Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks

被引:0
作者
Elsadig, Muawia A. [1 ]
Altigani, Abdelrahman [2 ]
Mohamed, Yasir [3 ]
Mohamed, Abdul Hakim [3 ]
Kannan, Akbar [3 ]
Bashir, Mohamed [3 ]
Adiel, Mousab A. E. [4 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dammam 34212, Saudi Arabia
[2] Higher Coll Technol, Comp & Informat Sci, Al Ain 17561, U Arab Emirates
[3] Sharqiyah Univ, Coll Business Adm, Dept Informat Syst & Business Analyt, Ibra 400, Oman
[4] Sudan Audit Chamber, Port Sudan 33311, Sudan
关键词
VANETs; CICIDS2017; connected vehicles; cyber security; internet of things security; vehicular ad hoc networks; balanced dataset; imbalanced dataset; random oversampling; DoS; machine learning; deep learning; feature selection; PRIVACY-PRESERVING AUTHENTICATION; ARTIFICIAL-INTELLIGENCE; INTRUSION DETECTION; SCHEME; DEFENSE;
D O I
10.3390/wevj16060324
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. However, owing to their nature, the security of VANETs remains a significant concern. This study provides insightful information regarding VANET vulnerabilities and attacks. It investigates a number of security models that have recently been introduced to counter VANET security attacks with a focus on machine learning detection methods. This confirms that several challenges remain unsolved. Accordingly, this study introduces a lightweight machine learning model with a gain information feature selection method to detect VANET attacks. A balanced version of the well-known and recent dataset CISDS2017 was developed by applying a random oversampling technique. The developed dataset was used to train, test, and evaluate the proposed model. In other words, two layers of enhancements were applied-using a suitable feature selection technique and fixing the dataset imbalance problem. The results show that the proposed model, which is based on the Random Forest (RF) classifier, achieved excellent performance in terms of classification accuracy, computational cost, and classification error. It achieved an accuracy rate of 99.8%, outperforming all benchmark classifiers, including AdaBoost, decision tree (DT), K-nearest neighbors (KNNs), and multi-layer perceptron (MLP). To the best of our knowledge, this model outperforms all the existing classification techniques. In terms of processing cost, it consumes the least processing time, requiring only 69%, 59%, 35%, and 1.4% of the AdaBoost, DT, KNN, and MLP processing times, respectively. It causes negligible classification errors.
引用
收藏
页数:29
相关论文
共 80 条
[41]   A distributed intrusion detection framework for vehicular Ad Hoc networks via federated learning and Blockchain [J].
Mansouri, Fedwa ;
Tarhouni, Mounira ;
Alaya, Bechir ;
Zidi, Salah .
AD HOC NETWORKS, 2025, 167
[42]  
Marouane H., 2023, P INT S NETW COMP CO, P1
[43]   Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset [J].
Maseer, Ziadoon Kamil ;
Yusof, Robiah ;
Bahaman, Nazrulazhar ;
Mostafa, Salama A. ;
Foozy, Cik Feresa Mohd .
IEEE ACCESS, 2021, 9 :22351-22370
[44]   The Impact of Artificial Intelligence on Language Translation: A Review [J].
Mohamed, Yasir Abdelgadir ;
Khanan, Akbar ;
Bashir, Mohamed ;
Mohamed, Abdul Hakim H. M. ;
Adiel, Mousab A. E. ;
Elsadig, Muawia A. .
IEEE ACCESS, 2024, 12 :25553-25579
[45]   Machine Learning with Oversampling and Undersampling Techniques: Overview Study and Experimental Results [J].
Mohammed, Roweida ;
Rawashdeh, Jumanah ;
Abdullah, Malak .
2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, :243-248
[46]  
Muawia E., 2024, SteganographyThe Art of Hiding Information
[47]  
Nagarhalli Tatwadarshi P., 2021, Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2020), P1529, DOI 10.1109/ICICV50876.2021.9388380
[48]   A review of security attacks and intrusion detection in the vehicular networks [J].
Nandy, Tarak ;
Noor, Rafidah Md ;
Kolandaisamy, Raenu ;
Idris, Mohd Yamani Idna ;
Bhattacharyya, Sananda .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (02)
[49]   A Scheme for Distributed Vehicle Authentication and Revocation in Decentralized VANETs [J].
Naskar, Sujash ;
Brunetta, Carlo ;
Hancke, Gerhard ;
Zhang, Tingting ;
Gidlund, Mikael .
IEEE ACCESS, 2024, 12 :68648-68667
[50]   Optimization of RBF-SVM Kernel Using Grid Search Algorithm for DDoS Attack Detection in SDN-Based VANET [J].
Oluchi Anyanwu, Goodness ;
Nwakanma, Cosmas Ifeanyi ;
Lee, Jae-Min ;
Kim, Dong-Seong .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) :8477-8490