ODPV: An Efficient Protocol to Mitigate Data Integrity Attacks in Intelligent Transport Systems

Intelligent Transport Systems (ITS) require accurate information to be shared among vehicles and infrastructure nodes for applications including accident information or pre-crash warnings, to name a few. Due to its sensitive nature, ITS applications are vulnerable against data integrity attacks where nodes transmit false information that results in wrong decision making by the applications. A characteristic of such attacks is that the false transmitted information is significantly different than the actual information. In this paper, we propose an Outlier Detection, Prioritization and Verification (ODPV) protocol that efficiently isolates false data and improves traffic management decisions. ODPV uses the isolation forest algorithm to detect outliers, fuzzy logic to prioritize outliers and C-V2X communications to verify the outliers. Extensive simulation results verify the effectiveness of the proposed protocol to isolate the outliers.

[1]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[2]  Sherali Zeadally,et al.  Data analytics for Cooperative Intelligent Transport Systems , 2019, Veh. Commun..

[3]  Xinyu Yang,et al.  A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems , 2017, IEEE Transactions on Vehicular Technology.

[4]  Xinyu Yang,et al.  Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.

[5]  Sherali Zeadally,et al.  Integration of VANET and 5G Security: A review of design and implementation issues , 2019, Future Gener. Comput. Syst..

[6]  Tao Jiang,et al.  Toward Pre-Empted EV Charging Recommendation Through V2V-Based Reservation System , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[7]  Zhi-Hua Zhou,et al.  Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.

[8]  Yasir Mehmood,et al.  Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.

[9]  Elyes Ben Hamida,et al.  On the Interrelation of Security, QoS, and Safety in Cooperative ITS , 2017, IEEE Transactions on Intelligent Transportation Systems.

[10]  Sherali Zeadally,et al.  FASPM: Fuzzy logic-based adaptive security protocol for multihop data dissemination in intelligent transport systems , 2017, Trans. Emerg. Telecommun. Technol..

[11]  Gang Qu,et al.  A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy , 2019, IEEE Transactions on Intelligent Transportation Systems.

[12]  Ali Kashif Bashir,et al.  Fog-Assisted Cooperative Protocol for Traffic Message Transmission in Vehicular Networks , 2019, IEEE Access.

[13]  Furqan Jameel,et al.  Performance Analysis of Cooperative V2V and V2I Communications Under Correlated Fading , 2019, IEEE Transactions on Intelligent Transportation Systems.

[14]  Sherali Zeadally,et al.  Trust-based security adaptation mechanism for Vehicular Sensor Networks , 2018, Comput. Networks.

[15]  Li Zhao,et al.  Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.

[16]  Fatih Kurugollu,et al.  A Comparative Analysis of Trust Models for Safety Applications in IoT-enabled Vehicular Networks , 2019, 2019 Wireless Days (WD).

[17]  Virginia N. L. Franqueira,et al.  TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks , 2018, IEEE Access.

[18]  Juan-Carlos Cano,et al.  Trust Management for Vehicular Networks: An Adversary-Oriented Overview , 2016, IEEE Access.

[19]  Maria Riveiro,et al.  Anomaly Detection for Road Traffic: A Visual Analytics Framework , 2017, IEEE Transactions on Intelligent Transportation Systems.

[20]  Wei Liu,et al.  Distance-based k-nearest neighbors outlier detection method in large-scale traffic data , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).

[21]  Javier Gozalvez,et al.  LTE-V for Sidelink 5G V2X Vehicular Communications: A New 5G Technology for Short-Range Vehicle-to-Everything Communications , 2017, IEEE Vehicular Technology Magazine.

[22]  Fatih Kurugollu,et al.  MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles , 2020, IEEE Internet of Things Journal.

[23]  Sherali Zeadally,et al.  RepGuide: Reputation-Based Route Guidance Using Internet of Vehicles , 2018, IEEE Communications Standards Magazine.

[24]  Shibo He,et al.  DRAIM: A Novel Delay-Constraint and Reverse Auction-Based Incentive Mechanism for WiFi Offloading , 2020, IEEE Journal on Selected Areas in Communications.

[25]  Pasi Fränti,et al.  Outlier Detection Using k-Nearest Neighbour Graph , 2004, ICPR.

[26]  Miguel Sepulcre,et al.  Analytical Models of the Performance of C-V2X Mode 4 Vehicular Communications , 2018, IEEE Transactions on Vehicular Technology.