information
Article
An Intelligent Hierachical Security Framework for VANETs
Fábio Gonçalves *
,†
, Joaquim Macedo
†
and Alexandre Santos
†
Citation: Gonçalves, F.; Macedo, J.;
Santos, A. An Intelligent Hierachical
Security Framework for VANETs.
Information 2021, 12, 455. https://
doi.org/10.3390/info12110455
Academic Editor: Sherali Zeadally
Received: 15 September 2021
Accepted: 27 October 2021
Published: 2 November 2021
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2021 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
Algoritmi Center, University of Minho, 4710-057 Braga, Portugal; macedo@di.uminho.pt (J.M.);
alex@di.uminho.pt (A.S.)
* Correspondence: b7207@algoritmi.uminho.pt
† These authors contributed equally to this work.
Abstract: Vehicular Ad hoc Networks (VANETs) are an emerging type of network that increasingly
encompass a larger number of vehicles. They are the basic support for Intelligent Transportation
Systems (ITS) and for establishing frameworks which enable communication among road entities
and foster the development of new applications and services aimed at enhancing driving experi-
ence and increasing road safety. However, VANETs’ demanding characteristics make it difficult to
implement security mechanisms, creating vulnerabilities easily explored by attackers. The main
goal of this work is to propose an Intelligent Hierarchical Security Framework for VANET making
use of Machine Learning (ML) algorithms to enhance attack detection, and to define methods for
secure communications among entities, assuring strong authentication, privacy, and anonymity. The
ML algorithms used in this framework have been trained and tested using vehicle communications
datasets, which have been made publicly available, thus providing easily reproducible and verifiable
results. The obtained results show that the proposed Intrusion Detection System (IDS) framework is
able to detect attacks accurately, with a low False Positive Rate (FPR). Furthermore, results show that
the framework can benefit from using different types of algorithms at different hierarchical levels,
selecting light and fast processing algorithms in the lower levels, at the cost of accuracy, and using
more precise, accurate, and complex algorithms in nodes higher in the hierarchy.
Keywords: VANETs; security; intrusion detection systems; machine learning
1. Introduction
The advancements in vehicular communication allow vehicle makers to implement
new functionalities and services, providing enhancements in the driving experience, road
traffic, and, more importantly, road safety. The networks that support this type of communi-
cation are called VANETs. These are, however, networks with characteristics different from
other networks, where the nodes move very quickly, creating constant topology changes.
VANET communications are wireless, using the air as the medium to communicate. Cur-
rently, the main industry standards are Dedicated Short Range Communications (DSRC)[1]
and Institute of Electrical and Electronics Engineers (IEEE) 802.11p [2]. Still, these are het-
erogeneous networks that may take advantage of other technologies [3]. There are two
types of nodes: On-Board Units (OBUs) and Road Side Units (RSUs) [4]. The first is
installed in mobile nodes, such as vehicles. The latter are located alongside the road
and constitute the network infrastructure. So, VANET demanding characteristics create
vulnerabilities, providing an attractive environment for attackers.
Additionally to the normal security measures that try to prevent attacks, usually
through cryptography, IDSs can provide an extra layer of security by detecting unpre-
ventable attacks. These can detect attacks and trigger responses to minimize their effects.
Depending on the detection technique used, IDSs can be classified into [5] signature-based,
anomaly detection, specification-based and reputation-based. Anomaly detection works
from collected data history (unlabeled) or a set of training data (labeled) to detect anomalies
or deviations from patterns [5]. This work focuses on anomaly detection from labeled data.
Information 2021, 12, 455. https://doi.org/10.3390/info12110455 https://www.mdpi.com/journal/information