Abstract
This paper proposes a novel approach to apply machine learning techniques to data collected from emerging cooperative intelligent transportation systems (C-ITS) using Vehicle-to-Vehicle (V2V) broadcast communications. Our approach considers temporal and spatial aspects of collected data to avoid correlation between the training set and the validation set. Connected vehicles broadcast messages containing safety-critical information at high frequency. Thus, detecting faulty messages induced by attacks is crucial for road-users safety. High frequency broadcast makes the temporal aspect decisive in building the cross-validation sets at the data preparation level of the data mining cycle. Therefore, we conduct a statistical study considering various fake position attacks. We statistically examine the difficulty of detecting the faulty messages, and generate useful features of the raw data. Then, we apply machine learning methods for misbehavior detection, and discuss the obtained results. We apply our data splitting approach to message-based and communication-based data modeling and compare our approach to traditional splitting approaches. Our study shows that traditional splitting approaches performance is biased as it causes data leakage, and we observe a 10% drop in performance in the testing phase compared to our approach. This result implies that traditional approaches cannot be trusted to give equivalent performance once deployed and thus are not compatible with V2V broadcast communications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Details about the dataset can be found here: https://anonymous.4open.science/r/5de28865-7f74-4360-b3fa-daa68c97bd83/.
- 2.
The sources and dataset for our work are provided here https://anonymous.4open.science/r/bf9bb344-bd86-4cec-9015-7f561b0c77e2/.
References
Arlot, S., Celisse, A., et al.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010)
Beale, M.H., Hagan, M.T., Demuth, H.B.: Neural network toolbox user’s guide. The Mathworks Inc (1992)
Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18, 1153–1176 (2015)
Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13, 21–27 (1967)
Devroye, L., Wagner, T.: Distribution-free performance bounds for potential function rules. IEEE Trans. Inf. Theory 25, 601–604 (1979)
ETSI EN 302 637-2 v1. 3.1-intelligent transport systems (ITS); vehicular communications; basic set of applications; part 2: Specification of cooperative awareness basic service. ETSI (2014)
Freund, Y., Schapire, R.E.: A desicion-theoretic generalization of on-line learning and an application to boosting. In: Vitányi, P. (ed.) EuroCOLT 1995. LNCS, vol. 904, pp. 23–37. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-59119-2_166
Ghaleb, F.A., Zainal, A., Rassam, M.A., Mohammed, F.: An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications. In: 2017 IEEE Conference on Application, Information and Network Security (AINS), pp. 13–18. IEEE (2017)
Gyawali, S., Qian, Y.: Misbehavior detection using machine learning in vehicular communication networks. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2019)
van der Heijden, R.W., Lukaseder, T., Kargl, F.: VeReMi: a dataset for comparable evaluation of misbehavior detection in VANETs. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) SecureComm 2018. LNICST, vol. 254, pp. 318–337. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01701-9_18
Kamel, J., Ansari, M.R., Petit, J., Kaiser, A., Jemaa, I.B., Urien, P.: Simulation framework for misbehavior detection in vehicular networks. IEEE Trans. Veh. Technol. 69(6), 6631–6643 (2020)
Louppe, G.: Understanding random forests: From theory to practice. preprint arXiv:1407.7502 (2014)
Monteuuis, J.P., Petit, J., Zhang, J., Labiod, H., Mafrica, S., Servel, A.: Attacker model for connected and automated vehicles. In: ACM Computer Science in Car Symposium (2018)
Monteuuis, J.P., Petit, J., Zhang, J., Labiod, H., Mafrica, S., Servel, A.: “My autonomous car is an elephant”: a machine learning based detector for implausible dimension. In: 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1–8. IEEE (2018)
Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1, 81–106 (1986)
Rish, I., et al.: An empirical study of the Naive Bayes classifier. In: IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, p. 41 (2001)
Roberts, D.R., et al.: Cross-validation strategies for data with temporal, spatial, hierarchical, or phylogenetic structure. Ecography 40, 913–929 (2017)
SAE: DSRC implementation guide (2010)
Singh, P.K., Gupta, S., Vashistha, R., Nandi, S.K., Nandi, S.: Machine learning based approach to detect position falsification attack in VANETs. In: Nandi, S., Jinwala, D., Singh, V., Laxmi, V., Gaur, M.S., Faruki, P. (eds.) ISEA-ISAP 2019. CCIS, vol. 939, pp. 166–178. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-7561-3_13
So, S., Petit, J., Starobinski, D.: Physical layer plausibility checks for misbehavior detection in v2x networks. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 84–93 (2019)
So, S., Sharma, P., Petit, J.: Integrating plausibility checks and machine learning for misbehavior detection in VANET. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 564–571. IEEE (2018)
Acknowledgment
This work is supported by the research chair Connected Cars and Cyber Security (C3S) founded by Renault, Télécom Paris, Fondation Mines-Télécom, Thales, Nokia, Valeo, and Wavestone.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Bouchouia, M.L., Monteuuis, JP., Jelassi, O., Labiod, H., Ben Jaballah, W., Petit, J. (2021). Spatial and Temporal Cross-Validation Approach for Misbehavior Detection in C-ITS. In: Cherfi, S., Perini, A., Nurcan, S. (eds) Research Challenges in Information Science. RCIS 2021. Lecture Notes in Business Information Processing, vol 415. Springer, Cham. https://doi.org/10.1007/978-3-030-75018-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-75018-3_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75017-6
Online ISBN: 978-3-030-75018-3
eBook Packages: Computer ScienceComputer Science (R0)