Next Article in Journal
DeepRT: A Hybrid Framework Combining Large Model Architectures and Ray Tracing Principles for 6G Digital Twin Channels
Previous Article in Journal
Commonness and Inconsistency Learning with Structure Constrained Adaptive Loss Minimization for Multi-View Clustering
Previous Article in Special Issue
Editorial for the Special Issue on “Application of Artificial Intelligence in the New Era of Communication Networks”
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

False Information Mitigation Using Pattern-Based Anomaly Detection for Secure Vehicular Networks

by
Abinash Borah
and
Anirudh Paranjothi
*
Department of Computer Science, Oklahoma State University, Stillwater, OK 74078, USA
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(9), 1848; https://doi.org/10.3390/electronics14091848
Submission received: 1 April 2025 / Revised: 25 April 2025 / Accepted: 29 April 2025 / Published: 1 May 2025

Abstract

:
Vehicular networks utilize wireless communication among vehicles and between vehicles and infrastructures. While vehicular networks offer a wide range of benefits, the security of these networks is critical for ensuring public safety. The transmission of false information by malicious nodes (vehicles) for selfish gain is a security issue in vehicular networks. Mitigating false information is essential to reduce the potential risks posed to public safety. Existing methods for false information detection in vehicular networks utilize various approaches, including machine learning, blockchain, trust scores, and statistical techniques. These methods often rely on past information about vehicles, historical data for training machine learning models, or coordination between vehicles without considering the trustworthiness of the vehicles. To address these limitations, we propose a technique for False Information Mitigation using Pattern-based Anomaly Detection (FIM-PAD). The novelty of FIM-PAD lies in using an unsupervised learning approach to learn the usual patterns between the direction of travel and speed of vehicles, considering the variations in vehicles’ speeds in different directions. FIM-PAD uses only real-time network characteristics to detect the malicious vehicles that do not conform to the identified usual patterns. The objective of FIM-PAD is to accurately detect false information in vehicular networks with minimal processing delays. Our performance evaluations in networks with high proportions of malicious nodes confirm that FIM-PAD on average offers a 38% lower data processing delay and at least 19% lower false positive rate compared to three other existing techniques.

1. Introduction

Vehicular networks are designed based on the wireless communication capabilities of vehicles, infrastructures, and other entities on the road, such as pedestrians, integrating them into a network. Wireless communication between vehicles and other entities that may affect or may be affected by the vehicles is termed vehicle-to-everything (V2X) communication. V2X communication has contributed to various advancements, including autonomous driving and intelligent transportation systems. V2X communication offers safety and comfort to the vehicle as well as to road users. In addition, vehicular networks facilitate critical emergency communication. In vehicular networks, Road-Side Units (RSUs) deployed at selected points along the roads constitute the roadside infrastructure. The vehicles use their On-Board Unit (OBU) devices to communicate amongst themselves as well as with the infrastructure [1,2]. The vehicles in a network periodically transmit beacon messages or basic safety messages with their live data, such as speed of travel, position, acceleration, direction, etc. They can further send messages concerning on-road incidents or emergency situations, like accidents or road congestion [3,4]. Nonetheless, vehicular networks are susceptible to security threats from malicious vehicles that spread false information to frame fake events for their own advantage. Securing vehicular networks from such malicious activities is crucial due to the risks posed to public safety. However, security assurance is challenging due to the fundamental characteristics of vehicular networks. These characteristics include wireless communication, fast mobility, sporadic connectivity, dynamic topology, and complexities in assessing trust and validating shared information [5,6]. Regardless of the challenges, mitigating false information is indispensable for preventing dangerous consequences stemming from reactive actions taken by vehicles responding to the false information received [7].
The prevailing methods for identifying false information in vehicular networks employ different techniques, including machine learning, trust scores, blockchain, statistical methods, etc. However, these methods have various limitations, which are discussed in Section 2. Among the existing methods, RSU-based Online Intrusion Detection and Mitigation [8], referred to as RSUOIDM hereafter, leverages historical data transmitted by the vehicles within the vicinity of RSUs and constructs models for anomaly detection. These models are used by the RSUs to analyze newly received information from vehicles by calculating an anomaly score based on the model. However, this method incurs initialization delays due to its reliance on historical data. Additionally, if traffic patterns in the RSUs’ communication range change between the time of historical data collection and evaluation, the detection accuracy of the technique may degrade. Another approach, using data clustering for false information detection [9], referred to as DCFID hereon, utilizes unsupervised machine learning with data clustering to detect false information. In this approach, vehicles are clustered into benign and malicious groups based on similarities in their beacon message data. While the accuracy of DCFID is high under the assumption that all malicious nodes broadcast identical false beacon message data, the malicious nodes can disseminate varied values of false data. A recent study [10] proposes an intelligent trust management strategy (ITMS) for mitigating false messages in vehicular networks. In ITMS, a vehicle evaluates messages from other vehicles using a comprehensive trust evaluation based on a direct trust calculated on its own and indirect trust received from other vehicles. Though this approach offers accurate detection at lower proportions of malicious nodes in the network, the accuracy degrades, and a high number of false alarms are generated at higher proportions of malicious nodes. Moreover, vehicles need to depend on each other in the trust evaluation process.
We introduce a false information detection technique for vehicular networks, addressing the limitations of existing methods. The proposed technique leverages an unsupervised pattern-based anomaly detection approach, and thus we call our technique False Information Mitigation using Pattern-based Anomaly Detection (FIM-PAD). FIM-PAD uses only real-time data transmitted in the network, and it can be independently used by any vehicle to distinguish false information transmitted in its vicinity. To minimize data processing delays, we use a data binning method in the pattern-based anomaly detection, which avoids repeated scanning of information received from other vehicles. FIM-PAD’s novelty lies in its ability to identify usual patterns between the direction of travel and speed of vehicles and detect false information solely using the real-time network properties, eliminating the need for historical data and cooperation between vehicles. The motivations for FIM-PAD are to meet high accuracy within minimal delay at high proportions of malicious nodes. We evaluate the performance of FIM-PAD with up to 35% of malicious nodes in simulation scenarios. The results demonstrate that FIM-PAD is capable of fast and accurate false information discovery. On average, it achieves a 38% lower processing delay and at least 19% less false positive rate in comparison to RSUOIDM [8], DCFID [9], and ITMS [10].
The following are the contributions of the paper:
  • We propose a technique for detecting false information in vehicular networks, FIM-PAD, using an unsupervised pattern-based anomaly detection method. FIM-PAD learns the usual patterns between the direction of travel and speed of vehicles, and thus identifies malicious vehicles not conforming to the learned patterns. FIM-PAD analyzes vehicles traveling in different directions separately, considering the variations in speeds of vehicles traveling in different directions.
  • Vehicles can independently detect false information with FIM-PAD using only real-time network information without depending on historical data, infrastructures, or other vehicles.
  • We reduce processing delays with a data binning method for finding patterns in the beacon message data and use the binned data for anomaly detection, thereby eliminating the need for repeated scans of data.
  • We carry out comprehensive simulations to compare the performance of FIM-PAD with other existing approaches in urban and highway scenarios with varying proportions of malicious nodes.
The remainder of the paper is structured as follows: Section 2 presents the current related work on false information discovery in vehicular networks; Section 3 describes the specifics of FIM-PAD; Section 4 provides the results of performance assessment; and Section 5 suggests future research plans and concludes the paper.

2. Related Work

In this section, we present an overview of recent studies on false information discovery in vehicular networks.
The approach introduced in [7] creates a time series of traffic parameters and uses a Long Short-Term Memory (LSTM) neural network to distinguish legitimate and fake events. Though the technique offers high accuracy, it trains the neural network with historical traffic information that may not be appropriate for all scenarios. For example, a network trained on data from urban areas may not work well for evaluating vehicles traveling on highways. A further machine learning-based method in [11] combines features of vehicles obtained from signal properties like received signal strength and signal direction and uses a Kalman filter algorithm to extract contextual patterns for each vehicle. An artificial neural network to detect false messages is trained with the innovation errors of the filter, which are the differences between predicted and observed values. The method shows high accuracy; however, it also relies on historical data for training. The ensemble learning approach for falsification detection presented in [12] proposes an ensemble-based random forest classifier that uses randomized search optimization for parameter selection. The experimental evaluations show a high detection accuracy of this technique without evaluating the processing delay. Moreover, this approach requires computationally expensive training of the ensemble-based classifier, and therefore it is not suitable for real-time detection of false information.
The false information detection technique proposed in [13] uses the OBUs on vehicles to create a fog layer that is controlled by a central node, known as the guard node. The centralized node uses a statistical method to evaluate the speeds of vehicles reported in beacon messages. If the stated speed of a node substantially deviates from the others in the vicinity, the centralized node marks the node as malicious. Although the technique offers modest latency with high accuracy, its dependence on a central node makes it susceptible to a single point of failure. A further fog computing-based statistical method was proposed in [14], where a fog layer is dynamically formed with vehicles parked beside the road. All fog nodes accumulate data from the beacon messages of neighboring vehicles and calculate the average speed to apply a statistical test in parallel to detect malicious vehicles. Although this method performs well in small-sized networks, its accuracy declines with an increased number of vehicles. Furthermore, the authors of [15] proposed a trust management approach that uses contextual knowledge obtained from messages transmitted by vehicles. This approach applies a statistical technique to anomaly detection for false information detection. Though this approach achieves high accuracy in networks with a small number of nodes, the scalability of the method is limited due to its high computational costs in larger networks.
Some studies use blockchain-based approaches for false detection in vehicular networks. One such approach, presented in [16], authenticates traffic events to detect malicious vehicles by leveraging neighbor evidence and incident reports submitted by each vehicle to RSUs. A blockchain network operates between the RSUs in this approach, with data of vehicles added as blocks by a mining RSU after attaining an agreement with other RSUs. Similarly, the authors of [17] introduced a trust management paradigm using blockchain that incorporates a threshold ring signature method, allowing vehicles to verify message authenticity and reliability anonymously while preserving privacy. This method enables RSUs to block false information and confirm the credibility of the messages. The study in [18] proposed an alternative blockchain-based trust management system that evaluates the reliability of vehicles and their transmitted data to discover false information. When some incidents are reported by vehicles to nearby RSUs, the trust model is used to validate those, and RSUs collectively update and store vehicle trust values on the blockchain. A reputation system based on blockchain was presented in [19], where vehicles validate event reports from other vehicles to determine their reputations, which are then stored on a blockchain maintained by RSUs. Another study in [20] presented a reputation assessment and management framework using two parallel blockchains, one reputation chain maintained by vehicles and the other, an event chain, maintained by RSUs. This approach calculates the trust scores of vehicles using both direct and indirect trust based on vehicles’ historical reputations and uses the scores to verify the information shared by the vehicles. Even though the blockchain-based methods in [16,17,18,19,20] exhibit high accuracy in false information detection, they are not scalable to large networks due to their high computational overhead.
The false message detection technique outlined in [21] assesses node profiles using a reward–penalty scheme. Vehicles earn rewards for transmitting genuine information and incur penalties for sending false messages. If a message sender’s reward-to-penalty ratio drops under a specified limit, the evaluation procedure is initiated. Any message is agreed upon only if the sender’s reward-to-penalty ratio is above the limit. However, this approach tends to incorrectly classify a high number of genuine messages as false. The technique we propose in this paper, FIM-PAD, addresses the disadvantages of the prevailing methods [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21]. FIM-PAD uses unsupervised pattern-based anomaly detection in real-time data transmitted within the network to discover false information without depending on any prior information about vehicles or historical traffic data.

3. The Proposed Technique: FIM-PAD

In this section, we present the details of the proposed FIM-PAD technique. We begin by explaining pattern-based anomaly detection and the attack model considered in this study.
Pattern-based anomaly detection identifies data points that deviate from the usual patterns within a dataset [22,23]. Instead of focusing on individual data values, this technique finds anomalies based on their failure to align with the typical patterns observed in the majority of the data in a dataset. Pattern-based anomaly detection fundamentally considers data points showing substantially different features than the normal patterns in the data to be anomalous. In unsupervised pattern-based anomaly detection, the frequent or usual patterns in a dataset are first discovered without using any labels for normal or anomalous data. Then, the data points that do not conform to the learned regular patterns are identified to be anomalies [24,25].
Attack model: In the attack model considered in this study, malicious vehicles transmit a false speed in the beacon messages, which is lower than its actual speed to generate the impression of on-road congestion or an emergency incident [13]. The vehicles evaluate the beacon message data transmitted by the other vehicles in their vicinity to discover false information not conforming to the usual patterns in the messages. FIM-PAD works under the following assumptions: It is assumed that the majority of vehicles in the network are honest, as assumed by some other works [7,13]. We also make a realistic assumption that the speed of vehicles traveling in opposite directions in an area can be different due to varying traffic densities and on-road events or activities such as road work, lane closures, etc.

3.1. Overview of FIM-PAD

In FIM-PAD, we use an unsupervised learning approach to first find patterns in the data transmitted by the vehicles in the beacon messages. We then perform a collective evaluation of the vehicles to identify malicious vehicles that do not conform to the identified patterns. Each vehicle maintains a node list N l to store the vehicle I D , the direction of travel, and the speed value broadcast by all other vehicles in its transmission range. Hence, each tuple in N l is of the form < I D ,   d i r ,   s p e e d > , where I D , d i r , and s p e e d denote the I D , direction of travel, and speed in the beacon message of a vehicle. An evaluator vehicle finds the association between the direction of travel and speed values transmitted by other vehicles in its vicinity. From these associations, it identifies the patterns exhibited by the majority of the vehicles to classify the vehicles not conforming to the detected patterns to be malicious.
The vehicles in a region traveling in the same direction move with similar speeds under the same traffic situation, and their movements are shaped by the movement of other vehicles in proximity. As such, if a vehicle transmits a substantially dissimilar speed value compared to the other vehicles traveling in the same direction in the same area, the vehicle is considered to be spreading false information. Therefore, such a vehicle is classified as malicious. Vehicles use pattern-based anomaly detection to spot the deviating speed values by evaluating the real-time beacon messages arriving from other vehicles. The overall approach of FIM-PAD is illustrated in Figure 1. To find the usual patterns between the direction of travel and the speed of vehicles, we use approximations with a data binning method to minimize processing delay. The binned data is used in the subsequent pattern mining and detection phase to find normal patterns and identify malicious vehicles. We explain the data binning phase and pattern mining and detection phase in Section 3.2 and Section 3.3, respectively.

3.2. Data Binning Phase

To find the patterns or relationships between the direction of travel and the speed of vehicles, the speed values of vehicles are discretized into bins. The binning also benefits the detection stage as groups of vehicles are collectively evaluated with the binned information instead of evaluating the vehicles one at a time. An evaluator vehicle creates two sets of bins: one set of bins for the vehicles traveling in the same direction as itself and the other set for the vehicles traveling in the opposite direction. For each bin in both sets, a node count and a list of nodes in that bin are maintained. When a vehicle reads each tuple of the form < I D ,   d i r ,   s p e e d > in its node list N l , the bins are created dynamically based on the speeds of the vehicles. For each vehicle in the node list, the bin index b i n i n d is calculated as follows:
b i n i n d = c e i l i n g s p e e d b i n w i d ,
where the bin width parameter b i n w i d is computed as follows. To approximate the range of similar speed values R in the beacon messages of the majority of vehicles traveling in the same direction, a set of successive bins is considered. If the number of bins considered in the set for this approximation is n u m b i n s , b i n w i d is calculated based on R and n u m b i n s using Equation (2), i.e., n u m b i n s bins of equal width b i n w i d constitute the overall range R .
R = n u m b i n s · b i n w i d ,
b i n w i d = R n u m b i n s ,
A small number is considered for n u m b i n s to reduce the processing time of the pattern mining and detection phase. After computing b i n i n d for a vehicle, the corresponding bin for the direction of that vehicle’s travel is created if it does not previously exist, and the node count for that bin is set as one. If the corresponding bin is previously created, its node count is incremented by one. In both cases, the I D of the node is inserted into the list of node I D s for that bin. The sets of bins created for either direction are used in the pattern mining and detection phase to identify malicious vehicles without having to scan the node list once more. As the speeds of vehicles in an area are close to each other, only a small number of bins are created. As a result, the collective processing of nodes as bins reduces the processing time of the pattern mining and detection phase, as discussed in Section 3.3.

3.3. Pattern Mining and Detection Phase

In the pattern mining and detection phase of FIM-PAD, the bins created in the binning phase are used to find the usual patterns. These patterns are of the form < D ,   R > , where D and R respectively denote the direction of travel and a range of similar speeds as defined in Section 3.2. Hence, for an evaluator vehicle, D can necessarily have two values: traveling in the same direction as itself and traveling in the opposite direction. R is obtained for each direction from the bins created for the respective direction in the binning phase by finding a set of consecutive bins that cumulatively gives the maximum node count. We call this set of bins frequent bins and denote it by F b as they represent the common pattern between the direction of travel and speed for the majority of the vehicles moving in that direction.
To find F b for each direction, we use a sliding window-based evaluation to obtain the rolling maximum cumulative node count, m a x c o u n t , starting with the first bin and considering n u m b i n s bins in each window. The cumulative node count for a window is the sum of the node counts for the bins in the window. Since the bins are constructed as required based on speed values in the beacon messages received from other vehicles, not all consecutive bins may exist. Hence, we need to consider only bins that exist. For the same reason, we need to find the minimum and maximum bin ids m i n and m a x and find the rolling maximum cumulative node count starting from m i n and continuing up to m a x n u m b i n s . An example of finding m a x c o u n t and hence F b is shown in Figure 2 with n u m b i n s = 3 and assuming that all the consecutive bins exist. For simplicity, we show only the node count for each bin in the figure. The overall procedure of finding frequent bins is summarized in Algorithm 1.
Algorithm 1: Frequent Bins Finding Algorithm
Input: List of bins B l , Number of bins n u m b i n s
Output: Set of consecutive bins F b with maximum cumulative node count
1: m a x c o u n t = 0
2: m i n = minimum bin id in B l
3: m a x = maximum bin id in B l
4: for i = m i n to m a x n u m b i n s
5:    c u r r e n t c o u n t = n o d e c o u n t for bin i
6:    f = { i }
7:   for  j = i to i + n u m b i n s
8:     if bin id j exists in B l then
9:          f = f { j }
10:        c u r r e n t c o u n t = c u r r e n t c o u n t + n o d e c o u n t for bin j
11:     else
12:       Continue
13:     end if
14:   end for
15:   if  c u r r e n t c o u n t > m a x c o u n t then
16:      m a x c o u n t = c u r r e n t c o u n t
17:      F b = f
18:   end if
19: end for
20: Return F b
21: end
Once the set of frequent bins F b for each direction is obtained, the bins in this set are considered to constitute R for the corresponding direction. The nodes belonging to these bins constitute the usual pattern of the form < D , R > for direction D , and hence these nodes are classified as honest. The nodes belonging to the other bins for direction D , unless these bins are adjacent to the bins in F b , do not conform to this usual pattern. Hence, these nodes are classified as malicious and are inserted into the malicious node set M , which FIM-PAD outputs. The two adjacent bins, one on either side, are excluded as the speed values of the nodes in these bins are very close to the speed values of the honest nodes. This helps in reducing false alarms, and malicious nodes are not benefited either, which transmit considerably deviating speed values in the beacon messages than the honest nodes. The entire evaluation process of FIM-PAD is outlined in Algorithm 2.
Algorithm 2: FIM-PAD Algorithm
Input: Node list N l , Range parameter R , Number of bins n u m b i n s
Output: Set of malicious nodes M
1: Calculate b i n w i d using Equation (3)
2: for each tuple < I D , d i r , s p e e d > in N l     //start of binning phase
3:   Calculate b i n i n d using Equation (1)
4:   if bin id b i n i n d for direction d i r exists then
5:     Increment n o d e c o u n t for bin id b i n i n d
6:   else
7:     Create bin id b i n i n d for direction d i r
8:     Set n o d e c o u n t for bin id b i n i n d to 1
9:   end if
10:   Add I D to n o d e l i s t for bin id b i n i n d for direction d i r
11: end for                  //end of binning phase
12: for each direction d          //pattern mining and detection phase starts
13:   Find F b using Algorithm 1
14:   for each bin b i not in F b and not adjacent to F b
15:     Add all I D s in n o d e l i s t of b i to M
16:   end for
17: end for               //pattern mining and detection phase ends
18: Output M
19: end

3.4. Time Complexity Analysis of FIM-PAD

We analyze the time complexity of FIM-PAD in this subsection. For the data binning phase, the time complexity is O ( n n ) ; here, n n is the number of vehicles in N l . For the pattern mining and detection phase, the time complexity for finding F b with Algorithm 1 is O ( n u m b i n s 2 ) and the time complexity of finding the malicious nodes after finding F b is O ( n u m b i n s n n ) . Since the number of bins is insignificant in comparison to the number of vehicles in N l , i.e., n u m b i n s n n , the time complexity of FIM-PAD can be expressed as O ( n n ) . This linear time complexity of FIM-PAD results in low data processing delays in false information detection, which is observed in the experimental evaluations in Section 4.

4. Performance Evaluation

In this section, the details of the performance evaluations are discussed with the simulation setup, the performance metrics considered, and the comparative results. As mentioned in Section 1, we compare FIM-PAD with RSUOIDM [8], DCFID [9], and ITMS [10].

4.1. Simulation Setup

The performance of FIM-PAD was evaluated with simulations in urban and highway scenarios. We used the Veins framework [26,27] that uses SUMO and OMNET++ simulators for our simulations performed on a computer with an Intel 8th Gen i5-8400 Hexacore 4 GHz processor and 8 GB DDR4 RAM running Ubuntu 22.04.3 LTS. In the simulations, SUMO generates traces of vehicle movements in real-world road networks imported from OpenStreetMap [28]. OMNET++ is used for communication between vehicles in the simulation scenario. Veins couples SUMO and OMNET++ to support online simulation of vehicular networks.
Two maps of Stillwater, OK, USA, were imported from OpenStreetMap with two segments of the highway U.S. 177 that runs across Stillwater for the simulations. One of these segments corresponds to an urban scenario within the city limits, and the other is a highway scenario outside the city limits. In the urban scenario, vehicles travel at 40–65 kph speed, and in the highway scenario, vehicles travel at 80–120 kph speed. Due to variations in traffic densities, vehicles traveling in opposite directions travel at marginally different speeds within these speed intervals. Honest vehicles transmit real speed values in their beacon messages, while malicious vehicles transmit substantially lower speeds to create a fake impression of congestion on the road. We ran 500 vehicles in our simulations and changed the fraction of malicious nodes from 10% to 35% to measure and compare the detection performance of FIM-PAD. The different parameter values used are shown in Table 1.

4.2. Performance Metrics

We used the following six metrics that are commonly used in literature to measure and compare the performance of FIM-PAD.
Data processing time: This is the time required for an evaluator vehicle or an RSU to process the information in beacon messages.
Accuracy: The fraction of accurately categorized nodes out of all the nodes in the simulation scenario.
A c c u r a c y = T P + T N T P + F N + T N + F P
where T P is the number of accurately identified malicious nodes, T N is the number of correctly classified honest nodes, F N is the number of malicious nodes incorrectly classified as honest, and F P is the number of honest nodes incorrectly classified as malicious.
Precision: The portion of accurately classified malicious nodes among all the nodes classified to be malicious.
P r e c i s i o n = T P T P + F P
Recall: The portion of accurately identified malicious nodes among all nodes that are indeed malicious.
R e c a l l = T P T P + F P
F1 score: F1 score uniformly indicates precision and recall; it is the harmonic mean of precision and recall.
F 1   s c o r e = 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l
False positive rate (FPR): The portion of honest nodes that are falsely classified as malicious.
F P R = F P T N + F N

4.3. The Urban Scenario Results

In this subsection, the results obtained for the simulations in the urban scenario are presented.
Data Processing Time: In the urban scenario, data processing time of FIM-PAD is 34% lower overall, which is seen in Figure 3a. Avoiding multiple scans of the node list to create the bins and subsequent collective evaluation of the bins in FIM-PAD offers lower data processing time compared to the other three techniques. Data processing times of all four methods are not dependent on the proportion of malicious nodes. The quantity of beacon messages to be evaluated is consistent regardless of the proportion of malicious nodes, and hence, processing time also remains stable. In RSUOIDM, the beacon messages are evaluated one by one by an RSU, causing an increase in the processing time, whereas the additional time required for clustering in DCFID leads to higher processing time, despite evaluating the nodes collectively after clustering. In ITMS, vehicles evaluate each other by processing the beacon messages one by one, resulting in higher processing times. Contrary to this, FIM-PAD does the binning by going through the node list only once, followed by a collective evaluation of the bins.
Accuracy: FIM-PAD maintains stable accuracy with increases in the percentage of malicious nodes. As observed from Figure 3b, when the malicious nodes percentage reaches above 30%, the accuracy of FIM-PAD marginally reduces. The pattern-based evaluation in FIM-PAD accurately categorizes nearly every node with the data binning technique and finds the pattern demonstrated by the honest nodes to achieve high accuracy. The accuracy of FIM-PAD remains the same, or in most cases higher, in comparison to DCFID, RSUOIDM, and ITMS for all percentages of malicious nodes.
Precision: The precision of FIM-PAD also remains perfect until malicious nodes reach 30% of the total and decreases slightly when the percentage of malicious nodes reaches 35%, as seen from Figure 3c. This indicates the correctness of the detection approach of FIM-PAD. As the vehicle speeds vary in the scenarios of simulation, the speed values of a portion of the honest vehicles slightly deviate from majority of the honest vehicles. These honest vehicles with slightly deviated speed are wrongly classified as malicious, causing a modest reduction in the precision value. FIM-PAD shows the same or better precision for all malicious node percentages in comparison to DCFID, RSUOIDM, and ITMS.
Recall: As observed in Figure 3d, the recall of FIM-PAD remains perfect for all percentages of malicious nodes, whereas the recall value degrades beyond 15% malicious nodes for RSUOIDM and beyond 20% malicious nodes for DCFID and ITMS. FIM-PAD accurately identifies all malicious nodes and shows a perfect recall value. Malicious nodes in the network significantly change the speed value in their beacon messages to show the impression of a false event. The pattern mining method in FIM-PAD correctly separates these differing speed values and detects the malicious nodes.
F1 score: The F1 score of FIM-PAD remains ideal until malicious nodes account for 30% of the total, and reduces slightly at 35% malicious nodes due to the marginal reduction in precision at this point. As illustrated by Figure 3e, F1 score for FIM-PAD is better than DCFID, RSUOIDM, and ITMS, which indicates that FIM-PAD effectively discovers the malicious nodes and, at the same time, does not incorrectly classify some honest nodes as malicious.
FPR: FPR of FIM-PAD stays significantly lower in comparison to DCFID, RSUOIDM, and ITMS, which is seen from Figure 3f. The FPR value slightly rises above the perfect value of zero when the percentage of malicious nodes reaches 35%. With a high percentage of malicious nodes, FIM-PAD inaccurately categorizes a small number of honest vehicles as malicious, which results in this slight increase of FPR. Overall, the correct identification of honest nodes as honest offers a much lower FPR compared to RSUOIDM, DCFID, and ITMS, which is about 19% of the FPR of the other three techniques, even in the worst-case scenario.

4.4. The Highway Scenario Results

In this subsection, the results obtained for the simulations in the highway scenario are presented.
Data processing time: As seen in Figure 4a, FIM-PAD, on average, shows a 42% reduced data processing time as compared to DCFID, RSUOIDM, and ITMS. As with the urban setting, the processing times of all four methods are not dependent on the malicious node proportions. FIM-PAD’s processing time is slightly higher in the highway setting in comparison to the urban setting, as due to more variations in vehicle speeds within highway scenario, a higher number of bins are created.
Accuracy: FIM-PAD initially offers perfect accuracy in the highway scenario, which marginally decreases with the increase in the malicious nodes beyond 20%, as observed from Figure 4b. Though the accuracy slightly degrades for all percentages of malicious nodes, FIM-PAD offers the same or better accuracy in comparison to DCFID, RSUOIDM, and ITMS by accurately identifying almost all the honest and malicious nodes.
Precision: As illustrated by Figure 4c, the precision of FIM-PAD remains significantly better than RSUOIDM and DCFID. Though the precision deteriorates beyond 15% malicious nodes, it remains above 0.93 at 35% malicious nodes. The precision of RSUOIDM fluctuates due to the changes between speed of vehicles in the real scenario and the training data. The precision of DCFID also significantly drops above 15% malicious nodes as the clustering process incorrectly classifies some honest nodes as malicious, with an increase in malicious nodes. The precision of ITMS also significantly drops above 10% of malicious nodes.
Recall: The recall of FIM-PAD remains perfect at all percentages of malicious nodes, which is seen in Figure 4d. Whereas the recall for RSUOIDM, DCFID, and ITMS degrades when the malicious node percentage increases past 15%, 20%, and 25%, respectively. This indicates that FIM-PAD accurately discovers nearly all the malicious nodes with binning and pattern mining to accurately separate the deviating speed values in the beacon messages of the malicious nodes.
F1 score: As observed from Figure 4e, F1 score of FIM-PAD remains the same or better than DCFID, RSUOIDM, and ITMS because of the better values for precision and recall. Due to the fluctuations in the precision for RSUOIDM, the F1 score also shows a fluctuation. This again indicates that in the highway scenario as well, FIM-PAD effectively identifies the malicious nodes without erroneously classifying the honest nodes.
FPR: As observed from Figure 4f, the FPR of FIM-PAD remains lower compared to DCFID, RSUOIDM, and ITMS when the percentage of malicious nodes grows. Compared to the urban scenario, the FPR of FIM-PAD is higher in the highway scenario. This is because of the higher variations in vehicle speeds in the highway setting, which causes the speed values of some honest nodes to deviate slightly from the range for the usual pattern, and they get classified as malicious. Nonetheless, the FPR of FIM-PAD is 32% lower than DCFID, RSUOIDM, and ITMS, even in the worst-case scenario.

5. Conclusions

In this study, we examined the challenges associated with enhancing the security of vehicular networks, focusing on the detection of false information transmitted by the malicious nodes within these networks. These challenges include dependence on roadside infrastructures, past information about vehicles, or historical traffic data to train machine learning models. We presented FIM-PAD (False Information Mitigation using Pattern-based Anomaly Detection), a technique for detecting false information, leveraging an unsupervised pattern-based anomaly detection approach. The novelty of FIM-PAD comes from the use of an unsupervised learning approach to discover common patterns between the direction and speed of vehicles to detect the malicious vehicles that do not agree with the common patterns identified. FIM-PAD considers the speed variations of vehicles traveling in different directions by analyzing vehicles based on their directions separately. Using FIM-PAD, a vehicle can individually detect false information transmitted in its region using only real-time network data without depending on past data about vehicles, traffic data in a region, or other network entities. Adopting an unsupervised anomaly detection method allows FIM-PAD to discover false information without relying on past traffic data or historical information about vehicles. Simulation studies with up to 35% of malicious vehicles in the scenarios demonstrate that FIM-PAD, on average, offers a 38% reduced data processing delay and at least 19% less FPR in comparison to three prevailing techniques, RSUOIDM [8], DCFID [9], and ITMS [10].
Future extension of this work is envisioned as enhancing this unsupervised anomaly detection approach to secure vehicular networks from other security attacks. In particular, we intend to focus on security attacks, the solutions for which in the current literature rely on supervised machine learning methods or encounter increased data processing delays in detecting malicious nodes.

Author Contributions

Conceptualization, A.B.; methodology, A.B.; validation, A.B. and A.P.; formal analysis, A.B. and A.P.; investigation, A.P.; resources, A.P.; data curation, A.B.; writing—original draft preparation, A.B.; writing—review and editing, A.P.; supervision, A.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data supporting the results reported in this article are openly available on our Kaggle repository at https://www.kaggle.com/datasets/abinashborah/vanet-false-information-simulation-data/data (accessed on 25 April 2025).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Moni, S.S.; Manivannan, D.A. Scalable and Distributed Architecture for Secure and Privacy-Preserving Authentication and Message Dissemination in VANETs. Internet Things 2021, 13, 100350. [Google Scholar] [CrossRef]
  2. Aman, M.N.; Javaid, U.; Sikdar, B.A. Privacy-preserving and Scalable Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2021, 8, 1123–1139. [Google Scholar] [CrossRef]
  3. Bayat, M.; Pournaghi, M.; Rahimi, M.; Barmshoory, M. NERA: A New and Efficient RSU Based Authentication Scheme for VANETs. Wirel. Netw. 2020, 26, 3083–3098. [Google Scholar] [CrossRef]
  4. Ahmed, A.; Iqbal, M.M.; Jabbar, S.; Ibrar, M.; Erbad, A.; Song, H. Position-based Emergency Message Dissemination Schemes in the Internet of Vehicles: A review. IEEE Trans. Intell. Transp. Syst. 2023, 12, 13548–13572. [Google Scholar] [CrossRef]
  5. AlMarshoud, M.; Sabir Kiraz, M.; Al-Bayatti, A.H. Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions. ACM Comput. Surv. 2024, 56, 1–39. [Google Scholar] [CrossRef]
  6. Malhi, A.K.; Batra, S.; Pannu, H.S. Security of Vehicular Ad-Hoc Networks: A Comprehensive Survey. Comput. Secur. 2020, 89, 101664. [Google Scholar] [CrossRef]
  7. Yu, Y.; Zeng, X.; Xue, X.; Ma, J. LSTM-based Intrusion Detection System for VANETs: A Time Series Classification Approach to False Message Detection. IEEE Trans. Intell. Transp. Syst. 2022, 23, 23906–23918. [Google Scholar] [CrossRef]
  8. Haydari, A.; Yilmaz, Y. RSU-Based Online Intrusion Detection and Mitigation for VANET. Sensors 2022, 22, 7612. [Google Scholar] [CrossRef]
  9. Cheong, C.; Li, S.; Cao, Y.; Zhang, X.; Liu, D. False Message Detection in Internet of Vehicle through Machine Learning and Vehicle Consensus. Inf. Process. Manag. 2024, 61, 103827. [Google Scholar]
  10. Seno, M.E.; Zaidi, A.; Gupta, B.; Avacharmal, R.; Yogi, K.S.; Tiwari, M.; Reegu, F.A.; Shavkatov, N.; Soni, M. A Hybrid Trust Management Strategy for Reliable Cyber-Physical System in Intelligent Transportation. IEEE Trans. Intell. Transp. Syst. 2025. [Google Scholar] [CrossRef]
  11. Alzahrani, M.; Idris, M.Y.; Ghaleb, F.A.; Budiarto, R. An Improved Robust Misbehavior Detection Scheme for Vehicular Ad Hoc Network. IEEE Access 2022, 10, 111241–111253. [Google Scholar] [CrossRef]
  12. Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Falsification Detection System for IoV using Randomized Search Optimization Ensemble Algorithm. IEEE Trans. Intell. Transp. Syst. 2023, 24, 4158–4172. [Google Scholar] [CrossRef]
  13. Paranjothi, A.; Atiquzzaman, M. A Statistical Approach for Enhancing Security in VANETs with Efficient Rogue Node Detection Using Fog Computing. Digit. Commun. Netw. 2022, 8, 814–824. [Google Scholar] [CrossRef]
  14. Hua, J.; Zhang, B.; Wang, J.; Shao, X.; Zhu, J. Rogue Node Detection Based on a Fog Network Utilizing Parked Vehicles. Appl. Sci. 2023, 13, 695. [Google Scholar] [CrossRef]
  15. Rehman, A.; Hassan, M.F.; Hooi, Y.K.; Qureshi, M.A.; Shukla, S.; Susanto, E.; Abdel-Aty, A.H. CTMF: Context-aware Trust Management Framework for Internet of Vehicles. IEEE Access 2022, 10, 73685–73701. [Google Scholar] [CrossRef]
  16. Roy, A.; Madria, S.K. BLAME: A Blockchain-assisted Misbehavior Detection and Event Validation in VANETs. Proceedings of 22nd IEEE International Conference on Mobile Data Management, Toronto, ON, Canada, 15–18 June 2021; pp. 69–78. [Google Scholar]
  17. Ahmed, W.; Di, W.; Mukathe, D. A Blockchain-enabled Incentive Trust Management with Threshold Ring Signature Scheme for Traffic Event Validation in VANETs. Sensors 2022, 22, 6715. [Google Scholar] [CrossRef]
  18. Ahmed, W.; Di, W.; Mukathe, D. Privacy-preserving Blockchain-based Authentication and Trust Management in VANETs. IET Networks 2022, 11, 89–111. [Google Scholar] [CrossRef]
  19. Fernandes, C.P.; Montez, C.; Adriano, D.D.; Boukerche, A.; Wangham, M.S. A Blockchain-based Reputation System for Trusted VANET Nodes. Ad Hoc Netw. 2023, 140, 103071. [Google Scholar] [CrossRef]
  20. Hou, B.; Xin, Y.; Zhu, H.; Yang, Y.; Yang, J. VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain. Appl. Sci. 2023, 13, 5733. [Google Scholar] [CrossRef]
  21. Masood, S.; Saeed, Y.; Ali, A.; Jamil, H.; Samee, N.A.; Alamro, H.; Muthanna, M.S.A.; Khakimov, A. Detecting and Preventing False Nodes and Messages in Vehicular Ad-hoc Networking (VANET). IEEE Access 2023, 11, 93920–93934. [Google Scholar] [CrossRef]
  22. Feremans, L.; Vercruyssen, V.; Cule, B.; Meert, W.; Goethals, B. Pattern-based Anomaly Detection in Mixed-type Time Series. In Machine Learning and Knowledge Discovery in Databases: European Conference; Springer: Cham, Switzerland, 2020; pp. 240–256. [Google Scholar]
  23. Guo, H.; Yuan, S.; Wu, X. Logbert: In Log Anomaly Detection via BERT. In International Joint Conference on Neural Networks; IEEE: New York, NY, USA, 2021; pp. 1–8. [Google Scholar]
  24. He, Z.; Xu, X.; Huang, Z.J.; Deng, S. FP-outlier: Frequent Pattern based Outlier Detection. Comput. Sci. Inf. Syst. 2005, 2, 103–118. [Google Scholar] [CrossRef]
  25. Schmidl, S.; Wenig, P.; Papenbrock, T. Anomaly Detection in Time Series: A Comprehensive Evaluation. Proc. VLDB Endow. 2022, 15, 1779–1797. [Google Scholar] [CrossRef]
  26. Sommer, C.; German, R.; Dressler, F. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis. IEEE Trans. Mob. Comput. 2011, 10, 3–15. [Google Scholar] [CrossRef]
  27. Veins. Available online: https://veins.car2x.org (accessed on 25 April 2025).
  28. OpenStreetMap. Available online: https://www.openstreetmap.org (accessed on 25 April 2025).
Figure 1. Overall approach of FIM-PAD.
Figure 1. Overall approach of FIM-PAD.
Electronics 14 01848 g001
Figure 2. Finding frequent bins with rolling maximum cumulative node count.
Figure 2. Finding frequent bins with rolling maximum cumulative node count.
Electronics 14 01848 g002
Figure 3. Performance comparison results of FIM-PAD with three existing approaches in urban scenario: (a) Data processing time vs. Percentage of malicious nodes; (b) Accuracy vs. Percentage of malicious nodes; (c) Precision vs. Percentage of malicious nodes; (d) Recall vs. Percentage of malicious nodes; (e) F1 score vs. Percentage of malicious nodes; (f) FPR vs. Percentage of malicious nodes.
Figure 3. Performance comparison results of FIM-PAD with three existing approaches in urban scenario: (a) Data processing time vs. Percentage of malicious nodes; (b) Accuracy vs. Percentage of malicious nodes; (c) Precision vs. Percentage of malicious nodes; (d) Recall vs. Percentage of malicious nodes; (e) F1 score vs. Percentage of malicious nodes; (f) FPR vs. Percentage of malicious nodes.
Electronics 14 01848 g003aElectronics 14 01848 g003b
Figure 4. Performance comparison results of FIM-PAD with three existing approaches in highway scenario: (a) Data processing time vs. Percentage of malicious nodes; (b) Accuracy vs. Percentage of malicious nodes; (c) Precision vs. Percentage of malicious nodes; (d) Recall vs. Percentage of malicious nodes; (e) F1 score vs. Percentage of malicious nodes; (f) FPR vs. Percentage of malicious nodes.
Figure 4. Performance comparison results of FIM-PAD with three existing approaches in highway scenario: (a) Data processing time vs. Percentage of malicious nodes; (b) Accuracy vs. Percentage of malicious nodes; (c) Precision vs. Percentage of malicious nodes; (d) Recall vs. Percentage of malicious nodes; (e) F1 score vs. Percentage of malicious nodes; (f) FPR vs. Percentage of malicious nodes.
Electronics 14 01848 g004
Table 1. Parameter values used in simulation.
Table 1. Parameter values used in simulation.
Sl. No.ParameterValues
1Length of road8 km
2Number of vehicles500
3Percentage of malicious nodes10–35%
4Vehicle speed40–120 kph
5 Range   parameter   ( R )20 kph
6 Number   of   bins   ( n u m b i n s )5
7Transmission range500 m
8Communication ProtocolIEEE 802.11p
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Borah, A.; Paranjothi, A. False Information Mitigation Using Pattern-Based Anomaly Detection for Secure Vehicular Networks. Electronics 2025, 14, 1848. https://doi.org/10.3390/electronics14091848

AMA Style

Borah A, Paranjothi A. False Information Mitigation Using Pattern-Based Anomaly Detection for Secure Vehicular Networks. Electronics. 2025; 14(9):1848. https://doi.org/10.3390/electronics14091848

Chicago/Turabian Style

Borah, Abinash, and Anirudh Paranjothi. 2025. "False Information Mitigation Using Pattern-Based Anomaly Detection for Secure Vehicular Networks" Electronics 14, no. 9: 1848. https://doi.org/10.3390/electronics14091848

APA Style

Borah, A., & Paranjothi, A. (2025). False Information Mitigation Using Pattern-Based Anomaly Detection for Secure Vehicular Networks. Electronics, 14(9), 1848. https://doi.org/10.3390/electronics14091848

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop