
引用
收藏
页数:29
相关论文
共 80 条
[1]   Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions [J].
Abdelfatah, Roayat, I ;
Abdal-Ghafour, Nermeen M. ;
Nasr, Mohamed E. .
IEEE ACCESS, 2022, 10 :1096-1115
[2]   Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network [J].
Abdelkreem, Eslam ;
Hussein, Sherif ;
Tammam, Ashraf .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) :1939-1961
[3]  
Adhikary K., 2020, Int. J. Innov. Technol. Explor. Eng, V9, P669, DOI [10.35940/ijitee.E2652.039520, DOI 10.35940/IJITEE.E2652.039520]
[4]   LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network [J].
Al-Shareeda, Mahmood A. ;
Anbar, Mohammed ;
Alazzawi, Murtadha A. ;
Manickam, Selvakumar ;
Al-Hiti, Ahmed Shakir .
IEEE ACCESS, 2020, 8 :170507-170518
[5]   A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework [J].
Al-Shareeda, Mahmood. A. A. ;
Manickam, Selvakumar .
IEEE ACCESS, 2023, 11 :46218-46228
[6]   VANET Network Traffic Anomaly Detection Using GRU-Based Deep Learning Model [J].
Almahadin, Ghayth ;
Aoudni, Yassine ;
Shabaz, Mohammad ;
Agrawal, Anurag Vijay ;
Yasmin, Ghazaala ;
Alomari, Esraa Saleh ;
Al-Khafaji, Hamza Mohammed Ridha ;
Dansana, Debabrata ;
Maaliw III, Renato Racelis .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) :4548-4555
[7]  
Alrehan AM, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS)
[8]   Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks [J].
Alsarhan, Ayoub ;
Alauthman, Mohammad ;
Alshdaifat, Esra'a ;
Al-Ghuwairi, Abdel-Rahman ;
Al-Dubai, Ahmed .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (5) :6113-6122
[9]   Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks [J].
Alsarhan, Ayoub ;
Al-Ghuwairi, Abdel-Rahman ;
Almalkawi, Islam T. ;
Alauthman, Mohammad ;
Al-Dubai, Ahmed .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) :3129-3152
[10]   Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC) [J].
Alshudukhi, Jalawi Sulaiman ;
Mohammed, Badiea Abdulkarem ;
Al-Mekhlafi, Zeyad Ghaleb .
IEEE ACCESS, 2020, 8 :222032-222040