You are on page 1of 13

23906 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO.

12, DECEMBER 2022

LSTM-Based Intrusion Detection System for


VANETs: A Time Series Classification
Approach to False Message Detection
Yantao Yu , Graduate Student Member, IEEE, Xin Zeng , Xiaoping Xue , Member, IEEE, and Jingxiao Ma

Abstract— In vehicular ad hoc networks (VANETs), vehicles real time by broadcasting messages. These messages enable
broadcast emergency messages and beacon messages, which drivers to perceive traffic conditions beyond their visual range,
enable drivers to perceive traffic conditions beyond their visual thus helping drivers to take action in advance to avoid traffic
range thus improve driving safety. However, internal attackers
can launch a false message attack for selfish purposes by accidents [2].
reporting a non-existent traffic incident in emergency messages. Due to the safety-critical nature of the messages exchange
Moreover, some collusion attackers may spread bogus beacon in VANETs, it is vital to ensure the security of VANETs,
messages cooperatively to make the bogus traffic incident more especially the authenticity of messages. In order to realize
deceptive. To improve the accuracy of false emergency message safety applications, vehicles are allowed to broadcast two types
detection, we propose a novel intrusion detection system (IDS)
based on time series classification and deep learning. Consid- of messages: beacon messages, which are periodic and used to
ering that traffic parameters are highly correlated with time, show the basic motion state of a vehicle in the network, and
we collect time series of traffic parameters closely related to emergency messages, which are used to report the occurrences
traffic incidents from messages of vehicles near reported traffic of traffic incidents (such as accidents, poor road conditions,
incidents as time series feature vectors. To recognize the pattern and congestion, etc.). However, bogus information can be
of traffic parameters changing over time more accurately, a traffic
incident classifier based on long short-term memory (LSTM) injected into the network intentionally (attacker) or uninten-
is designed and trained using time series feature vectors from tionally (faults) [3]. Malicious attackers can broadcast false
both normal and collusion attack scenarios. Based on the emergency messages (like false congestion information) to
classification result, the authenticity of the emergency message change the normal behavior of other vehicles for their benefit.
can be determined. Finally, we evaluate the performance of More seriously, some collusion attackers may spread bogus
the proposed LSTM-based IDS through extensive simulation.
Simulation results validate that our IDS is more accurate in beacon messages simultaneously to make the false emergency
false message detection compared with some well-known machine messages more convincing. Unreliable messages may mislead
learning-based schemes. the drivers to make wrong driving decisions, which may reduce
Index Terms— Vehicular ad hoc networks (VANETs), intrusion traffic efficiency and even cause major traffic accidents. Hence,
detection, false message detection, time series classification, deep effective detection of false messages is essential in VANETs.
learning, long short-term memory model (LSTM). The existing mechanisms for ensuring the information
security of the VANETs can be mainly divided into three
I. I NTRODUCTION categories: authentication-based scheme, node-centric scheme,

V EHICULAR ad hoc networks (VANETs) have gained


increasing attention from academics and industry in
recent years. With the variety of applications of safety, traffic
and data-centric scheme. Authentication-based schemes focus
on verifying the identity of the node. Node-centric schemes
evaluate the credibility of vehicles based on their historical
efficiency, and infotainment, VANETs have been used as behavior. Data-centric schemes check the plausibility of the
communication infrastructures of emerging technologies, such message itself.
as intelligent transportation systems (ITSs), connected and In authentication-based schemes [4], the messages are
autonomous vehicles (CAVs), and smart cities [1]. attached with the sender’s public key certificate and digital
Improving driving safety is the crucial goal of VANETs. signature which are generated by cryptographic techniques.
In VANETs, vehicles share traffic data and road conditions in Among them, the certificate guarantees that the message comes
from a legitimate user, and the digital signature ensures the
Manuscript received 7 October 2021; revised 15 April 2022; accepted 8 July
2022. Date of publication 18 July 2022; date of current version 5 December integrity and non-repudiation of the message. However, these
2022. This work was supported in part by the National Natural Science schemes can only isolate illegal nodes, and cannot prevent
Foundation of China under Grant 61871290, in part by the Shanghai Sailing internal attackers from spreading false messages.
Program under Grant 19YF1451500, and in part by the Program of Shanghai
Science and Technology Innovation Action Plan under Grant 19DZ1201100. In recent years, various false message detection methods
The Associate Editor for this article was R. Arghandeh. (Corresponding for internal attackers have been proposed. In node-centric
author: Xin Zeng.) schemes [5], [6], the concept of trust or reputation is used
The authors are with the College of Electronic and Information Engineering,
Tongji University, Shanghai 201804, China (e-mail: zengxin1@tongji.edu.cn). to measure the degree to which a vehicle node can be trusted.
Digital Object Identifier 10.1109/TITS.2022.3190432 Each vehicle observes the behavior of its neighbors and uses
1558-0016 © 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
YU et al.: LSTM-BASED IDS FOR VANETs 23907

a numerical score to evaluate the trustworthiness of the node. condition around the warning vehicle. In our scheme, the
A central reputation server is set to maintain and update attacker or collusion attackers cannot affect other vehicles by
the reputation score of the vehicle node in the network. simply forging several beacon messages. Instead, they need to
However, due to the unique nature of VANETs, such as a assess the current traffic trend over time and precisely affect
large geographical range and high node mobility, querying the statistical time series within a certain range and within
and updating the reputation score is time-consuming, and it is a period of time, which makes their attacking attempt very
difficult to meet the real-time requirements for false message difficult, if not impossible, to succeed.
detection. (2) An LSTM-based traffic incident classifier is designed
To address the above challenge, data-centric schemes have and trained to classify time series of traffic parameters, and
been proposed to detect false messages more effectively by the pattern of traffic parameters changing over time can be
using fully distributed and localized algorithms, in which each accurately recognized. The effect of time steps on the accuracy
vehicle collects possible evidence independently or coopera- of the LSTM-based classifier is also investigated.
tively to verify the authenticity of the safety message. Typical (3) To detect false emergency messages under collusion
methods include heartbeat-based scheme [7], consistency and attacks more effectively, in the process of training the traffic
plausibility checking [8], [9], threshold-based scheme [10], incident classifier, we collect data sets under varying collu-
[11], etc. However, these solutions mainly collect evidence sion attacker proportions. We also investigate the effect of
from the communication process of messages, and few efforts collusion attacker proportions on the accuracy of the proposed
attempt to utilize out-domain information (i.e. traffic parame- IDS.
ters) to analyze whether the reported traffic incident actually The remainder of this paper is organized as follows. Related
happened. work is discussed in Section II. The VANETs model and
Some schemes [12]–[14] choose traffic flow as the observa- attack model are presented in Section III. In Section IV, the
tion data on macroscopic traffic conditions. The actual traffic overview of the proposed IDS is provided. The results of
condition is estimated according to the statistical trend of the performance evaluation are showed in Section V, and the
traffic flow. However, the calculation of traffic flow is based conclusion is drawn in Section VI.
on a linear speed-density model called Greenshields, which is
not accurate to fit real traffic data. It is noted that some more II. R ELATED W ORK
realistic nonlinear speed-density models are proposed in the The security of VANETs is a critical issue that has been the
field of transportation, such as Greenberg, Underwood, and the focus of research for many years [18]. The users of VANETs
logistic model [15]. These models show a better fitting effect are informed of traffic incidents based on received safety
on empirical observation data [16]. So it can be concluded messages. Therefore, false messages pose a major threat to
that the linear Greenshields model is insufficient for estimating traffic safety. The traditional authentication-based schemes use
actual traffic conditions. cryptographic techniques, such as digital signature [19] and
As a universal nonlinear model [17], deep learning is suit- pseudonym [20], to ensure the legitimacy of the node identity
able for fitting nonlinear traffic models. By introducing various and the integrity of the message. However, these mechanisms
nonlinear activation functions, it can fit complex nonlinear can isolate external attackers but cannot guarantee that mes-
functions. Furthermore, traffic parameters are highly correlated sages from legitimate vehicles are true. Several approaches
with time. With strong ability of nonlinear modeling and time aimed at detecting false messages from internal attackers have
series processing, the long short-term memory model (LSTM) been proposed and they can be mainly classified into two
is suitable for identifying traffic conditions based on the categories: (1) node-centric scheme (i.e. trust/reputation-based
time series of traffic parameters in our intrusion detection scheme), and (2) data-centric scheme (i.e. information-oriented
system (IDS). scheme).
In summary, with the help of emergency messages and bea- In node-centric schemes, the reliability of a message is
con messages, vehicles can perceive traffic conditions beyond evaluated according to the past communication history of
their visual range. However, these messages can be false and the sender vehicle [21]. A numerical score (i.e. trustworthi-
affect driving decisions. To detect a false emergency message, ness/reputation score) is used to quantify the healthy degree
vehicles need to determine whether the current traffic condition of a vehicle node. A message is considered reliable if its sender
matches the description of the message. To accurately identify node has a sufficiently high score. A centralized infrastructure
the current traffic condition, we collect multiple types of traffic called reputation server (i.e. trusted authority) is designed by
parameters from the vehicles near the reported traffic incident, Li et al. [5] to collect, update and certify the reputation score
and the mapping relationship between traffic parameters and of each vehicle. However, it’s impractical to maintain trust
specific traffic incidents is established considering time and or reputation in a centralized way due to the high mobility
position factors. To prevent collusion attacks, we also consider with dynamic topology and larger network size of VANETs.
the fact that false beacon messages may mislead the intrusion The trust management of vehicles can also be implemented in
detection of false emergency messages. The contributions of a decentralized/self-organizing way. In [6], a reputation man-
this paper can be summarized as follows: agement system is built for each vehicle to quickly establish a
(1) The proposed IDS constructs time series of traffic trust relationship with other vehicles. The trust-based scheme
parameters of all the vehicles within a certain range of is useful but it’s not suitable for delay-sensitive applications
the warning vehicle, to comprehensively describe the traffic (e.g. false emergency message detection) as trust is built over

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
23908 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 12, DECEMBER 2022

a period of time. Moreover, false messages from vehicles with improved to nonlinear models in several studies that fol-
high reputation cannot be identified. lowed. Greenberg [26] hypothesizes a logarithmic relationship
Data-centric schemes have been proposed to tackle these between speed and density, while Underwood [27] establishes
problems. It directly evaluates the reliability of the message an exponential model. It is observed that the Greenberg model
itself, rather than identifying malicious nodes. Each vehicle has a better fit for congested conditions, while the Under-
collects evidence to verify received messages locally or with wood model behaves well under uncongested conditions [28].
the help of neighboring vehicles. Gurung et al. [22] propose Wang et al. [16] propose a logistic model of the equilibrium
the Real-time Message Content Validation (RMCV) scheme speed-density relationship. The empirical validation shows
in VANETs to estimate the trustworthiness of messages based that the proposed five-parameter logistic model matches the
on content similarity, content conflict, and route similarity. empirical observation data better than the previously proposed
But this scheme dose not perform well when the propor- models. It can be seen that the linear Greenshields model
tion of false messages in the network is high. To overcome is insufficient for matching actual traffic data. With strong
this shortcoming, Sun et al. [23] designs a data trust frame- nonlinear fitting ability, machine learning or deep learning can
work based on the idea of verifying the implied effect of establish the mapping between traffic parameters and real traf-
a vehicle’s reported data by using secure wireless physical fic conditions more effectively. Some machine learning-based
layer measurements. In the heartbeat-based scheme [7], each approaches for false message detection in VANETs have been
vehicle continuously collects beacon messages (contain speed, proposed, such as support vector machine (SVM) [29], [30],
position, and steering angle of senders) from its neighboring back propagation neural network (BPNN) [31], random forest
vehicles, and calculates the expected position of senders at the (RF) [32], etc. However, few studies consider the fact that
next sampling time. If the predicted position is inconsistent traffic parameters are highly correlated with time, so the
with the reported position, the suspicion index of the sender pattern of traffic parameters changing over time cannot be
increases. When the suspicion index exceeds the threshold, the accurately extracted.
sender is regarded as a malicious vehicle. In the threshold- To address the challenging problems mentioned above, this
based scheme [10], [11], a vehicle accepts an emergency work proposes a novel IDS based on deep learning and time
message only if the number of received messages reporting series classification. Comparisons are made between the pro-
the identical information exceeds a predefined threshold. It’s posed scheme and the main existing VANET security schemes
easy to implement but it’s hard to determine the optimal as shown in Table I. As a data-centric scheme, the proposed
threshold. The above schemes focus on how the evidence scheme can detect false messages from internal attackers and
is collected from the communication process of messages, those with a high reputation, which make up for the weakness
and the inherent characteristics of traffic data have not been of authentication-based schemes and node-centric schemes,
analyzed to estimate actual traffic conditions. respectively. Different from traditional data-centric schemes,
In realistic traffic scenarios, the occurrence of traffic inci- our scheme detects false messages based on the effect of traffic
dents will cause abnormal fluctuations in traffic parameters. incidents on traffic parameters, which can judge whether the
By observing the changes in traffic parameters, whether traffic incidents happen. Unlike the existing traffic flow-based
the traffic incident actually happened can be judged. Traffic schemes that evaluate the traffic condition only by stationary
flow-based schemes [12]–[14] choose traffic flow as obser- traffic statistics and thus the pattern of traffic flow is not well
vations of macroscopic traffic conditions. Zaidi et al. [12] revealed, our proposed scheme constructs time series of traffic
propose a host-based IDS to detect false emergency messages parameters to comprehensively describe the traffic condition
using a traffic model, in which vehicles share their observation and can extract the pattern of traffic parameters changing over
data on the traffic condition, and a hypothesis test method is time using deep learning. In order to successfully launch an
used to identify the changes in traffic flow and decide to accept attack, the attackers need to evaluate the current traffic trend
or reject the emergency message. Liu et al. [13] extract two over a period of time, and cooperatively forge their beacon
typical traffic patterns, i.e. lane-blocking and blocking-free, messages to precisely affect the statistical time series, which
and establish a traffic model to estimate the probability density is very difficult to realize.
function of traffic parameters. Based on Bayesian inference,
III. S YSTEM M ODEL
the likelihood of each traffic pattern is calculated to determine
whether the accident reported by the emergency message has A. VANETs Model
occurred. In [14], an IDS for VANETs is proposed to detect As shown in Fig. 1, we consider a road safety application
false information attacks and Sybil attacks. It’s able to extract where a vehicle broadcast an emergency message to report
more distinct traffic flow features by taking the range of a traffic incident, and a VANETs model on a highway is
distance between vehicles into account. provided. There are three roles, i.e. warning vehicle, own
The above schemes based on traffic flow consider the impact vehicle, and neighboring vehicle. The own vehicle refers to the
of traffic incidents on traffic parameters, and the calculation considered vehicle that receives an emergency message and is
of traffic flow is based on the oversimplified Greenshields about to run IDS’s algorithm to detect false messages. The
model [24], in which speed and vehicle density obey a negative warning vehicle is the witness of the traffic incident and the
correlation linear relationship. Due to the nonlinear nature sender of the emergency message. The neighboring vehicles
of traffic flow [25], the Greenshields model is not accurate are within the communication range of the own vehicle and
to fit real traffic data. This linear speed-density model was can directly communicate with the own vehicle.

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
YU et al.: LSTM-BASED IDS FOR VANETs 23909

TABLE I
C OMPARISON B ETWEEN THE P ROPOSED S CHEME AND E XISTING VANET S ECURITY S CHEMES

Fig. 1. VANETs model on a highway.

In this model, each vehicle broadcasts a beacon message time. In addition, we assume that each vehicle is equipped
every time tbeacon . The own vehicle (V0 ) stores beacon mes- with a GPS device that can accurately obtain its position
sages of neighboring vehicles (V1 to V6 ) for the latest observa- Pos(X pos , Ypos ).
tion time tobserve in a table called Current Neighbor List (CNL)
(which will be elaborated in Chapter 4). Suppose that at time B. Message Format
t0 , V1 senses a traffic incident (e.g. an accident), and it will
1) Beacon Message: To communicate with the neighbor-
broadcast an emergency message to vehicles behind. When
ing vehicles, each vehicle continuously broadcasts a beacon
V0 receives the emergency message, its CNL stores beacon
message (Beacon Msg) with a period tbeacon . The beacon
messages of neighboring vehicles within [t0 − tobserve , t0 ].
message mainly contains the information of the vehicle motion
To verify the authenticity of the emergency message, V0 col-
state [33], and we define its format as:
lects evidence related to vehicles in the observation area
(V1 , V2 , and V3 ) from CNL and runs the IDS algorithm. The Beacon Msg(I D, v, a, Pos),
observation area is near the warning vehicle and is included
in the communication range of the own vehicle. This area is where I D, v, a, and Pos represent the vehicle’s identity,
closer to the traffic incident, so it can better reflect the current speed, acceleration, and position, respectively.
traffic situation. 2) Emergency Message: Emergency messages are driven by
Each vehicle can get the number of its neighboring vehicles traffic incidents. When a vehicle senses the occurrence of a
by checking their IDs in messages received at a certain road traffic incident, it will broadcast an emergency message

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
23910 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 12, DECEMBER 2022

Fig. 2. A scenario of false message attack. Fig. 3. A scenario of collusion attack.

(Emergency Msg) containing traffic incident information to


the vehicles behind it. Refer to [34], its format is defined as:
Emergency Msg(I D, E type , E pos ),
where E type is the type of traffic incident, such as accidents,
poor road conditions, congestion, etc., and E pos is the location
of the incident.
Fig. 4. Scheme of the proposed IDS.
C. Attack Model
In VANETs, internal attackers can broadcast false messages
VE spreads the periodic false beacon message Beacon Msg 
independently or cooperatively. Refer to [35], 2 forms of
cooperatively. The bogus beacon message has the following
attacks related to false emergency messages are defined.
format:
1) False Emergency Message Attack: False emergency mes-
sages can be broadcast by a single malicious vehicle to Beacon Msg (I D, v  , a  , Pos  ),
declare a non-existent traffic incident, which affects the driving
where v  , a  , and Pos  are the bogus speed, acceleration, and
decisions of subsequent vehicles.
position of the sender, and their changing trends over time
A scenario of a false emergency message attack is shown
match the false traffic incident.
in Fig. 2. VA , VB , and VC are driving normally on the
In reality, large-scale collusion attacks are difficult to
road, but malicious vehicle VC broadcasts a false emergency
achieve. So it is assumed that the majority of vehicles are
Emergency Msg  to declare a non-existent traffic incident.
honest.
The false message can mislead VD to suddenly change its
behavior (e.g. slow down or reroute) and even cause an
IV. LSTM-BASED IDS
accident. The format of the false emergency message can be
represented as: A. Overview
Based on the fact that different traffic incidents will cause
Emergency Msg  (I D, E type
 
, E pos ),
traffic parameters to fluctuate in different patterns, the core

where E type 
and E pos represent the type and position of the idea of the scheme proposed is as follows. Firstly, collect the
non-existent traffic incident respectively. traffic parameters within a period of observation time from
2) Collusion Attack: To make it more difficult to distinguish messages of vehicles near reported traffic incidents to form a
false emergency messages, some collusion attackers forge their multi-dimensional time series (MTS). Secondly, classify the
beacon messages while disseminating false emergency mes- MTS to determine the current traffic incident. Finally, the
sages to simulate the real state of movement after encountering authenticity of the emergency message is judged according to
a traffic incident. In most of the existing IDSs, multiple reports whether the classification result is consistent with the reported
with similar content can be regarded as a stronger signal traffic incident.
of high credibility than a single report. Therefore, collusion As shown in Fig. 4, the proposed IDS is deployed at
attacks can weaken the performance of IDSs and cause serious each vehicle node and it operates in a fully distributed style.
harm to the reliability of VANETs. It mainly consists of 3 modules: time series data concatenation
A scenario of collusion attack is shown in Fig. 3. VA , (Module I), LSTM-based traffic incident classifier (Module II),
VB , VC , and VE are driving normally on the road. Similarly, and decision of false message (Module III).
VC broadcasts a false emergency message. To make the false Each vehicle periodically receives beacon messages from
traffic incident more convincing to VD , the collusion attacker its neighboring vehicles and collects real-time traffic data

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
YU et al.: LSTM-BASED IDS FOR VANETs 23911

TABLE II TABLE III


C URRENT N EIGHBOR L IST T HE M EANING OF E ACH F EATURE OF THE T IME S ERIES F EATURE
V ECTOR U SED FOR T RAFFIC I NCIDENT C LASSIFICATION

from it. When a vehicle receives an emergency message, its


IDS’s algorithm for false emergency message detection is
triggered. A time series data concatenation process (Module I)
is first performed, in which the vehicle concats traffic data into
multi-dimensional time series as evidence for traffic incident
etc.), which can be reflected by the speed, acceleration, and
classification. In Module II, a pre-trained LSTM-based traffic
other traffic parameters of the vehicle showing the different
incident classifier is responsible for identifying the current
trends over time. Moreover, the influence of traffic incidents
traffic incident. Finally, false emergency message detection
is distance-dependent. So v w,T , aw,T , and d w,T are taken into
(Module III) is executed based on the classification result of
account. In addition, traffic incidents will affect the group of
traffic incidents. Among them, the model parameters of the
vehicles in the affected area. The driving status of neighboring
traffic incident classifier have been trained by the central server
vehicles is closely related to each other [12], so the group
according to the existing historical traffic database. The dataset
traffic parameters of the observation area can reflect the current
is collected from realistic traffic data and updated in real time.
traffic condition near the warning vehicle. So v̄ w,T , ā w,T ,
and N w,T are also used. In summary, the impact of traffic
B. Time Series Data Concatenation incidents on traffic parameters in time and space is considered
This module aims to collect time series of traffic parameters in the time series feature vector.
closely related to traffic incidents, as evidence for real-time To calculate Xo,T , the data of vehicles in the observation
identification of traffic incidents, and to provide input for the area need to be selected from the CNL of Vo at time t. Let
traffic incident classifier. Snei,t be the set of neighboring vehicles of Vo and Sobs,t be
Similar to [14], the vehicle in the proposed scheme main- the set of vehicles in the observation area at time t. The Sobs,t
tains the Current Neighbor List (CNL) by collecting beacon can be obtained as:
messages, which contain its neighboring vehicles’ traffic data.  
Different from [14], the CNL in this paper stores the time Sobs,t = Vi |Vi ∈ Snei,t , Dist(Posi,t , Posw,t )  robs , (2)
series of traffic data in the latest period of time tobserve , that
is, there are data at n = tobserve /tbeacon  points in time. where robs is the radius of the observation area and
An example of the CNL stored by a vehicle at time t is shown Dist(Posi,t , Posw,t ) is the distance between Vi and Vw at
in Table II. time t.
In Table II, v i,T is the time series of the speed of Vi Since Xo,T includes the average traffic parameters (v̄ w,T ,
āw,T ) and they might be dominated by a small number of
 T ∈ {t − n + 1, t − n + 2, . . . , t − 1, t}, that is, v i,T =
on
v i,t −n+1 , v i,t −n+2 , . . . , v i,t −1 , v i,t . The sampling time inter- vehicles who spread extreme data in their beacon messages,
val of the data is tbeacon . a i,T and Pos i,T are the time series we introduce outlier detection mechanism to detect large-scale
of acceleration and position of Vi on T respectively. modifications of traffic parameters by attackers and filter out
At time t + 1 (i.e., at the next sampling time), the CNL undesired data for the LSTM-based classifier to better operate.
will be updated, and store the time series of the vehicle on Grubbs’s test [36] is employed to detect outlier vehicles,
T  ∈ {t − n + 2, t − n + 3, . . . , t, t + 1}. as it is a widely-used method to detect outliers in a univariate
Suppose that the own vehicle Vo receives the emergency data-set and its excellent adaptability has been proved through
message from Vw (i.e. the warning vehicle) at time t, and extensive experimental data.
obtains the time series feature vector Xo,T from its stored Denote Sobs,t = {Vid1 , Vid2 , . . . , Vidk }, where k = |Sobs,t |
CNL to accurately describe the current traffic condition. The and idi is the index of the i-th vehicle in the CNL. For
definition of Xo,T is shown in formula (1) and the meaning each Vidi ∈ Sobs,t , we calculate its average speed v̄ i during
of each feature is shown in Table III. T by v̄ i = tT =t −n+1 v idi,T /n and obtain the average speed
  reference set as Sv = {v̄ 1 , v̄ 2 , . . . , v̄ k }. We use Grubbs’s test
Xo,T = v w,T , aw,T , d w,T , v̄ w,T , ā w,T , N w,T . (1) to obtain the set of outlier vehicles Sout from Sobs,t based on
The above features include traffic parameters of the warning Sv by the following steps.
vehicle (v w,T , aw,T , and d w,T ) and the vehicles in the obser- Firstly, we calculate the sample mean μ andthe sample
vation area (v̄ w,T , ā w,T , and N w,T ). When vehicle drivers standard deviation σ of Sv respectively by μ = v̄ i /n and
 v̄ i ∈S v
encounter different traffic conditions, they will take different σ =[ (v̄ i − μ)2 /(n − 1)]0.5 .
driving decisions (such as slowing down, changing lanes, v̄ i ∈Sv

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
23912 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 12, DECEMBER 2022

TABLE IV
T YPICAL C RITICAL VALUES (N,α) OF G RUBBUS ’ S T EST

Secondly, we calculate the Grubbs’s test statistic G by:

v̄ p = arg max |v̄ i − μ|, (3)


v̄ i ∈Sv
Fig. 5. Proposed LSTM network structure.
|v̄ p − μ|
G= , (4)
s
where v̄ p is the value with the largest absolute deviation from C. LSTM-Based Traffic Incident Classifier
μ and is most likely to be an outlier. This module uses an LSTM network to classify the obtained
Thirdly, we obtain the critical value of Grubbs’s test (N,α) , time series feature vectors and identify current traffic incidents.
which is related to the sample size N and the significance Its core task is the multi-classification of MTS.
level α. The significance level α is usually taken as 0.05 or 1) Dataset Format: The data set D = {(X1,T , ŷ1 ),
0.01, corresponding to 95% and 99% confidence intervals, (X2,T , ŷ2 ), . . . , (X N,T , ŷ N )} is a collection of pairs (Xi,T , ŷi )
respectively. Some (N,α) values are listed in Table IV [37]. where Xi,T is the time series feature vector, ŷi is the corre-
Finally, If G > (|Sv |,α) , which means v̄ p is an outlier, then sponding one-hot label vector of each traffic incident, and N is
v̄ p is removed from Sv , and Vid p is added in Sout . the total number of samples. According to formula (1), the size
The above 4 steps should be repeated until there are no of the input sample Xi,T is [6×n], where n is the total number
outliers in Sv . Then we identify the complete outlier vehicles of time steps in the time series. In addition to normal traffic
Sout with significant misbehavior. These vehicles are likely to conditions, we consider 3 types of common traffic incidents
be collusion attackers and their extreme data might reduce the that can affect the normal driving of vehicles, namely accident,
performance of the IDSs. Accordingly, the data of the vehicles poor road condition, and congestion. So ŷi is a vector with
in Sout will not be considered in the calculation of Xo,T . 4 dimensions.
Since we assume that the majority of vehicles are honest, 2) LSTM Network Structure: The structure of the LSTM
we used the outlier detection method to firstly filter out poten- network built in this paper is shown in Fig. 5. It consists of
tial attempts of spreading extreme data in beacon messages one input layer, one LSTM layer, two dense layers, and one
by attackers. On the basis of it, a minority of collusion output layer. The input layer inputs the time series feature
attackers can hardly affect the statistical traffic trend expressed vectors Xi,T into the LSTM layer at each time step. The LSTM
by the group traffic parameters. Thus, the ability to resist layer with 32 hidden units is used to extract the features of
collusion attacks is enhanced. However, the outlier detection the time series. To obtain a better feature extraction effect, two
will introduce some computing overhead. Through analysis, dense layers are used. The number of neurons in each dense
the time complexity of this process is O[(n + q)k], where q is layer is 64 and 32 respective. The output layer has 4 units
the number of outlier vehicles. Since q is normally very small corresponding to 4 traffic patterns. Since its activation function
and n is a constant, the time complexity is acceptable. is softmax, the output vector y has only 4 values added up
For the calculation of Xo,T , we can easily get v w,T and to 1, and represents the probability distribution of each traffic
aw,T from the CNL of Vo , and d w,T ,v̄ w,T , āw,T ,N w,T can be incident.
respectively calculated by fomular (5)-(8) at each time point. 3) Model Training: The training of the network takes
minimizing the loss function as the optimization objective
dw,t = Dist(Posw,t , E pos), (5) to iteratively obtain the optimal network parameters. Cross
 v i,t
v̄ w,t =  , (6) entropy is chosen as the loss function to measure the distance

|Sobs,t | between the output probability distribution and the expected
Vi ∈Sobs,t
 ai,t probability distribution. To reduce the impact of data noise on
āw,t =  , (7) the network, regularization is also used in the loss function.

|Sobs,t |
Vi ∈Sobs,t The loss function can be calculated by:

Nw,t = |Sobs,t |, (8)
1   (k) λ  2
N 3

 L=− ( ŷi ln y(k)


i )+ w , (9)
where Sobs,t = Sobs,t − Sout . N 2N w
i=1 k=0

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
YU et al.: LSTM-BASED IDS FOR VANETs 23913

where ŷ(k) (k)


i and y i are the k-th dimension of the i-th sample
TABLE V
of the output vector and label vector respectively, w is the VANET S I NTRUSION D ETECTION S IMULATION PARAMETERS
connection weights of the network, and λ is the regularization
parameter.
To minimize training error while avoiding local minimal
points, Adam optimizer, a modification of stochastic gradi-
ent descent (SGD) optimizer with adaptive learning rates,
is applied for back propagation through time (BPTT) in this
paper. Meanwhile, min-max scaling is used to preprocess the
traffic data, and the dropout method for LSTM is applied to
reduce overfitting.

D. Decision of False Message


This module detects false emergency messages based on
whether the traffic incident classification results are consistent of each vehicle is set as 500m in each direction [40]. The
with the reported incident. transmission interval is set as 0.5s [33], that is, each vehicle
Suppose that the result of traffic incident classification is E, broadcasts a beacon message every 0.5 seconds. Considering
and the reported traffic incident is Ê. In order to check the the traffic density of highways, the observation area radius is
consistency of them, the match factor x match is calculated by: set to be 250 meters. We use the 95% confidence interval for
the Grubbs’ test-based outlier detection.
x match = E ⊕ Ê, (10) Legitimate vehicles will broadcast emergency messages to
where ⊕ means exclusive OR. neighboring vehicles after detecting an incident, while mali-
If x match is 0 (i.e. classification result match the reported cious vehicles will randomly send false emergency messages
traffic incident), the emergency message is judged as a real or bogus beacon messages. After receiving an emergency
message, prompting the driver to take appropriate driving message, each vehicle independently judges and records the
decisions; otherwise if x match is 1, the emergency message authenticity of the message. By collecting and analyzing the
is rejected, and the warning vehicle is regarded as a malicious judgment results of the emergency messages of all legal vehi-
node and reported. cles, the performance of the proposed IDS can be evaluated.
2) LSTM Network Training: In order to select the optimal
V. P ERFORMANCE E VALUATION LSTM-based traffic incident classifier, Python and Pytorch (an
open source machine learning framework) are used to build
A. Simulation Setup
and train the LSTM network model.
1) Traffic and Communication Simulation: To evaluate the The proposed IDS cannot be trained and tested directly by
proposed IDS, extensive simulations were done using Sim- ready databases due to the shortage of well-known datasets
ulation of Urban Mobility (SUMO), OMNET++, and Veins. of real traffic incident scenarios. Therefore, we utilize SUMO
SUMO is a traffic mobility simulator with the ability to gen- to set up different traffic scenarios, collect traffic data in the
erate highly realistic vehicular behavior by specifying types, process of each vehicle’s response to each traffic incident,
speed limits, and traffic flow rates. OMNET++ is a component- and calculate the corresponding time series feature vector as
based C++ library and framework that is used for network a sample. In addition, to enhance the IDS’s defense effect
simulation. Veins combines OMNET++ with SUMO to create against collusion attacks, samples are also collected in sce-
a layer for VANETs simulation [38]. Therefore, SUMO is used narios where there are some collusion attackers continue to
to generate mobility trace files, and OMNET++ is used to spread bogus beacon messages that conform to the vehicle
load these trace files by Veins and run the proposed IDS. The motion law under the false traffic incident. We collect around
simulation parameters are shown in Table V. 80000 samples from scenarios with 3 types of traffic incidents
We utilize SUMO to simulate the driving state changes (accident, poor road condition, and congestion) and varying
of vehicles under different traffic incidents. Similar to collusion attacker proportions (0, 10%, 20%, 30%, 40%, and
[12]–[14], we establish a 3-lane highway with a length of 50%) as the data set. Each sample has data at 20 points in time
5km to analyze the impact of traffic incidents on traffic (i.e. the observation time is 10 seconds). By cropping the data
parameters. By setting traffic signal schedules, road section set by time, we also collect data sets with smaller values of
speed limit, etc., 3 types of common traffic incidents, namely observation time (4s, 6s, and 8s).
accidents, poor road conditions, and congestion, are set at The data set is randomly divided into the training set and
random locations on the highway. To simulate different road the testing set according to the ratio of 4:1. The training
conditions, the maximum speed limit of the highway is set as parameters are shown in Table VI.
28m/s, 22m/s, and 17m/s, respectively. In order to simulate
different traffic densities, the vehicle arrival time interval is
B. Evaluation Metric
set as 1s, 2s, and 3s, respectively [12]. The simulation time is
set as 4000s. To support VANET communication, the wireless In general, we evaluate the performance of the proposed
protocol is based on 802.11p [39], and the transmission range IDS in terms of three metrics: accuracy, F1 score, and false

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
23914 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 12, DECEMBER 2022

TABLE VI
LSTM N ETWORK T RAINING PARAMETERS

positive rate (FPR). F1 score can be calculated by precision


and recall.
Accuracy is the ratio of correctly classified messages to
the total messages. Precision shows the ratio of correctly
classified false emergency messages to the total classified
false emergency messages. Recall shows the ratio of correctly Fig. 6. Speed under different traffic incidents.
classified false emergency messages to the total actual false
emergency messages. F1 score is the weighted average of
precision and recall. FPR is the percentage of false emergency value. When congestion occurs, the speed of vehicles will be
messages that are incorrectly classified as true messages. They reduced to 0. It can be seen that the traffic data of vehicles
can be calculated by the following formulas. will show different trends over time under different traffic
incidents.
TP +TN
Accur acy = , (11) 2) Performance of LSTM-Based Traffic Incident Classifier:
T P + T N + FP + FN To evaluate the performance of the LSTM-based traffic inci-
TP
Pr eci si on = , (12) dent classifier, we train and test the classifier with varying
T P + FP values of observation time (from 4s to 10s). Table VII shows
TP the performance of the LSTM-based traffic incident classifier
Recall = , (13)
T P + FN on the entire testing set and each traffic incident with varying
Pr eci si on × Recall values of observation time.
F1 = 2× , (14)
Pr eci si on + Recall The results show that the proposed LSTM-based traffic
FP incident classifier can accurately judge 4 types of traffic
FPR = , (15)
T N + FP conditions, namely normal (i.e. without traffic incidents), poor
where T P is the number of correctly classified false emer- road condition, accident, and congestion. It can also be seen
gency messages; F N is the number of false emergency that the classifier becomes more accurate when the value
messages classified as true emergency messages; F P is the of observation time increases. In other words, when more
number of true emergency messages classified as false emer- time steps of data are input, the effect of time series feature
gency messages; T N is the number of correctly classified true extraction is better. However, it will also increase computing
emergency messages. and storage overhead. So the observation time needs to be
carefully selected. In the following parts of this paper, the
observation time is fixed at 10s.
C. Simulation Results 3) IDS Performance Analysis Under False Emergency Mes-
We calculate the accuracy, F1 score, and FPR of the sage Attack: In this attack scenario, malicious vehicles only
proposed LSTM-based IDS under different attack scenarios, report the types of traffic incidents that do not match the
and compare them with the existing machine learning schemes actual situation, that is, all the beacon messages of vehicles
based on RF [32] and BPNN [31]. Each simulation scenario are real. Table VIII illustrates the performance of each scheme
for IDS performance evaluation was run 50 times with around in terms of accuracy, F1 score, and FPR when the actual
3000 detection results analyzed in each round, and the average traffic condition is normal, poor road condition, accident,
values are used as the final results in Table VIII and Fig. 7-9. and congestion respectively. The average performance under
1) Traffic Parameters Under Different Traffic Incidents: 4 types of traffic conditions is also shown in the table. It can
Under each traffic incident, we randomly select the speed of be seen that the three schemes all have good defensive effects
10 vehicles for analysis. Fig. 6 shows the changes in the speed against a single false emergency message attack, and the
of selected 40 vehicles over time when affected by different proposed scheme is better than other schemes in all evaluation
traffic incidents. In a normal scenario, the speed of vehicles metrics. The results show that the LSTM-based classifier can
fluctuates slightly around a stable value. When encountering more accurately establish the mapping relationship between
an accident, vehicles will decelerate firstly and then change traffic data and traffic incidents due to its strong ability of
lanes, so the speed will firstly drop and then rise to the stable nonlinear modeling and time series processing.
value. When vehicles enter a road section with poor road 4) IDS Performance Analysis Under Collusion Attack: In
conditions, the speed will decrease and then stabilize at a lower the collusion attack scenario, there is a certain percentage

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
YU et al.: LSTM-BASED IDS FOR VANETs 23915

TABLE VII
P ERFORMANCE OF THE LSTM-BASED C LASSIFIER

TABLE VIII
P ERFORMANCE OF IDS S W ITH N O C OLLUSION ATTACKER

of collusion attacker vehicles forging beacon messages that


conform to the motion law of false traffic conditions. The
average performance of each scheme with the varying ratios Fig. 7. Performance of three IDSs under collusion attack.
of collusion attackers is illustrated in Fig. 7, where the ratio
of collusion attackers increases from 10% to 50%. Fig. 8(a),
Fig. 8(b), and Fig. 8(c) show the performance of each scheme the proposed scheme starts to drop below 95% when the
under the scenario where the actual traffic condition is nor- collusion attacker ratio surpasses 40%. However, in reality,
mal while the false traffic condition is poor road condition, it is very hard to deploy that plentiful collusion attackers into a
accident, and congestion respectively. Fig. 9(a), Fig. 9(b), pre-selected scenario.
and Fig. 9(c) show the performance of each scheme under Overall, the performance of the three schemes decreases
the scenario where the actual traffic condition is poor road with the increase in the proportion of collusion attackers. The
condition, accident, and congestion respectively while the false main cause is that with the increase in the number of collusion
traffic condition is normal. attackers, the more the traffic data received from neighboring
It can be observed that the proposed IDS can detect false vehicles deviate from the real traffic condition. In other words,
emergency messages with a very high accuracy rate under legal vehicles are more likely to be misled when the collusion
a small proportion of collusion attackers. The accuracy of attackers take advantage in number.

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
23916 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 12, DECEMBER 2022

Fig. 8. Performance of three IDSs when actual traffic condition is normal. Fig. 9. Performance of three IDSs when false traffic condition is normal.

The results also show that the performance of the proposed Secondly, the time series feature vectors combine the impact
scheme is better than other schemes under different ratios of traffic incidents on traffic parameters in time and space,
of collusion attackers. The effective detection of collusion and they are hard to be forged by collusion attackers. Thirdly,
attacks by the proposed LSTM-based IDS can be attributed the LSTM-based classifier can accurately identify the pattern
to the following reasons. Firstly, numerous traffic parameters of traffic parameters changing over time. Finally, using data
collected from vehicles near the reported traffic incidents under varying collusion attackers ratios to train the classifier
can mitigate the impact of partial false beacon messages. improves the robustness of the proposed LSTM-based IDS.

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
YU et al.: LSTM-BASED IDS FOR VANETs 23917

VI. C ONCLUSION [14] J. Liang, J. Chen, Y. Zhu, and R. Yu, “A novel intrusion detection system
for vehicular ad hoc networks (VANETs) based on differences of traffic
In this paper, an LSTM-based IDS for false emergency flow and position,” Appl. Soft Comput., vol. 75, pp. 712–727, Feb. 2019.
message detection is proposed and tested. Time series of traffic [15] X. Liu, J. Xu, M. Li, L. Wei, and H. Ru, “General-logistic-based speed-
parameters closely related to traffic incidents are collected density relationship model incorporating the effect of heavy vehicles,”
Math. Problems Eng., vol. 2019, pp. 1–10, Feb. 2019.
and calculated as time series feature vectors. An LSTM-based [16] H. Wang, J. Li, Q.-Y. Chen, and D. Ni, “Logistic modeling of the
classifier is designed and trained to identify current traffic equilibrium speed–density relationship,” Transp. Res. A, Policy Pract.,
incidents based on time series feature vectors from both nor- vol. 45, no. 6, pp. 554–566, Jul. 2011.
[17] Y. LeCun, Y. Bengio, and G. E. Hinton, “Deep learning,” Nature,
mal and collusion attack scenarios. Based on the classification vol. 521, pp. 436–444, Dec. 2015.
result of time series feature vectors, the authenticity of the [18] Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances in vehicular
emergency message can be judged. We conduct extensive network security, trust, and privacy,” IEEE Trans. Intell. Transp. Syst.,
vol. 20, no. 2, pp. 760–776, Feb. 2019.
simulations to evaluate the performance of the proposed IDS [19] L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and C. Hu, “Distributed
using SUMO, OMNET++, and Veins. The simulation results aggregate privacy-preserving authentication in VANETs,” IEEE Trans.
show that the proposed IDS exhibits better performance under Intell. Transp. Syst., vol. 18, no. 3, pp. 516–526, Mar. 2017.
[20] R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen, “Pseudonym changing
false message attacks and collusion attacks compared with the at social spots: An effective strategy for location privacy in VANETs,”
BPNN-based scheme and RF-based scheme. Equipped with IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86–96, Jan. 2012.
the proposed LSTM-based IDS, vehicles can accurately infer [21] R. Hussain, J. Lee, and S. Zeadally, “Trust in VANET: A survey of
current solutions and future research opportunities,” IEEE Trans. Intell.
the actual traffic incident and effectively resist false message Transp. Syst., vol. 22, no. 5, pp. 2553–2571, May 2021.
attacks and collusion attacks. [22] S. Gurung, D. Lin, A. Squicciarini, and E. Bertino, “Information-
In the near future, the work can be extended by utilizing big oriented trustworthiness evaluation in vehicular ad-hoc networks,” in
Proc. Int. Conf. Netw. Syst. Secur. Berlin, Germany: Springer, Jun. 2013,
data collected from real traffic scenarios. Furthermore, we plan pp. 94–108.
to incorporate more accurate deep learning algorithms within [23] M. Sun, M. Li, and R. Gerdes, “A data trust framework for VANETs
IDS to detect new types of attacks in VANETs, such as Sybil enabling false data detection and secure vehicle tracking,” in Proc. IEEE
Conf. Commun. Netw. Secur. (CNS), Oct. 2017, pp. 1–9.
attacks and denial of service attacks. [24] B. D. Greenshields, “A study of traffic capacity,” in Highway Research
Board Proceeding. Washington, DC, USA: Highway Research Board,
R EFERENCES 1935, pp. 448–477.
[25] D. Kang, Y. Lv, and Y.-Y. Chen, “Short-term traffic flow prediction with
[1] H. Al-Omaisi, E. A. Sundararajan, R. Alsaqour, N. F. Abdullah, and LSTM recurrent neural network,” in Proc. IEEE 20th Int. Conf. Intell.
M. Abdelhaq, “A survey of data dissemination schemes in vehic- Transp. Syst. (ITSC), Oct. 2017, pp. 1–6.
ular named data networking,” Veh. Commun., vol. 30, Aug. 2021, [26] H. Greenberg, “An analysis of traffic flow,” Oper. Res., vol. 7, no. 1,
Art. no. 100353. pp. 79–85, Feb. 1959.
[2] H. Li, G. Zhao, L. Qin, H. Aizeke, X. Zhao, and Y. Yang, “A survey [27] R. T. Underwood, “Speed, volume and density relationship,” Qual.
of safety warnings under connected vehicle environments,” IEEE Trans. Theory Traffic Flow, Yale Bureau Highway Traffic, New Haven, CT,
Intell. Transp. Syst., vol. 22, no. 5, pp. 2572–2588, May 2021. USA, 2008, pp. 141–188.
[3] M. Arshad, Z. Ullah, N. Ahmad, M. Khalid, H. Criuckshank, and [28] S. Ardekani, M. Ghandehari, and S. Nepal, “Macroscopic speed-flow
Y. Cao, “A survey of local/cooperative-based malicious information models for characterization of freeway and managed lanes,” Institutul
detection techniques in VANETs,” EURASIP J. Wireless Commun. Netw., Politehnic Din Iasi. Buletinul. Sectia Construct. Arhitectura, vol. 57,
vol. 2018, no. 1, pp. 1–17, Dec. 2018. no. 1, p. 149, 2011.
[4] D. Manivannan, S. S. Moni, and S. Zeadally, “Secure authentication and [29] O. A. Wahab, A. Mourad, H. Otrok, and J. Bentahar, “CEAP: SVM-
privacy-preserving techniques in vehicular ad-hoc networks (VANETs),” based intelligent detection model for clustered vehicular ad hoc net-
Veh. Commun., vol. 25, Oct. 2020, Art. no. 100247. works,” Expert Syst. Appl., vol. 50, pp. 40–54, May 2016.
[5] Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, [30] A. Alsarhan, M. Alauthman, E. Alshdaifat, A.-R. Al-Ghuwairi, and
“A reputation-based announcement scheme for VANETs,” IEEE Trans. A. Al-Dubai, “Machine learning-driven optimization for SVM-based
Veh. Technol., vol. 61, no. 9, pp. 4095–4108, Nov. 2012. intrusion detection system in vehicular ad hoc networks,” J. Ambient
[6] R. Sugumar, A. Rengarajan, and C. Jayakumar, “Trust based authentica- Intell. Humanized Comput., pp. 1–10, Feb. 2021.
tion technique for cluster based vehicular ad hoc networks (VANET),” [31] J. Zhang, L. Huang, H. Xu, M. Xiao, and W. Guo, “An incremental BP
Wireless Netw., vol. 24, no. 2, pp. 373–382, Feb. 2018. neural network based spurious message filter for vanet,” in Proc. IEEE
[7] R. P. Barnwal and S. K. Ghosh, “Heartbeat message based misbehavior Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discovery, Oct. 2012,
detection scheme for vehicular ad-hoc networks,” in Proc. Int. Conf. pp. 360–367.
Connected Vehicles Exp. (ICCVE), Dec. 2012, pp. 29–34. [32] S. Gyawali, Y. Qian, and R. Q. Hu, “Machine learning and reputation
[8] R. van der Heijden, S. Dietzel, and F. Kargl, “Misbehavior detection based misbehavior detection in vehicular communication networks,”
in vehicular ad-hoc networks,” in Proc. 1st GI/ITG KuVS Fachgespräch IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 8871–8885, Aug. 2020.
Inter-Vehicle Commun. Univ. Innsbruck, Feb. 2013, pp. 23–25. [33] R. Molina-Masegosa, M. Sepulcre, J. Gozalvez, F. Berens, and
[9] T. Yang, W. Xin, L. Yu, Y. Yang, J. Hu, and Z. Chen, “Misdis: V. Martinez, “Empirical models for the realistic generation of coop-
An efficent misbehavior discovering method based on accountability erative awareness messages in vehicular networks,” IEEE Trans. Veh.
and state machine in VANET,” in Proc. Asia–Pacific Web Conf. Berlin, Technol., vol. 69, no. 5, pp. 5713–5717, May 2020.
Germany: Springer, Apr. 2013, pp. 583–594. [34] ETSI, Intelligent Transport Systems (Its); Vehicular Communications;
[10] L. Chen, S.-L. Ng, and G. Wang, “Threshold anonymous announcement Basic Set of Applications; Part 3: Specifications of Decentralized Envi-
in VANETs,” IEEE J. Sel. Areas Commun., vol. 29, no. 3, pp. 605–615, ronmental Notification Basic Service, document ETSI TS 102 637-3,
Mar. 2011. 2010.
[11] J. Shao, X. Lin, R. Lu, and C. Zuo, “A threshold anonymous authenti- [35] S. Sharma and B. Kaushik, “A survey on internet of vehicles: Applica-
cation protocol for VANETs,” IEEE Trans. Veh. Technol., vol. 65, no. 3, tions, security issues & solutions,” Veh. Commun., vol. 20, Dec. 2019,
pp. 1711–1720, Mar. 2016. Art. no. 100182.
[12] K. Zaidi, M. B. Milojevic, V. Rakocevic, A. Nallanathan, and [36] M. Urvoy, D. Goudia, and F. Autrusseau, “Perceptual DFT watermarking
M. Rajarajan, “Host-based intrusion detection for VANETs: A statistical with improved detection and robustness to geometrical distortions,”
approach to rogue node detection,” IEEE Trans. Veh. Technol., vol. 65, IEEE Trans. Inf. Forensics Security, vol. 9, no. 7, pp. 1108–1119,
no. 8, pp. 6703–6714, Aug. 2016. Jul. 2014.
[13] J. Liu, W. Yang, J. Zhang, and C. Yang, “Detecting false messages in [37] Z. Chen, T. Yin, and T. Liu, “3G mobile map service publishing and
vehicular ad hoc networks based on a traffic flow model,” Int. J. Distrib. data flow testing,” in Proc. 1st Int. Conf. Agro, Geoinform. (Agro-
Sensor Netw., vol. 16, no. 2, Feb. 2020, Art. no. 1550147720906390. Geoinformatics), Aug. 2012, pp. 1–4.

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.
23918 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 12, DECEMBER 2022

[38] J. Kamel, M. R. Ansari, J. Petit, A. Kaiser, I. B. Jemaa, and P. Urien, Xiaoping Xue (Member, IEEE) received the B.S.
“Simulation framework for misbehavior detection in vehicular net- degree in wired communication from Tongji Uni-
works,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 6631–6643, versity (formerly Shanghai Railway University),
Jun. 2020. Shanghai, China, in 1987, and the Ph.D. degree
[39] M. Sepulcre, J. Gozalvez, and B. Coll-Perales, “Why 6 Mbps is not in communication and information systems from
(always) the optimum data rate for beaconing in vehicular networks,” Beijing Jiaotong University, Beijing, China, in 2009.
IEEE Trans. Mobile Comput., vol. 16, no. 12, pp. 3568–3579, Apr. 2017. He is currently a Professor and the Director of
[40] K. Abboud, H. A. Omar, and W. Zhuang, “Interworking of DSRC the Department of Information and Communication
and cellular network technologies for V2X communications: A survey,” Engineering, Tongji University. His research inter-
IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9457–9470, Dec. 2016. ests include secure broadband wireless communi-
cation theory under high-speed moving conditions,
safe computing theory and methods, formal software and security evaluation
theory and methods, and security and privacy in vehicular networks.
Yantao Yu (Graduate Student Member, IEEE)
received the B.S. degree in communication engi-
neering from Dalian Maritime University, Dalian,
China, in 2019. He is currently pursuing the Ph.D.
degree in information and communication engineer-
ing with Tongji University, Shanghai, China. His
main research interests are security and privacy in
vehicular networks.

Xin Zeng received the B.Sc. degree in communica-


tion engineering from Tongji University, Shanghai,
China, in 2009, and the Ph.D. degree in electronics
and communication from Telecom ParisTech, Paris,
France, in 2014.
From 2014 to 2018, he was an Advanced Jingxiao Ma received the B.Eng. degree from the
Researcher and a Standard Delegate at Huawei Cor- University of Birmingham, U.K., in 2011, the M.Sc.
poration, focusing on 5G physical layer research degree in wireless communications from the Univer-
and standardization. Since February 2018, he has sity of Southampton, U.K., in 2012, and the Ph.D.
been as Assistant Professor with the Information and degree from The University of Sheffield, in 2018.
Communication Department, Tongji University, spe- He is currently a Post-Doctoral Researcher with the
cialized on wireless communication physical layer design, vehicle networks, College of Electronics and Information Engineering,
and applications of artificial intelligence. He has been selected by Shanghai Tongji University, where he is focusing on the areas
Sailing Program and involved one project from the National Natural Science of relay beamforming, massive MIMO systems, and
Foundation of China. The related research achievements won the second prize cognitive radio networks.
of Shanghai Science and Technology Progress Award in 2019.

Authorized licensed use limited to: Universidad Tecnica Federico Santa Maria. Downloaded on May 22,2023 at 19:49:44 UTC from IEEE Xplore. Restrictions apply.

You might also like