Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks
Abstract
:1. Introduction
- It offers thorough information on VANET systems, vulnerabilities, and attack classification.
- It demonstrates the drawbacks of common authentication approaches. Authentication accuracy is still a key issue in VANETs, which is a great challenge.
- It investigates the recent ML and deep learning (DL) techniques that have been proposed to counter VANET attacks with focus on their advantages and drawbacks.
- It improves the CICIDS2017 dataset using the gain information feature selection technique. This significantly enhances the prediction performance, as only 61 out of 79 features were considered.
- It develops a balanced version of the CICIDS2017 dataset using a random oversampling technique. An imbalanced dataset leads to bias in classification accuracy and erroneous prediction, which affects classification performance. The developed dataset, BCICIDS2017-GI, exhibited significant improvements in classification accuracy and performance.
- It presents a lightweight ML model capable of precisely identifying VANET attacks with an outstanding accuracy rate and manageable overhead. It outperformed the other relevant classification methods. The proposed model is based on an RF classification model with a gain information feature selection technique.
- It compared the suggested model with several reputable classification models, which exhibited better performance. In addition, the proposed detection model was compared with recent classification approaches and surpassed all of them in terms of prediction accuracy, as indicated in the Related Work section.
- It offers a comprehensive analysis of the experimental findings.
2. VANET Attack Classification
3. Related Work
3.1. Authentication
3.2. Machine Learning
4. Materials and Methods
4.1. Dataset
4.2. Feature Selection
4.3. Creation of a Balanced Dataset
4.4. Evaluation
5. Results and Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Zhang, H.; Li, M. Towards an intelligent and automatic irrigation system based on internet of things with authentication feature in VANET. J. Inf. Secur. Appl. 2025, 88, 103927. [Google Scholar] [CrossRef]
- Manasrah, A.; Yaseen, Q.; Al-Aqrabi, H.; Liu, L. Identity-Based Authentication in VANETs: A Review. IEEE Trans. Intell. Transp. Syst. 2025, 26, 4260–4282. [Google Scholar] [CrossRef]
- Mansouri, F.; Tarhouni, M.; Alaya, B.; Zidi, S. A distributed intrusion detection framework for vehicular Ad Hoc networks via federated learning and Blockchain. Ad Hoc Netw. 2025, 167, 103677. [Google Scholar] [CrossRef]
- Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
- Shawky, M.A. Authentication Enhancement in Command and Control Networks: (A Study in Vehicular Ad-Hoc Networks). Ph.D. Thesis, University of Glasgow, UK, 2024. [Google Scholar]
- Samaras, N.S. Using basic MANET routing algorithms for data dissemination in vehicular Ad Hoc Networks (VANETs). In Proceedings of the 24th Telecommunications Forum (TELFOR), Belgrade, Serbia, 22–26 November 2016; pp. 1–4. [Google Scholar]
- Lee, M.; Atkison, T. VANET applications: Past, present, and future. Veh. Commun. 2021, 28, 100310. [Google Scholar] [CrossRef]
- Elsadig, M.A.; Fadlalla, Y.A. Mobile Ad Hoc Network Routing Protocols: Performance Evaluation and Assessment. Int. J. Comput. Digit. Syst. 2018, 7, 59–66. [Google Scholar] [CrossRef] [PubMed]
- Deng, J.; Deng, J.; Liu, P.; Wang, H.; Yan, J.; Pan, D.; Liu, J. A Survey on Vehicular Cloud Network Security. IEEE Access 2023, 11, 136741–136757. [Google Scholar] [CrossRef]
- Elsadig, M.A.; Fadlalla, Y.A. VANETs Security Issues and Challenges: A Survey. Indian J. Sci. Technol. 2016, 9, 1–8. [Google Scholar] [CrossRef]
- Elsadig, M.A.; Altigani, A.; Baraka, M.A.A. Security issues and challenges on wireless sensor networks. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 1551–1559. [Google Scholar] [CrossRef]
- Kaur, G.; Kakkar, D. Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET. Ad Hoc Netw. 2022, 136, 102961. [Google Scholar] [CrossRef]
- Sun, J.; Fang, Y. Defense against misbehavior in anonymous vehicular ad hoc networks. Ad Hoc Netw. 2009, 7, 1515–1525. [Google Scholar] [CrossRef]
- Chen, X.; Feng, W.; Chen, Y.; Ge, N.; He, Y. Access-Side DDoS Defense for Space-Air-Ground Integrated 6G V2X Networks. IEEE Open J. Commun. Soc. 2024, 5, 2847–2868. [Google Scholar] [CrossRef]
- Alrehan, A.M.; Alhaidari, F.A. Machine Learning Techniques to Detect DDoS Attacks on VANET System: A Survey. In Proceedings of the 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; pp. 1–6. [Google Scholar]
- Naskar, S.; Brunetta, C.; Hancke, G.; Zhang, T.; Gidlund, M. A Scheme for Distributed Vehicle Authentication and Revocation in Decentralized VANETs. IEEE Access 2024, 12, 68648–68667. [Google Scholar] [CrossRef]
- Saoud, B.; Shayea, I.; Yahya, A.E.; Shamsan, Z.A.; Alhammadi, A.; Alawad, M.A.; Alkhrijah, Y. Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey. ICT Express 2024, 10, 959–980. [Google Scholar] [CrossRef]
- Elsadig, M.A. ChatGPT and Cybersecurity: Risk Knocking the Door. J. Internet Serv. Inf. Secur. 2023, 14, 1–15. [Google Scholar] [CrossRef]
- Nandy, T.; Noor, R.M.; Kolandaisamy, R.; Idris, M.Y.I.; Bhattacharyya, S. A review of security attacks and intrusion detection in the vehicular networks. J. King Saud Univ. Comput. Inf. Sci. 2024, 36, 101945. [Google Scholar] [CrossRef]
- Ben Rabah, N.; Idoudi, H. A Machine Learning Framework for Intrusion Detection in VANET Communications. In Emerging Trends in Cybersecurity Applications; Daimi, K., Alsadoon, A., Peoples, C., El Madhoun, N., Eds.; Springer International Publishing: Cham, Switzerland, 2023; pp. 209–227. [Google Scholar]
- Amari, H.; El Houda, Z.A.; Khoukhi, L.; Belguith, L.H. Trust Management in Vehicular Ad-Hoc Networks: Extensive Survey. IEEE Access 2023, 11, 47659–47680. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Manickam, S. A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework. IEEE Access 2023, 11, 46218–46228. [Google Scholar] [CrossRef]
- Shawky, M.A.; Shah, S.T.; Abdrabou, M.; Usman, M.; Abbasi, Q.H.; Flynn, D.; Imran, M.A.; Ansari, S.; Taha, A. How secure are our roads? An in-depth review of authentication in vehicular communications. Veh. Commun. 2024, 47, 100784. [Google Scholar] [CrossRef]
- Abdelfatah, R.I.; Abdal-Ghafour, N.M.; Nasr, M.E. Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions. IEEE Access 2022, 10, 1096–1115. [Google Scholar] [CrossRef]
- Dong, S.; Su, H.; Xia, Y.; Zhu, F.; Hu, X.; Wang, B. A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2023, 24, 13573–13602. [Google Scholar] [CrossRef]
- Praba, M.S.B.; Ramesh, S.S.S. VANET Communication System with HENON Based Privacy Preserving Authentication. Int. J. Intell. Syst. Appl. Eng. 2023, 11, 340–349. [Google Scholar]
- Wei, L.; Cui, J.; Zhong, H.; Bolodurina, I.; Liu, L. A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs. IEEE Trans. Dependable Secur. Comput. 2023, 20, 422–436. [Google Scholar] [CrossRef]
- Wei, L.; Cui, J.; Xu, Y.; Cheng, J.; Zhong, H. Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1681–1695. [Google Scholar] [CrossRef]
- Zhang, J.; Zhang, Q. Comment on “Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs”. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1037–1038. [Google Scholar] [CrossRef]
- Studer, A.; Shi, E.; Bai, F.; Perrig, A. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. In Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy, 22–26 June 2009; pp. 1–9. [Google Scholar]
- Alshudukhi, J.S.; Mohammed, B.A.; Al-Mekhlafi, Z.G. Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC). IEEE Access 2020, 8, 222032–222040. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Anbar, M.; Alazzawi, M.A.; Manickam, S.; Al-Hiti, A.S. LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network. IEEE Access 2020, 8, 170507–170518. [Google Scholar] [CrossRef]
- Li, C.; Wang, Z. Location-based Security Authentication Mechanism for Ad hoc Network. In Proceedings of the National Conference on Information Technology and Computer Science, Lanzhou, China, 16–18 November 2012. [Google Scholar]
- Chen, L.; Tang, H.; Wang, J. Analysis of VANET security based on routing protocol information. In Proceedings of the Fourth International Conference on Intelligent Control and Information Processing (ICICIP), Beijing, China, 9–11 June 2013; pp. 134–138. [Google Scholar]
- Li, J.; Lu, H.; Guizani, M. ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 938–948. [Google Scholar] [CrossRef]
- Shu, J.; Zhou, L.; Zhang, W.; Du, X.; Guizani, M. Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach. IEEE Trans. Intell. Transp. Syst. 2021, 22, 4519–4530. [Google Scholar] [CrossRef]
- Muawia, E. Network Covert Channels. In Steganography—The Art of Hiding Information; Joceli, M., Ed.; IntechOpen: Rijeka, Croatia, 2024; Chapter 8. [Google Scholar]
- Elsadig, M.; Gafar, A. Packet length covert channel detection: An ensemble machine learning approach. J. Theor. Appl. Inf. Technol. 2022, 100, 38391–38405. [Google Scholar]
- Elsadig, M.A.; Altigani, A.; Elshoush, H.T. Breast cancer detection using machine learning approaches: A comparative study. Int. J. Electr. Comput. Eng. (IJECE) 2023, 13, 736–745. [Google Scholar] [CrossRef]
- Nagarhalli, T.P.; Vaze, V.; Rana, N.K. Impact of Machine Learning in Natural Language Processing: A Review. In Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 4–6 February 2021; pp. 1529–1534. [Google Scholar]
- Mohamed, Y.A.; Khanan, A.; Bashir, M.; Mohamed, A.H.H.M.; Adiel, M.A.E.; Elsadig, M.A. The Impact of Artificial Intelligence on Language Translation: A Review. IEEE Access 2024, 12, 25553–25579. [Google Scholar] [CrossRef]
- Elsadig, M.A.; Gafar, A. Covert Channel Detection: Machine Learning Approaches. IEEE Access 2022, 10, 38391–38405. [Google Scholar] [CrossRef]
- Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.-M.; Kim, D.-S. Optimization of RBF-SVM Kernel Using Grid Search Algorithm for DDoS Attack Detection in SDN-Based VANET. IEEE Internet Things J. 2023, 10, 8477–8490. [Google Scholar] [CrossRef]
- Alsarhan, A.; Al-Ghuwairi, A.-R.; Almalkawi, I.T.; Alauthman, M.; Al-Dubai, A. Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks. Wirel. Pers. Commun. 2021, 117, 3129–3152. [Google Scholar] [CrossRef]
- Karthiga, B.; Durairaj, D.; Nawaz, N.; Venkatasamy, T.K.; Ramasamy, G.; Hariharasudan, A. Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches. Wirel. Commun. Mob. Comput. 2022, 2022, 5069104. [Google Scholar] [CrossRef]
- Bangui, H.; Ge, M.; Buhnova, B. A Hybrid Data-driven Model for Intrusion Detection in VANET. Procedia Comput. Sci. 2021, 184, 516–523. [Google Scholar] [CrossRef]
- Setia, H.; Chhabra, A.; Singh, S.K.; Kumar, S.; Sharma, S.; Arya, V.; Gupta, B.B.; Wu, J. Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments. Cyber Secur. Appl. 2024, 2, 100037. [Google Scholar] [CrossRef]
- Kawale, R.N.; Patil, R.V.; Mahajan, S.A. Optimal Attack or Malicious Activity Detection in VANET Using Ensemble Machine Learning Approach. Int. J. Intell. Syst. Appl. Eng. 2024, 12, 669–675. [Google Scholar]
- Almahadin, G.; Aoudni, Y.; Shabaz, M.; Agrawal, A.V.; Yasmin, G.; Alomari, E.S.; Al-Khafaji, H.M.R.; Dansana, D.; Maaliw, R.R. VANET Network Traffic Anomaly Detection Using GRU-Based Deep Learning Model. IEEE Trans. Consum. Electron. 2024, 70, 4548–4555. [Google Scholar] [CrossRef]
- Ercan, S.; Mendiboure, L.; Alouache, L.; Maaloul, S.; Sylla, T.; Aniss, H. An Enhanced Model for Machine Learning-Based DoS Detection in Vehicular Networks. In Proceedings of the IFIP Networking Conference (IFIP Networking), Barcelona, Spain, 12–15 June 2023; pp. 1–9. [Google Scholar]
- Rashid, K.; Saeed, Y.; Ali, A.; Jamil, F.; Alkanhel, R.; Muthanna, A. An Adaptive Real-Time Malicious Node Detection Framework Using Machine Learning in Vehicular Ad-Hoc Networks (VANETs). Sensors 2023, 23, 2594. [Google Scholar] [CrossRef]
- Marouane, H.; Dandoush, A.; Amour, L.; Erbad, A. Performance Evaluation of Machine Learning-Based Misbehavior Detection Systems in VANETs: A Comprehensive Study. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), Doha, Qatar, 23–26 October 2023; pp. 1–6. [Google Scholar]
- Alsarhan, A.; Alauthman, M.; Alshdaifat, E.; Al-Ghuwairi, A.-R.; Al-Dubai, A. Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 6113–6122. [Google Scholar] [CrossRef]
- Gad, A.R.; Nashat, A.A.; Barkat, T.M. Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset. IEEE Access 2021, 9, 142206–142217. [Google Scholar] [CrossRef]
- Vitalkar, R.S.; Thorat, S.S.; Rojatkar, D.V. Intrusion Detection for Vehicular Ad Hoc Network Based on Deep Belief Network. In Computer Networks and Inventive Communication Technologies; Smys, S., Bestak, R., Palanisamy, R., Kotuliak, I., Eds.; Springer Nature: Singapore, 2022; pp. 853–865. [Google Scholar]
- Anyanwu, G.O.; Nwakanma, C.I.; Kim, J.-H.; Lee, J.-M.; Kim, D.-S. Misbehavior Detection in Connected Vehicles using BurST-ADMA Dataset. In Proceedings of the 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 19–21 October 2022; pp. 874–878. [Google Scholar]
- Bangui, H.; Ge, M.; Buhnova, B. A hybrid machine learning model for intrusion detection in VANET. Computing 2022, 104, 503–531. [Google Scholar] [CrossRef]
- Rajapaksha, S.; Kalutarage, H.; Al-Kadri, M.O.; Madzudzo, G.; Petrovski, A.V. Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security. In Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving! (CyCon), Tallinn, Estonia, 31 May–3 June 2022; pp. 309–330. [Google Scholar]
- Rajapaksha, S.; Kalutarage, H.; Al-Kadri, M.O.; Petrovski, A.; Madzudzo, G.; Cheah, M. AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey. ACM Comput. Surv. 2023, 55, 1–40. [Google Scholar] [CrossRef]
- Refat, R.U.D.; Abu Elkhail, A.; Hafeez, A.; Malik, H. Detecting CAN Bus Intrusion by Applying Machine Learning Method to Graph Based Features. In Intelligent Systems and Applications; Arai, K., Ed.; Springer International Publishing: Cham, Switzerland, 2022; pp. 730–748. [Google Scholar]
- Sharma, A.; Jaekel, A. Machine Learning Based Misbehaviour Detection in VANET Using Consecutive BSM Approach. IEEE Open J. Veh. Technol. 2022, 3, 1–14. [Google Scholar] [CrossRef]
- Abdelkreem, E.; Hussein, S.; Tammam, A. Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network. Int. J. Inf. Secur. 2024, 23, 1939–1961. [Google Scholar] [CrossRef]
- Sonker, A.; Gupta, R.K. A new procedure for misbehavior detection in vehicular ad-hoc networks using machine learning. Int. J. Electr. Comput. Eng. (IJECE) 2021, 11, 2535–2547. [Google Scholar] [CrossRef]
- Adhikary, K.; Bhushan, S.; Kumar, S.; Dutta, K. Decision Tree and Neural Network Based Hybrid Algorithm for Detecting and Preventing Ddos Attacks in VANETS. Int. J. Innov. Technol. Explor. Eng. 2020, 9, 669–675. [Google Scholar] [CrossRef]
- Shams, E.A.; Ulusoy, A.H.; Rizaner, A. Performance Analysis and Comparison of Anomaly-based Intrusion Detection in Vehicular Ad Hoc Networks. Radioengineering 2020, 29, 664–671. [Google Scholar] [CrossRef]
- Vitalkar, R.S.; Thorat, S.S.; Rojatkar, D.V. Intrusion detection system for vehicular ad-hoc network using deep learning. Int. Res. J. Eng. Technol. 2020, 7, 2294–2300. [Google Scholar] [CrossRef]
- Thorat, S.; Rojatkar, D.; Deshmukh, P. Detection of Unknown Attacks in VANET using a Deep Learning Approach and IoT-based Data Set. Indian Soc. Tech. Educ. 2025, 48, 20–28. [Google Scholar]
- Sambangi, S.; Gondi, L.; Aljawarneh, S.; Annaluri, S.R. SDN DDoS attack image dataset. IEEE Dataport 2021. [Online]. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; pp. 1–8. [Google Scholar] [CrossRef]
- Panigrahi, R.; Borah, S. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. Int. J. Eng. Technol. 2018, 7, 479–482. [Google Scholar]
- Maseer, Z.K.; Yusof, R.; Bahaman, N.; Mostafa, S.A.; Foozy, C.F.M. Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset. IEEE Access 2021, 9, 22351–22370. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Habibi Lashkari, A.; Ghorbani, A.A. A Detailed Analysis of the CICIDS2017 Data Set. In Information Systems Security and Privacy; Mori, P., Furnell, S., Camp, O., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 172–188. [Google Scholar]
- Elsadig, M.A. Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach. IEEE Access 2023, 11, 83537–83552. [Google Scholar] [CrossRef]
- Fang, Y.; Yao, Y.; Lin, X.; Wang, J.; Zhai, H. A feature selection based on genetic algorithm for intrusion detection of industrial control systems. Comput. Secur. 2023, 139, 103675. [Google Scholar] [CrossRef]
- Taheri, R.; Ahmadzadeh, M.; Kharazmi, M.R. A new approach for feature selection in intrusion detection system. Sci. J. 2015, 36, 1344–1357. [Google Scholar]
- Parsaei, M.R.; Taheri, R.; Javidan, R. Perusing the effect of discretization of data on accuracy of predicting naive bayes algorithm. J. Curr. Res. Sci. 2016, 1, 457. [Google Scholar]
- Amoozegar, M.; Minaei-Bidgoli, B. Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism. Expert Syst. Appl. 2018, 113, 499–514. [Google Scholar] [CrossRef]
- Theng, D.; Bhoyar, K.K. Feature selection techniques for machine learning: A survey of more than two decades of research. Knowl. Inf. Syst. 2024, 66, 1575–1637. [Google Scholar] [CrossRef]
- Shirvan, M.H.; Moattar, M.H.; Hosseinzadeh, M. Deep generative approaches for oversampling in imbalanced data classification problems: A comprehensive review and comparative analysis. Appl. Soft Comput. 2025, 170, 112677. [Google Scholar] [CrossRef]
- Mohammed, R.; Rawashdeh, J.; Abdullah, M. Machine Learning with Oversampling and Undersampling Techniques: Overview Study and Experimental Results. In Proceedings of the 11th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 7–9 April 2020; pp. 243–248. [Google Scholar]
- Elsadig, M.A.; Gafar, A. An ensemble model to detect packet length covert channels. Int. J. Electr. Comput. Eng. 2023, 13, 5296–5304. [Google Scholar] [CrossRef]
Service-Based Attacks | Sensing-Based Attacks | Forgery-Based Attacks | Identity-Based Attacks | Message-Based Attacks |
---|---|---|---|---|
Brute force attack | Snooping | Masquerade attack | Movement tracking | Packet dropping |
DoS attack | Traffic analysis attack | Greedy behavior attack | Identity revealing | Social attack |
Reply attack | GPS spoofing | Unauthorized preemption attack | Hardware tapering | Message suppression |
Timing attack | Eavesdropping | Impersonation attack | Malicious vehicle | Pollution attack |
Black hole attack | Forging | Sybil attack | Message modification | |
Malware and spam | Man-in-the-middle attack | Repudiation attack | Bogus information | |
Intentional attack | Illusion attack | Broadcast tampering attack | ||
Jamming | Wormhole attack | |||
Tunneling | ||||
Sleep deprivation torture attack |
Attack Name | Authentication | Confidentiality | Privacy | Availability | Integrity | Authenticity | Non-Repudiation |
---|---|---|---|---|---|---|---|
Impersonation | Yes | Yes | Yes [20] | ||||
DoS | Yes | Yes [20] | |||||
Masquerading | Yes | ||||||
Wormhole/tunneling | Yes | Yes | |||||
Bogus information | Yes | ||||||
Black hole | Yes | ||||||
Social attack | Yes | ||||||
Malware | Yes | ||||||
Man in the middle | Yes | Yes | Yes | ||||
Monitoring attack | Yes | Yes | |||||
Spamming | Yes | ||||||
Illusion attack | Yes | Yes | |||||
Timing attack | Yes | ||||||
Sybil attack | Yes | Yes | Yes [20] | ||||
GPS spoofing | Yes | ||||||
Gray hole | Yes [20] | ||||||
Hidden vehicle | Yes [20] | Yes [20] | |||||
Spoofing | Yes [20] | ||||||
Relay | Yes [20] | Yes [20] | Yes [20] | ||||
Position falsification | Yes [20] |
Physical Layer | Datalink Layer | Network Layer | Transport Layer | Application Layer |
---|---|---|---|---|
Impersonation attack Jamming Free riding Replication Eavesdropping Man in the middle | Traffic analysis Illusion attack Greedy behavior | Tunneling Sybil attack Message tampering Black hole Jellyfish Gray hole Wormhole | DoS Masquerading Reply GPS Spoofing DDoS Spamming | Non-repudiation |
Author | Accuracy | Dataset | Limitations\Drawbacks | Year |
---|---|---|---|---|
Thorat et al. [67] | 96% | IoT datasets | The authors stated that CNNs may struggle with long-term dependencies and LSTM is more complex to train. In addition, an autoencoder may struggle with complex patterns | 2025 |
Setia et al. [47] | 99.59% | Self-generated dataset includes Normal and DDoS classes | The generated dataset requires more evaluation. The study focuses on only one type of VANET attack, which is DDoS. | 2024 |
Kawale et al. [48] | 94.97% | Several online resources | There is no clear description of how the dataset was generated; it is mentioned that the data was combined from different online sources. In addition, it is commonly known that ensemble techniques can enhance detection accuracy; however, they cause more computational cost. The authors do not provide information regarding the proposed model’s computational cost and processing time. | 2024 |
ALMahadin et al. [49] | 83.31% | NSL-KDD | The accuracy obtained is moderate. DL models demand a lot of computing power and may not function in all circumstances. In addition, the NSL-KDD dataset does not include recent attacks. | 2024 |
Ercan et al. [50] | - | VeReMi | The computational cost of the proposed approach is questionable and requires more investigation. It is known that ensemble classification approaches can greatly enhance prediction accuracy; however, they require more computational power. | 2023 |
Rashid et al. [51] | 99% | Self-generated + Kaggle | Their target attacks are only Misbehavior and DDoS. | 2023 |
Marouane et al. [52] | 99% | Self-generated dataset using the SUMO, OMNET++, and VEINS simulators | The generated dataset needs more verification and evaluation to be trusted. The authors indicate that CNN, SVM, and RNN were assessed in terms of their performance, but there is nothing showing that in their article. | 2023 |
Anyanwu et al. [43] | 99.33% | SDN DDoS [68] and CICDDoS2019 [69] | The model focuses on one type of attack, instead of considering various types. The ability to detect several types of attacks can significantly increase the visibility of the proposed model in terms of the computational cost. | 2023 |
Alsarhan et al. [53] | 99% | NSL-KDD | Training their model on a limited number of network scenarios raises questions about the model’s robustness [43]. The NSL-KDD dataset does not include recent attacks [54]. | 2023 |
Kaur and Kakkar [12] | 0.9395 | Self-generated | The cost requirement is high [48] | 2022 |
Karthiga et al. [45] | 98.6% | i-VANET and CIC-IDS 2017. | The detection of unknown attacks needs more verification. | 2022 |
Vitalkar et al. [55] | 98% and 90% | CICIDS2017 | A complex detection algorithm [45]. In addition, the computational cost is questionable as the proposed classification model is based on a DL method that requires more computational power. | 2022 |
Anyanwu et al. [56] | 98.92% | BurST-ADMA | Ensemble classification approaches are capable of providing better performance; however, they involve more computations that need extra computational power, which can affect network performance. Low-cost solutions are more applicable. | 2022 |
Bangui et al. [57] | 96.93% | CICIDS2017 | It requires more training time, more resources, and more computational power [48]. | 2022 |
Rajapaksha et al. [58] | F1-Score of greater than 99% | Public real data (HCRL CH, HCRL SA, ROAD) | Limited capacity to identify attacks on high-frequency aperiodic IDs [59]. | 2022 |
Refat et al. [60] | 97.99% and 97.92% for KNN and SVM | HCRL CH | The detection rate for the spoofing attack was low [59]. | 2022 |
Sharma and Jaekel [61] | 99.2% and 98.8% for precision and recall. | VeReMi | The dataset employed in this study does not represent all possible VANET position falsification attacks. In addition, no information regarding the accuracy of the proposed approach is included [62]. | 2022 |
Gad et al. [54] | 97.9% and 98.2% | ToN-IoT | XGBoost is an ensemble classifier and therefore its computational cost needs to be investigated. | 2021 |
Sonker and Gupta [63] | 97.62% | VeReMi | The comparison does not include the computational cost of these classifiers, which is an important factor to be considered especially when dealing with networks that involve high mobility and rapid changes in topology. | 2021 |
Adhikary et al. [64] | 96.40% | Self-generated | Even though the accuracy of the proposed hybrid model is high and might be regarded as a near-reliable criterion for a VANET, their proposed model leads to an increase in computing complexity [43]. | 2020 |
Shams et al. [65] | 99% for recall and precision. | Self-generated | Their proposed model targets one type of attack. More verification of their model using a public and trusted dataset is required. | 2020 |
Vitalkar et al. [66] | 98.07% | CICIDS2017 | DL models cause more computational overhead. | 2020 |
TheProposed Model | 99.8% | CICIDS2017 | Our future work will focus on performing more evaluations using different datasets. | 2025 |
Classifier | Parameters |
---|---|
KNN | Number of neighbors = 5 |
RF | Number of trees = 10, tree depth = 5 |
MLP | Neurons in hidden layers = 100, maximal number of iterations = 200 |
DT | Min. number of instances in leaves = 2, limit the maximal tree depth to 100 |
AdaBoost | Number of estimators = 50 |
Attack Type | Number of Instances |
---|---|
Botnet ARES | 1873 |
Brute Force | 10,201 |
Dos/DDos | 26,066 |
Infiltration | 29 |
Normal | 26,185 |
PortScan | 25,409 |
Web Attack | 2067 |
Total of instances | 91,830 |
Features | Weight (Score) |
---|---|
Destination Port | 1.093 |
Bwd Packet Length Mean | 1.073 |
Avg Bwd Segment Size | 1.073 |
Total Length of Bwd Packets | 1.065 |
Subflow Bwd Bytes | 1.065 |
Bwd Packet Length Max | 1.053 |
Feature | Weight | Feature | Weight |
---|---|---|---|
FIN Flag Count | 0.093 | CWE Flag Count | 0.000 |
URG Flag Count | 0.085 | Bwd PSH Flags | 0.000 |
Fwd PSH Flags | 0.082 | Bwd URG Flags | 0.000 |
SYN Flag Count | 0.082 | Fwd Avg Bytes Bulk | 0.000 |
Idle Std | 0.054 | Fwd Avg Packets Bulk | 0.000 |
Active Std | 0.041 | Fwd Avg Bulk Rate | 0.000 |
RST Flag Count | 0.000 | Bwd Avg Bytes Bulk | 0.000 |
ECE Flag Count | 0.000 | Bwd Avg Packets Bulk | 0.000 |
Fwd URG Flags | 0.000 | Bwd Avg Bulk Rate | 0.000 |
Accuracy | Recall | Precision | F1 Score | MCC | |
---|---|---|---|---|---|
MLP | 98.9 | 98.9 | 98.9 | 98.9 | 98.5 |
RF | 99.5 | 99.5 | 99.5 | 99.5 | 99.3 |
AdaBoost | 99.3 | 99.3 | 99.3 | 99.3 | 99.0 |
DT | 97.9 | 97.9 | 97.9 | 97.8 | 97.2 |
KNN | 96.9 | 96.9 | 96.9 | 96.8 | 95.8 |
Classifier | Training Time (s) | Testing Time (s) | Computation Time (s) |
---|---|---|---|
KNN | 11.374 | 138.747 | 150.121 |
MLP | 3188.379 | 2.548 | 3190.927 |
RF | 38.043 | 1.827 | 39.87 |
DT | 78.155 | 0.053 | 78.208 |
ADA | 55.246 | 1.406 | 56.652 |
Accuracy | Training Time (s) | Testing Time (s) | Execution Time (s) | |
---|---|---|---|---|
MLP | 98.9 | 2743.669 | 2.114 | 2745.783 |
RF | 99.5 | 36.345 | 1.656 | 38.001 |
AdaBoost | 99.3 | 53.566 | 1.091 | 54.657 |
DT | 97.9 | 63.832 | 0.060 | 63.892 |
KNN | 96.9 | 6.839 | 102.980 | 109.819 |
Accuracy | Recall | Precision | F1 Score | MCC | AUC | |
---|---|---|---|---|---|---|
MLP | 99.1 | 99.1 | 99.1 | 99.1 | 98.9 | 99.9 |
RF | 99.8 | 99.8 | 99.8 | 99.8 | 99.7 | 100 |
AdaBoost | 99.7 | 99.7 | 99.7 | 99.7 | 99.6 | 99.8 |
DT | 98.5 | 98.5 | 98.5 | 98.5 | 98.3 | 99.5 |
KNN | 98.4 | 98.4 | 98.5 | 98.4 | 98.2 | 99.7 |
Botnet ARES | Brute Force | Dos/DDos | Infiltration | PortScan | Web Attack | Normal | |
---|---|---|---|---|---|---|---|
DT | 99.5 | 99.9 | 99.6 | 100 | 99.8 | 99.6 | 98.7 |
RF | 100 | 100 | 99.8 | 100 | 100 | 100 | 99.8 |
AdaBoost | 100 | 100 | 99.7 | 100 | 100 | 100 | 99.7 |
MLP | 100 | 99.7 | 99.6 | 100 | 99.8 | 99.7 | 99.3 |
KNN | 99.9 | 99.9 | 99.0 | 100 | 99.7 | 99.9 | 98.6 |
Attack | FN | FP |
---|---|---|
Botnet ARES | 0.0000 | 0.0005 |
Brute Force | 0.0000 | 0.0001 |
Dos/DDos | 0.0027 | 0.0126 |
Infiltration | 0.0000 | 0.0000 |
PortScan | 0.0005 | 0.0008 |
Web Attack | 0.0000 | 0.0002 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Published by MDPI on behalf of the World Electric Vehicle Association. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Elsadig, M.A.; Altigani, A.; Mohamed, Y.; Mohamed, A.H.; Kannan, A.; Bashir, M.; Adiel, M.A.E. Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks. World Electr. Veh. J. 2025, 16, 324. https://doi.org/10.3390/wevj16060324
Elsadig MA, Altigani A, Mohamed Y, Mohamed AH, Kannan A, Bashir M, Adiel MAE. Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks. World Electric Vehicle Journal. 2025; 16(6):324. https://doi.org/10.3390/wevj16060324
Chicago/Turabian StyleElsadig, Muawia A., Abdelrahman Altigani, Yasir Mohamed, Abdul Hakim Mohamed, Akbar Kannan, Mohamed Bashir, and Mousab A. E. Adiel. 2025. "Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks" World Electric Vehicle Journal 16, no. 6: 324. https://doi.org/10.3390/wevj16060324
APA StyleElsadig, M. A., Altigani, A., Mohamed, Y., Mohamed, A. H., Kannan, A., Bashir, M., & Adiel, M. A. E. (2025). Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks. World Electric Vehicle Journal, 16(6), 324. https://doi.org/10.3390/wevj16060324