Detecting faulty and malicious vehicles using rule-based communications data mining

The reliability of most safety applications that are based on vehicular communications, depends in turn on the reliability of data received by each vehicle from its neighbors. Routine messages exchanged in Vehicular Ad hoc Networks (VANETs) include crucial information for safety applications such as direction, position, etc. A vehicle failure and/or a malicious vehicle transmitting false information may affect the data collection scheme and cause a disturbance for safety applications. In such a scenario, (1) the faulty/malicious vehicle should be detected rapidly and (2) routine messages exchange should be updated in consequence. To be able to detect the faulty/malicious vehicle, we developed a mechanism that collects, at a single vehicle, data regarding each neighbour transmission, and extracts the temporal correlation rules between vehicles implicated in transmissions in the neighbourhood. With the mechanism, called VANETs Association Rules Mining (VARM), a mining process will take place during a-priori constant historical period. The associations rules formulated during the mining process will be used to detect a faulty or malicious vehicle, i.e., a vehicle which is not correlated with vehicles in the neighbourhood following these rules. To react after this kind of anomaly detection, an 1:N technique is used as a protection for reestablishing the accuracy of the data collection process between vehicles communicating in the neighbourhood. Simulation results demonstrate the efficiency of the VARM scheme.

[1]  Andreas Meier,et al.  Design of 5.9 ghz dsrc-based vehicular safety communication , 2006, IEEE Wireless Communications.

[2]  Eliahu Khalastchi,et al.  Detecting anomalies in unmanned vehicles using the Mahalanobis distance , 2010, 2010 IEEE International Conference on Robotics and Automation.

[3]  Gösta Grahne,et al.  Efficiently Using Prefix-trees in Mining Frequent Itemsets , 2003, FIMI.

[4]  Soumaya Cherkaoui,et al.  A secure service architecture to support wireless vehicular networks , 2010, Int. J. Auton. Adapt. Commun. Syst..

[5]  Peng Ning,et al.  Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[6]  Nalini Venkatasubramanian,et al.  Security Issues in a Future Vehicular Network , 2002 .

[7]  Markus Jakobsson,et al.  Balancing auditability and privacy in vehicular networks , 2005, Q2SWinet '05.

[8]  Nicolas Pasquier,et al.  Efficient Mining of Association Rules Using Closed Itemset Lattices , 1999, Inf. Syst..

[9]  Soumaya Cherkaoui,et al.  Deterministic access for DSRC/802.11p vehicular safety communication , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[10]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[11]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[12]  Osmar R. Zaïane,et al.  Incremental mining of frequent patterns without candidate generation or support constraint , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..

[13]  Tim Moors,et al.  Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA) , 2008, 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008).

[14]  Ahmed E. Kamal,et al.  Network Coding-Based Protection of Many-to-One Flow Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[15]  Sadok Ben Yahia,et al.  A Divide and Conquer Approach for Deriving Partially Ordered Sub-structures , 2005, PAKDD.

[16]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD '00.

[17]  Ben Kao,et al.  Online Algorithms for Mining Inter-stream Associations from Large Sensor Networks , 2005, PAKDD.

[18]  Hariharan Krishnan,et al.  Adaptive intervehicle communication control for cooperative safety systems , 2010, IEEE Network.

[19]  BoukercheAzzedine,et al.  A Novel Algorithm for Mining Association Rules in Wireless Ad Hoc Sensor Networks , 2008 .