Skip to main content

Misbehavior Detection Based on Ensemble Learning in VANET

  • Conference paper
Advanced Computing, Networking and Security (ADCONS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7135))

Abstract

Detection of misbehaviors in Vehicular Ad Hoc Networks (VANETs) using machine learning methods has not been investigated extensively. In VANET, an illegitimate vehicle may transmit inaccurate messages to trigger an un- avoidable situation. In this paper, we present an ensemble based machine learning approach to classify misbehaviors in VANET. The performance of classifiers used for classification depends on the induction algorithms. We exploit the strengths of different classifiers using an ensemble method that combines the results of individual classifiers into one final result in order to achieve higher detection accuracy. Proposed security framework to classify different types of misbehaviors is implemented using WEKA. Features of nodes participating in VANET are extracted by performing experiments in NCTUns-5.0 simulator with different simulation scenarios (varying the number of legitimate and misbehaving nodes). We evaluate ensemble method using five different base inducers (Naive Bayes, IBK, RF, J48, Adaboost(J48)). We also show that ensemble based approach is more efficient in classifying multiple misbehaviors present in VANET as compared to base classifiers used for classification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aijaz, A., Bochow, B., Dtzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmller, T.: Attacks on Inter Vehicle Communication Systems - an Analysis. In: Proc. WIT, pp. 189–194 (2006)

    Google Scholar 

  2. Grover, J., Prajapati, N.K., Laxmi, V., Gaur, M.S.: Machine Learning Approach for Multiple Misbehavior Detection in VANET. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011. CCIS, vol. 192, pp. 644–653. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. University of Waikato: Open Source Machine Learning Software Weka, http://www.cs.waikato.ac.nz/ml/weka

  4. Raya, M., Hubaux, J.P.: Securing Vehicular Ad Hoc Networks. Journal of Computer Security 15(1), 39–68 (2007)

    Google Scholar 

  5. Ghosh, M., Varghese, A., Kherani, A.A., Gupta, A.: Distributed Misbehavior Detection in VANETs. In: Proceedings of the 2009 IEEE Conference on Wireless Communications and Networking Conference, pp. 2909–2914. IEEE (2009)

    Google Scholar 

  6. Ghosh, M., Varghese, A., Kherani, A.A., Gupta, A., Muthaiah, S.N.: Detecting Misbehaviors in VANET with Integrated Root-cause Analysis. Ad Hoc Netw. 8, 778–790 (2010)

    Article  Google Scholar 

  7. Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.P.: On data centric trust establishment in ephemeral ad hoc networks. In: IEEE INFOCOM (2008)

    Google Scholar 

  8. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of Misbehaving and Faulty nodes in Vehicular Networks. IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Networks 25(8), 1557–1568 (2007)

    Article  Google Scholar 

  9. Grover, J., Gaur, M.S., Laxmi, V.: Position Forging Attacks in Vehicular Ad Hoc Networks: Implementation, Impact and Detection. In: Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011), pp. 701–706. IEEE (2011)

    Google Scholar 

  10. Grover, J., Kumar, D., Sargurunathan, M., Gaur, M.S., Laxmi, V.: Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 473–482. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Grover, J., Gaur, M.S., Laxmi, V.: A Novel Defense Mechanism against Sybil Attacks in VANET. In: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 249–255. ACM (2010)

    Google Scholar 

  12. Schmidt, R.K., Leinmuller, T., Schoch, E., Held, A., Schafer, G.: Vehicle Behavior Analysis to Enhance Security in VANETs. In: Vehicle to Vehicle Communication, V2VCOM (2008)

    Google Scholar 

  13. Kim, T.H., Studer, H., Dubey, R., Zhang, X., Perrig, A., Bai, F., Bellur, B., Iyer, A.: VANET Alert Endorsement Using Multi-Source Filters. In: Proceedings of the Seventh ACM International Workshop on Vehicular Internetworking, pp. 51–60. ACM (2010)

    Google Scholar 

  14. NCTUns 5.0, Network Simulator and Emulator, http://NSL.csie.nctu.edu.tw/nctuns.html

  15. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann (1999)

    Google Scholar 

  16. Fawcett, T.: An introduction to ROC analysis. Pattern Recognition Letter 27(8), 861–874 (2006)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grover, J., Laxmi, V., Gaur, M.S. (2012). Misbehavior Detection Based on Ensemble Learning in VANET. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29280-4_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29279-8

  • Online ISBN: 978-3-642-29280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics