Abstract

Abstract This paper addresses the vulnerability of vehicular ad hoc networks (VANETs) to malicious attacks, specifically focusing on position falsification attacks. Detecting misbehaving vehicles in VANETs is challenging due to the dynamic nature of the network topology and vehicle mobility. The paper considers five types (constant attack, constant offset attack, random attack, random offset attack, and eventually stop attack) of position falsification attacks with varying traffic and attack densities, considered the most severe attacks in VANETs. To improve the detection of these attacks, a novel travel distance feature and an enhanced two-stage detection approach are proposed for classifying position falsification attacks in VANETs. The approach involves deploying the misbehavior detection system within roadside units (RSUs) by offloading computational work from vehicles (onboard units, or OBUs) to RSUs. The performance of the proposed approach was evaluated against different classifiers, including a wide range of paradigms (KNN, Decision Tree, and Random Forest), using the VeReMi dataset. Experimental results indicate that the proposed method based on Random Forest achieved an accuracy of 99.9% and an F1-Score of 99.9%, which are better not only than those achieved by KNN and Decision Tree but also than the most recent approaches in the literature survey.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.