Novel position falsification attacks detection in the Internet of Vehicles using machine learning
In an Internet of Vehicles (IoV) network, vehicles periodically broadcast Basic Safety Messages (BSMs) that contain the vehicle's current position, speed, and acceleration. Safety-critical applications like blind-spot warning and lane change warning systems use these BSMs to ensure the safety o...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/167113 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-167113 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1671132023-06-19T08:58:58Z Novel position falsification attacks detection in the Internet of Vehicles using machine learning Ilango, Harun Surej Ma, Maode Su, Rong School of Electrical and Electronic Engineering 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV) Engineering Engineering::Electrical and electronic engineering Engineering::Electrical and electronic engineering::Wireless communication systems Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Internet of Vehicles Position Falsification Attacks Machine Learning Novel Attack Detection Basic Safety Messages (BSMs) VeReMi Dataset Vehicle-to-Vehicle (V2V) Communication Anomaly Detection In an Internet of Vehicles (IoV) network, vehicles periodically broadcast Basic Safety Messages (BSMs) that contain the vehicle's current position, speed, and acceleration. Safety-critical applications like blind-spot warning and lane change warning systems use these BSMs to ensure the safety of road users. However, an attacker can affect the efficacy of such applications by injecting false information into the messages. One such attack is the position falsification attack, where the attacker inserts incorrect information regarding the vehicle's position in the BSMs. The literature has explored the use of Misbehavior Detection Systems (MDSs) to detect position falsification attacks. But the limitation of the existing MDSs is that they are signature-based and require prior knowledge about the attacks for effective detection. To overcome this shortcoming, we propose a Novel Position Falsification Attack Detection System for the Internet of Vehicles (NPFADS for the IoV)that learns and detects new position falsification attacks emerging in IoV networks. The performance of NPFADS is quantitatively measured using the metrics precision, recall, F1 score, and ROC. The Vehicular Reference Misbehavior (VeReMi) dataset is used as the benchmark to analyze the performance of NPFADS. The performance of NPFADS is compared to existing MDSs in the literature, and the analysis shows that NPFADS performs on par with the existing signature-based detection models even when initialized with zero initial knowledge. Agency for Science, Technology and Research (A*STAR) Submitted/Accepted version This research is supported by A*STAR, Singapore under its RIE2020 Advanced Manufacturing and Engineering (AME) Industry Alignment Fund – Pre Positioning (IAF-PP) (Award A19D6a0053). 2023-05-11T06:17:40Z 2023-05-11T06:17:40Z 2022 Conference Paper Ilango, H. S., Ma, M. & Su, R. (2022). Novel position falsification attacks detection in the Internet of Vehicles using machine learning. 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV), 955-960. https://dx.doi.org/10.1109/ICARCV57592.2022.10004369 9781665476874 https://hdl.handle.net/10356/167113 10.1109/ICARCV57592.2022.10004369 2-s2.0-85146758110 955 960 en A19D6a0053 © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ICARCV57592.2022.10004369. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering Engineering::Electrical and electronic engineering Engineering::Electrical and electronic engineering::Wireless communication systems Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Internet of Vehicles Position Falsification Attacks Machine Learning Novel Attack Detection Basic Safety Messages (BSMs) VeReMi Dataset Vehicle-to-Vehicle (V2V) Communication Anomaly Detection |
spellingShingle |
Engineering Engineering::Electrical and electronic engineering Engineering::Electrical and electronic engineering::Wireless communication systems Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Internet of Vehicles Position Falsification Attacks Machine Learning Novel Attack Detection Basic Safety Messages (BSMs) VeReMi Dataset Vehicle-to-Vehicle (V2V) Communication Anomaly Detection Ilango, Harun Surej Ma, Maode Su, Rong Novel position falsification attacks detection in the Internet of Vehicles using machine learning |
description |
In an Internet of Vehicles (IoV) network, vehicles periodically broadcast Basic Safety Messages (BSMs) that contain the vehicle's current position, speed, and acceleration. Safety-critical applications like blind-spot warning and lane change warning systems use these BSMs to ensure the safety of road users. However, an attacker can affect the efficacy of such applications by injecting false information into the messages. One such attack is the position falsification attack, where the attacker inserts incorrect information regarding the vehicle's position in the BSMs. The literature has explored the use of Misbehavior Detection Systems (MDSs) to detect position falsification attacks. But the limitation of the existing MDSs is that they are signature-based and require prior knowledge about the attacks for effective detection. To overcome this shortcoming, we propose a Novel Position Falsification Attack Detection System for the Internet of Vehicles (NPFADS for the IoV)that learns and detects new position falsification attacks emerging in IoV networks. The performance of NPFADS is quantitatively measured using the metrics precision, recall, F1 score, and ROC. The Vehicular Reference Misbehavior (VeReMi) dataset is used as the benchmark to analyze the performance of NPFADS. The performance of NPFADS is compared to existing MDSs in the literature, and the analysis shows that NPFADS performs on par with the existing signature-based detection models even when initialized with zero initial knowledge. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Ilango, Harun Surej Ma, Maode Su, Rong |
format |
Conference or Workshop Item |
author |
Ilango, Harun Surej Ma, Maode Su, Rong |
author_sort |
Ilango, Harun Surej |
title |
Novel position falsification attacks detection in the Internet of Vehicles using machine learning |
title_short |
Novel position falsification attacks detection in the Internet of Vehicles using machine learning |
title_full |
Novel position falsification attacks detection in the Internet of Vehicles using machine learning |
title_fullStr |
Novel position falsification attacks detection in the Internet of Vehicles using machine learning |
title_full_unstemmed |
Novel position falsification attacks detection in the Internet of Vehicles using machine learning |
title_sort |
novel position falsification attacks detection in the internet of vehicles using machine learning |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/167113 |
_version_ |
1772827675324317696 |