VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs

Vehicular networks are networks of communicating vehicles, a major enabling technology for future cooperative and autonomous driving technologies. The most important messages in these networks are broadcast-authenticated periodic one-hop beacons, used for safety and traffic efficiency applications such as collision avoidance and traffic jam detection. However, broadcast authenticity is not sufficient to guarantee message correctness. The goal of misbehavior detection is to analyze application data and knowledge about physical processes in these cyber-physical systems to detect incorrect messages, enabling local revocation of vehicles transmitting malicious messages. Comparative studies between detection mechanisms are rare due to the lack of a reference dataset. We take the first steps to address this challenge by introducing the Vehicular Reference Misbehavior Dataset (VeReMi) and a discussion of valid metrics for such an assessment. VeReMi is the first public extensible dataset, allowing anyone to reproduce the generation process, as well as contribute attacks and use the data to compare new detection mechanisms against existing ones. The result of our analysis shows that the acceptance range threshold and the simple speed check are complementary mechanisms that detect different attacks. This supports the intuitive notion that fusion can lead to better results with data, and we suggest that future work should focus on effective fusion with VeReMi as an evaluation baseline.

[1]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[2]  Thomas Engel,et al.  Ieee Intelligent Transportation Systems Magazine @bullet 52 @bullet Summer 2017 Luxembourg Sumo Traffic (lust) Scenario: Traffic Demand Evaluation , 2022 .

[3]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[4]  Frank Kargl,et al.  Enhanced Position Verification for VANETs Using Subjective Logic , 2016, VTC 2016.

[5]  Tim Leinmüller,et al.  Decentralized position verification in geographic ad hoc routing , 2010, Secur. Commun. Networks.

[6]  Falko Dressler,et al.  Toward reproducibility and comparability of IVC simulation studies: a literature survey , 2012, IEEE Communications Magazine.

[7]  Nai-Wei Lo,et al.  Illusion Attack on VANET Applications - A Message Plausibility Problem , 2007, 2007 IEEE Globecom Workshops.

[8]  Abdulmotaleb El-Saddik,et al.  How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey , 2015, ACM Comput. Surv..

[9]  Takaya Saito,et al.  The Precision-Recall Plot Is More Informative than the ROC Plot When Evaluating Binary Classifiers on Imbalanced Datasets , 2015, PloS one.

[10]  Sorin A. Huss,et al.  A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition , 2011, 2011 IEEE Vehicular Networking Conference (VNC).

[11]  Hendrik Decke,et al.  A flexible, subjective logic-based framework for misbehavior detection in V2V networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[12]  M. Kemp,et al.  Oral, Nasal and Pharyngeal Exposure to Lipopolysaccharide Causes a Fetal Inflammatory Response in Sheep , 2015, PloS one.

[13]  Tim Leinmüller,et al.  Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems , 2016, IEEE Communications Surveys & Tutorials.

[14]  Tim Leinmüller,et al.  Vehicle Behavior Analysis to Enhance Security in VANETs , 2008 .

[15]  William Whyte,et al.  Binary hash tree based certificate access management for connected vehicles , 2017, WISEC.

[16]  Mark Goadrich,et al.  The relationship between Precision-Recall and ROC curves , 2006, ICML.

[17]  Ivan Martinovic,et al.  Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics , 2017, AsiaCCS.

[18]  John S. Baras,et al.  A framework for the evaluation of intrusion detection systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[19]  Frank Kargl,et al.  Analyzing attacks on cooperative adaptive cruise control (CACC) , 2017, 2017 IEEE Vehicular Networking Conference (VNC).

[20]  Andrea C. Arpaci-Dusseau,et al.  The Popper Convention: Making Reproducible Systems Evaluation Practical , 2017, 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).

[21]  Reinhard German,et al.  Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.