Skip to main content

Advertisement

Log in

Highly efficient approach for discordant BSMs detection in connected vehicles environment

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Connected Vehicles (CVs) are the key enabling technology for Intelligent Transportation Systems (ITSs) that offer great opportunities for improving traffic safety and efficiency. They provide several innovative safety-related applications such as traffic management and monitoring, which involve the transmission of messages from all vehicles on the road. Basic Safety Messages (BSMs) constitute an essential type of control message. However, several critical issues affect the BSM messages’ reliability. In this paper, a model-based approach for detecting discordant BSMs is proposed, which allows to avoid the vehicle disturbance. This approach consists of detecting incoherence in communication metric values, where the detection is formulated as an anomaly detection problem that is solved using the Gaussian distribution. The detection process allows the vehicles to cross their prediction to achieve more precision in deciding whether to accept or reject a message from a vehicle. The efficiency of our model for detecting an anomaly has been evaluated through simulations using our generated dataset. The obtained results indicate that the proposed model provides high performance in terms of detection rate. Moreover, we evaluate and validate the proposed approach through formal evaluation, where it demonstrates promising performances, as compare it with a concurrent approach through simulations considering important metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Giliberto, M., Arena, F., & Pau, G. (2019). A fuzzy-based solution for optimized management of energy consumption in e-bikes. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 10(3), 45–64.

    Google Scholar 

  2. Kang, J., Kim, J., & Sohn, M. M. (2019). Supervised learning-based lifetime extension of wireless sensor network nodes. Journal of Internet Services and Information Security, 9(4), 59–67.

    Google Scholar 

  3. Shih, C. S., Chou, J. J., & Lin, K. J. (2018). WuKong: Secure run-time environment and data-driven IoT applications for Smart Cities and Smart Buildings. Journal of Internet Services and Information Security, 8(2), 1–17.

    Google Scholar 

  4. Rahman, M. S., Basu, A., Nakamura, T., Takasaki, H., & Kiyomoto, S. (2018). PPM: Privacy policy manager for home energy management system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(2), 42–56.

    Google Scholar 

  5. Trubia, S., Severino, A., Curto, S., Arena, F., & Pau, G. (2020). On BRT spread around the world: Analysis of some particular cities. Infrastructures, 5(10), 88.

    Article  Google Scholar 

  6. NHTSA, "Cybersecurity best practices for modern vehicles, " National Highway Traffic Safety Administration, USDOT, Technical Report Report No. DOT HS 812 333, 2016.

  7. Rajkumar, M. N., Nithya, M., & Krithika, M. (2016). Security requirements and mechanisms in vehicular ad-hoc networks (VANET). World Scientific News, 41, 214.

    Google Scholar 

  8. Najafzadeh, S., Ithnin, N., Abd, R. S., & Karimi, R. (2014). Bsm:Broadcasting of safety messages in vehicular ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 777–782.

    Article  Google Scholar 

  9. Kenney, J. B. (2011). Dedicated short-range communications (DSRC) standards in the united states. Proceedings of the IEEE, 99(7), 1162–1182.

    Article  Google Scholar 

  10. Jafarzadeh, H., Fleming, C. (2021). Gaussian process-based model predictive controller for connected vehicles with uncertain wireless channel. arXiv preprint arXiv:2106.12366.

  11. Zaidi, K., Milojevic, M. B., Rakocevic, V., Nallanathan, A., & Rajarajan, M. (2015). Hostbased intrusion detection for VANETs: A statistical approach to rogue node detection. IEEE transactions on vehicular technology, 65(8), 6703–6714.

    Article  Google Scholar 

  12. Li, Q., Malip, A., Martin, K. M., Ng, S. L., & Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9), 4095–4108.

    Article  Google Scholar 

  13. So S., Petit J., Starobinski, D. (2019) Physical layer plausibility checks for misbehavior detection in V2X networks. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 84–93.

  14. Eziama, E., Awin, F., Ahmed, S., Santos-Jaimes, L. M., Pelumi, A., & Corral-DeWitt, D. (2020). Detection and identification of malicious cyber-attacks in connected and automated vehicles’ real-time sensors. Applied Sciences, 10(21), 7833.

    Article  Google Scholar 

  15. Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1–12.

    Article  Google Scholar 

  16. Ferng, H. W., Chen, J. Y., Lotfolahi, M., Tseng, Y. T., & Zhang, S. Y. (2019). Messages classification and dynamic batch verification scheme for VANETs. IEEE Transactions on Mobile Computing, 20(3), 1156–1172.

    Article  Google Scholar 

  17. Banani, S., Kittipiyakul, S., Thiemjarus, S., & Gordon, S. (2019). Safety message verification using history-based relative-time zone priority scheme. Journal of Computer Networks and Communications, 2019, 1–14.

    Article  Google Scholar 

  18. Banani, S., Gordon, S., Thiemjarus, S., & Kittipiyakul, S. (2018). Verifying safety messages using relative-time and zone priority in vehicular ad hoc networks. Sensors, 18(4), 1195.

    Article  Google Scholar 

  19. Banani S., Gordon S. (2014) Selecting basic safety messages to verify in VANETs using zone priority. In: Proceedings of the 20th Asia-Pacific Conference on Communication (APCC2014), pp. 423–28.

  20. Jha S., Yavvari C., Wijesekera, D. (2018). Pseudonym certificate validationsunder heavy vehicular traffic loads. In Proceedings of the 2018 IEEE Vehicular Networking Conference (VNC), pp. 1–7.

  21. Chen C., Lee S. W., Watson T., Maple C., Lu Y. (2017) Caesar: A criticality-aware ecdsa signature verification scheme with markov model. In Proceedings of the 2017 IEEE Vehicular Networking Conference, pp. 151-–154.

  22. Hamida, E. B., Javed, M. A., & Znaidi, W. (2017). Adaptive security provisioning for vehicular safety applications. International Journal of Space-Based and Situated Computing, 7(1), 16–31.

    Article  Google Scholar 

  23. Ayoob A., Khalil G., Yingzhuang L., Chowdhury M., Al, T. (2020) Efficiency broadcast base safety message bsm through vanet based on transmit packet coding (tpc). In: Proceedings of the 2nd Global Conference on Life Sciences and Technologies (LifeTech), pp. 383–387.

  24. Gao Y., Chong P.H.J., Guan Y.L. (2017) Bsm dissemination with network coded relaying in VANETs at nlos intersections. In: Proceedings of the International Conference on Communications (ICC), pp. 1–6.

  25. Zhang M., Chong P.H.J., Seet B.C., Rehman S.U., Kumar A. (2017) Integrating pnc and rlnc for bsm dissemination in VANETs. In: Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5.

  26. Saxena S., Isukapati I.K. (2019) Simulated basic safety message: Concept application. In: 2019 IEEE Intelligent Vehicles Symposium (IV), pp. 2450–2456.

  27. Yanbin, W., Zhuofei, W., Jing, Z., Zhijuan, L., & Xiaomin, M. (2020). (2020) Analysis and adaptive optimization of vehicular safety message communications at intersections. Ad Hoc Networks, 107, 102241.

    Article  Google Scholar 

  28. Benaissa K., Mellouk A., Bitam S. (2017) Efficient messages broadcasting within vehicular safety applications. In: Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–5. IEEE, 2017.bibliography.

  29. Nguyen, B. L., Ngo, D. T., Tran, N. H., Dao, M. N., & Vu, H. L. (2020). Dynamic v2i/v2v cooperative scheme for connectivity and throughput enhancement. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3023708

    Article  Google Scholar 

  30. Abbasi H.I., Voicu R.C., Copeland J.A., Chang Y. (2017) Cooperative bsm architecture to improve transportation safety in vanets. In: Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1016–1022.

  31. Yu, K., Peng, L., Ding, X., Zhang, F., & Chen, M. (2019). (2019) Prediction of instantaneous driving safety in emergency scenarios based on connected vehicle basic safety messages. Journal of Intelligent and Connected Vehicles, 2(2), 78–90.

    Article  Google Scholar 

  32. Kamrani, M., Arvin, R., & KhattakA, J. (2018). Extracting useful information from basic safety message data: An empirical study of driving volatility measures and crash frequency at intersections. Transportation research record, 2672(38), 290–301.

    Article  Google Scholar 

  33. Emara K., Woerndl W., Schlichter J. (2013) Vehicle tracking using vehicular network beacons. In: Proceedings of the 13th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6.

  34. Hosseini, M. K., Talebpour, A., & Shakkottai, S. (2019). Privacy risk of connected vehicles in relation to vehicle tracking when transmitting basic safety message type 1 data. Transportation research record, 2673(12), 636–643.

    Article  Google Scholar 

  35. Miao, Z., Head, K. L., & Beak, B. (2018). Vehicle reidentification in a connected vehicle environment using machine learning algorithms. Transportation Research Record, 2672(45), 160–172.

    Article  Google Scholar 

  36. Vaas C., Roeschlin M., Papadimitratos P., Martinovic I. (2018) Poster: Tracking vehicles through encrypted mix-zones using physical layer properties. In 2018 IEEE Vehicular Networking Conference (VNC), pp. 1–2.

  37. Wiedersheim B., Ma Z., Kargl F., Papadimitratos P. (2010) Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In Proceedings of the 7th International conference on wireless on-demand network systems and services (WONS), pp. 176–183.

  38. Robinson C.L., Caminiti L., Caveney D., Laberteaux K. (2006) Efficient coordination and transmission of data for cooperative vehicular safety applications. In: Proceedings of the 3rd international workshop, pp. 10–19.

  39. Gao, K., Han, F., Dong, P., Xiong, N., & Du, R. (2019). Connected vehicle as a mobile sensor for real time queue length at signalized intersections. Sensors, 19(9), 1–22.

    Article  Google Scholar 

  40. Li, D., Zhao, Y., Ranjitkar, P., Zhao, H., & Bai, Q. (2018). Hybrid approach for variable speed limit implementation and application to mixed traffic conditions with connected autonomous vehicles. IET Intelligent Transport Systems, 12(5), 327–334.

    Article  Google Scholar 

  41. Uzcátegui, R. A., Sucre, A. J. D., & Acosta-Marum, G. (2009). WAVE: A tutorial. IEEE Communications magazine, 47(5), 126–133.

    Article  Google Scholar 

  42. (Jun. 30, 2021). International organization for standardization. (2014). ISO/IEC Guide 51:2014(en). [Online]. Available: https://www.iso.org/obp/ui/iso:std:iso iec:guide:51:ed-3:v1:en

  43. Ingibergsson, J. T. M., Kraft, D., & Schultz, U. P. (2017). Declarative rule-based safety for robotic perception systems. Journal of Software Engineering for Robotics, 8(1), 17–31.

    Google Scholar 

  44. (Feb. 28, 2021). Simulation of Urban Mobility (SUMO). [Online]. Available: http://sumo.sourceforge.net

  45. Carneiro G. (2010) “Ns-3: Network simulator 3. In: UTM Lab Meeting April, 20:4–5.

  46. (Feb. 28, 2021). OpenStreetMap. [Online]. Available: http://www.openstreetmap.org

  47. (Jul. 05, 2021). Machine learning software to solve data mining problems. [Online]. Available: https://sourceforge.net/projects/weka/

  48. Zamouche, D., Mohammedi, M., Aissani, S., & Omar, M. (2022). Ultra-safe and reliable enhanced train-centric communication-based train control system. Computing, 104(3), 533–552.

    Article  Google Scholar 

  49. Raya M., Hubaux J.P. (2005) The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks.

  50. Ma, X., Zhang, J., Yin, X., & Trivedi, K. S. (2011). Design and analysis of a robust broadcast scheme for VANET safety-related services. Vehicular Technology IEEE Transactions on Vehicular Technology, 61(1), 46–61.

    Article  Google Scholar 

Download references

Acknowledgements

This work was carried out in the framework of the research activities of the LIMED (Laboratoire d’Informatique Médicale) laboratory, which is affiliated to the faculty of exact sciences of the university of Bejaia and ESIEE Paris -- LIGM of the University of Gustave Eiffel, France. This work has been sponsored by the General Directorate for Scientific Research and Technological Development, Ministry of Higher Education and Scientific Research (DGRSDT), Algeria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Djamila Zamouche.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zamouche, D., Aissani, S., Omar, M. et al. Highly efficient approach for discordant BSMs detection in connected vehicles environment. Wireless Netw 29, 189–207 (2023). https://doi.org/10.1007/s11276-022-03104-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03104-8

Keywords

Navigation