Disrupting the Cooperative Nature of Intelligent Transportation Systems

被引:0
作者
Almalki, Sultan Ahmed [1 ]
Abdel-Rahim, Ahmed [2 ]
Sheldon, Frederick T. [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
[2] Univ Idaho, Dept Civil & Environm Engn, Moscow, ID 83843 USA
来源
2022 IEEE WORLD AI IOT CONGRESS (AIIOT) | 2022年
关键词
cITS; IDS; Feature Selection; Machine Learning; NGSIM; AD HOC NETWORKS; MISBEHAVIOR DETECTION; TRUST MANAGEMENT; DETECTION MODEL; LOCALIZATION; HYBRID;
D O I
10.1109/AIIOT54504.2022.9817238
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The emergence of Cooperative Intelligent Transportation Systems (cITS) simplifies the exchange of traffic situational information among vehicles within "close" proximity, which facilitates smooth traffic flow, reduces the congestion and saves energy. However, with such advantages come challenges represented by attackers who would compromise the vehicle system components, spoof false telemetry and/or control signals causing serious problems such as congestion and/or accidents. There is need for security mechanism that can identify and detect such misbehavior in cITSs more dependably. Several studies have proposed Intrusion Detection Systems for cITS depending on the contextual data exchanged between neighboring nodes. Those solutions rely on classifiers trained and readjusted online to reflect the dynamic nature of the cITS environment. These models are usually trained with a set of features selected based on insufficient data. This makes the feature significance estimation inaccurate due to data insufficiency collected from the online systems immediately after the model was updated. In this paper we address this issue by introducing a Proportional Conditional Redundancy Coefficient (PCRC) technique. The technique is used in the Enhanced Joint Mutual Information (EJMI) feature selection for better feature significance estimation. At each iteration, the PCRC increases the redundancy of the candidate feature proportional to the number of already-selected features while taking into consideration the class label. Such conditional redundancy is estimated for the individual features, which gives the feature selection technique the ability to perceive the attack characteristics regardless of the common characteristics of the attack. Unlike existing works, the proposed technique increases the weight of the redundancy term proportional to the size of the selected set. Consequently, the likelihood that a feature is redundant, given the class label, increases when more features are added to the selected set. By applying the proposed EJMI to select the features from the Next Generation Simulation (NGSIM) dataset of cITS, more accurate IDS has been trained as shown by the evaluation results. This helps to better protect the nodes in cITS against the cyberattacks.
引用
收藏
页码:131 / 137
页数:7
相关论文
共 43 条
[1]   Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET [J].
A. Ghaleb, Fuad ;
Saeed, Faisal ;
Al-Sarem, Mohammad ;
Ali Saleh Al-rimy, Bander ;
Boulila, Wadii ;
Eljialy, A. E. M. ;
Aloufi, Khalid ;
Alazab, Mamoun .
ELECTRONICS, 2020, 9 (09) :1-17
[2]   Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Alazab, Mamoun ;
Shaid, Syed Zainudeen Mohd ;
Ghaleb, Fuad A. ;
Almalawi, Abdulmohsen ;
Ali, Abdullah Marish ;
Al-Hadhrami, Tawfik .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 :641-658
[3]   A User Mobility-Aware Fair Channel Assignment Scheme for Wireless Mesh Network [J].
Al-rimy, Bander Ali Saleh ;
Kamat, Maznah ;
Ghaleb, Fuad A. ;
Rohani, Mohd Foad ;
Abd Razak, Shukor ;
Shah, Mohd Arief .
COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 :531-541
[4]  
Almalki Sultan Ahmed, 2021, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), P1016, DOI 10.1109/IEMCON53756.2021.9623153
[5]   Feature selection using Joint Mutual Information Maximisation [J].
Bennasar, Mohamed ;
Hicks, Yulia ;
Setchi, Rossitza .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (22) :8520-8532
[6]  
Bissmeyer N, 2013, IEEE VEHIC NETW CONF, P198, DOI 10.1109/VNC.2013.6737612
[7]  
Brown G, 2012, J MACH LEARN RES, V13, P27
[8]   A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs [J].
Chen, Yi-Ming ;
Wei, Yu-Chih .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (02) :153-163
[9]  
Chen Z.-G., 2017, P INT C RES ADAPTIVE, P196
[10]   Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols [J].
Dietzel, Stefan ;
Petit, Jonathan ;
Heijenk, Geert ;
Kargl, Frank .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (04) :1505-1518