{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:35:44Z","timestamp":1773315344002,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100012997","name":"Arab Academy for Science, Technology & Maritime Transport","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100012997","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The vehicular ad-hoc network is a technology that enables vehicles to interact with each other and the surrounding infrastructure, aiming to enhance road safety and driver comfort. However, it is susceptible to various security attacks. Among these attacks, the position falsification attack is regarded as one of the most serious, in which the malicious nodes tamper with their transmitted location. Thus, developing effective misbehavior detection schemes capable of detecting such attacks is crucial. Many of these schemes employ machine learning techniques to detect misbehavior based on the features of the exchanged messages. However, the studies that identify the impact of feature engineering on schemes\u2019 performance and highlight the most efficient features and algorithms are limited. This paper conducts a comprehensive literature survey to identify the key features and algorithms used in the literature that lead to the best-performing models. Then, a comparative study using the VeReMi dataset, which is publicly available, is performed to assess six models implemented using three different machine learning algorithms and two feature sets: one comprising selected and derived features and the other including all message features. The findings show that two of the suggested models that employ feature engineering perform almost equally to existing studies in identifying two types of position falsification attacks while exhibiting performance improvements in detecting other types. Furthermore, the results of evaluating the proposed models using another simulation exhibit a substantial improvement achieved by employing feature engineering techniques, where the average accuracy of the models is increased by 6.31\u201347%, depending on the algorithm used.<\/jats:p>","DOI":"10.1007\/s10207-024-00830-2","type":"journal-article","created":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T12:48:45Z","timestamp":1709815725000},"page":"1939-1961","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network"],"prefix":"10.1007","volume":"23","author":[{"given":"Eslam","family":"Abdelkreem","sequence":"first","affiliation":[]},{"given":"Sherif","family":"Hussein","sequence":"additional","affiliation":[]},{"given":"Ashraf","family":"Tammam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,7]]},"reference":[{"issue":"2","key":"830_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.48550\/arXiv.2101.04539","volume":"20","author":"T Yeferny","year":"2020","unstructured":"Yeferny, T., Hamad, S.: Vehicular ad-hoc networks: architecture, applications and challenges. Int. J. Comput. Sci. Netw. Secur. 20(2), 1\u20137 (2020). https:\/\/doi.org\/10.48550\/arXiv.2101.04539","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"830_CR2","doi-asserted-by":"publisher","first-page":"91028","DOI":"10.1109\/ACCESS.2020.2992580","volume":"8","author":"OS Al-Heety","year":"2020","unstructured":"Al-Heety, O.S., Zakaria, Z., Ismail, M., Shakir, M.M., Alani, S., Alsariera, H.: A comprehensive survey: benefits, services, recent works, challenges, security, and use cases for SDN-vanet. IEEE Access 8, 91028\u201391047 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2992580","journal-title":"IEEE Access"},{"key":"830_CR3","doi-asserted-by":"publisher","unstructured":"Ftaimi, S., Mazri, T.: A comparative study of Machine learning algorithms for VANET networks. In: Proceedings of the 3rd International Conference on Networking, Information Systems & Security, pp. 1\u20138. ACM, Marrakech Morocco (2020). https:\/\/doi.org\/10.1145\/3386723.3387829","DOI":"10.1145\/3386723.3387829"},{"key":"830_CR4","doi-asserted-by":"publisher","unstructured":"J2735_202309: V2X Communications Message Set Dictionary\u2014SAE International (2023). https:\/\/doi.org\/10.4271\/J2735_202309","DOI":"10.4271\/J2735_202309"},{"key":"830_CR5","doi-asserted-by":"publisher","unstructured":"So, S., Sharma, P., Petit, J.: Integrating plausibility checks and machine learning for misbehavior detection in vanet. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 564\u2013571 (2018). https:\/\/doi.org\/10.1109\/ICMLA.2018.00091","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"830_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6503299","volume":"2022","author":"N Ahmed","year":"2022","unstructured":"Ahmed, N., Deng, Z., Memon, I., Hassan, F., Mohammadani, K.H., Iqbal, R.: A survey on location privacy attacks and prevention deployed with IoT in vehicular networks. Wirel. Commun. Mob. Comput. 2022, 1\u201315 (2022). https:\/\/doi.org\/10.1155\/2022\/6503299","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"830_CR7","doi-asserted-by":"publisher","unstructured":"Ibrahim, B.F., Toycan, M., Mawlood, H.A.: A comprehensive survey on vanet broadcast protocols. In: 2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM), pp. 298\u2013302 (2020). https:\/\/doi.org\/10.1109\/ICCAKM46823.2020.9051462","DOI":"10.1109\/ICCAKM46823.2020.9051462"},{"key":"830_CR8","doi-asserted-by":"publisher","unstructured":"Shetty, S.R., Manjaiah, D.H.: A comprehensive study of security attack on vanet. In: N.\u00a0Sharma, A.\u00a0Chakrabarti, V.E. Balas, A.M. Bruckstein (eds.) Data Management, Analytics and Innovation, pp. 407\u2013428. Springer Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-2937-2_25","DOI":"10.1007\/978-981-16-2937-2_25"},{"key":"830_CR9","doi-asserted-by":"publisher","unstructured":"Fotros, M., Rezazadeh, J., Ameri\u00a0Sianaki, O.: A survey on vanets routing protocols for IoT intelligent transportation systems. In: L.\u00a0Barolli, F.\u00a0Amato, F.\u00a0Moscato, T.\u00a0Enokido, M.\u00a0Takizawa (eds.) Web, Artificial Intelligence and Network Applications, pp. 1097\u20131115. Springer International Publishing (2020). https:\/\/doi.org\/10.1007\/978-3-030-44038-1_102","DOI":"10.1007\/978-3-030-44038-1_102"},{"key":"830_CR10","doi-asserted-by":"publisher","first-page":"9180","DOI":"10.1109\/ACCESS.2021.3050038","volume":"9","author":"A Lamssaggad","year":"2021","unstructured":"Lamssaggad, A., Benamar, N., Hafid, A.S., Msahli, M.: A survey on the current security landscape of intelligent transportation systems. IEEE Access 9, 9180\u20139208 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3050038","journal-title":"IEEE Access"},{"key":"830_CR11","doi-asserted-by":"publisher","unstructured":"Bassiony, I., Hussein, S., Salama, G.: Detection approaches for position falsification attack in vanet. In: 2022 13th International Conference on Electrical Engineering (ICEENG), pp. 86\u201390 (2022). https:\/\/doi.org\/10.1109\/ICEENG49683.2022.9781915","DOI":"10.1109\/ICEENG49683.2022.9781915"},{"key":"830_CR12","doi-asserted-by":"publisher","unstructured":"Kaushal, P., Khurana, M., Ramkumar, K.R.: A research perspective of vanet applications: a review. In: P.\u00a0Dutta, S.\u00a0Chakrabarti, A.\u00a0Bhattacharya, S.\u00a0Dutta, V.\u00a0Piuri (eds.) Emerging Technologies in Data Mining and Information Security, pp. 627\u2013636. Springer Nature Singapore, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-4193-1_61","DOI":"10.1007\/978-981-19-4193-1_61"},{"key":"830_CR13","unstructured":"Global plan for the decade of action for road safety 2021-2030. https:\/\/cdn.who.int\/media\/docs\/default-source\/documents\/health-topics\/road-traffic-injuries\/global-plan-for-road-safety.pdf?sfvrsn=65cf34c8_35 &download=true"},{"key":"830_CR14","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.vehcom.2020.100310","volume":"28","author":"M Lee","year":"2021","unstructured":"Lee, M., Atkison, T.: Vanet applications: past, present, and future. Veh. Commun. 28, 100\u2013310 (2021). https:\/\/doi.org\/10.1016\/j.vehcom.2020.100310","journal-title":"Veh. Commun."},{"key":"830_CR15","doi-asserted-by":"publisher","unstructured":"Ganeshkumar, N., Kumar, S.: Obu (on-board unit) wireless devices in vanet(s) for effective communication\u2014a review. In: V.\u00a0Singh, V.K. Asari, S.\u00a0Kumar, R.B. Patel (eds.) Computational Methods and Data Engineering, pp. 191\u2013202. Springer Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-7907-3_15","DOI":"10.1007\/978-981-15-7907-3_15"},{"key":"830_CR16","doi-asserted-by":"publisher","unstructured":"Azam, F., Kumar, S., Yadav, K., Priyadarshi, N., Padmanaban, S.: An outline of the security challenges in vanet. In: 2020 IEEE 7th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/UPCON50219.2020.9376518","DOI":"10.1109\/UPCON50219.2020.9376518"},{"key":"830_CR17","doi-asserted-by":"publisher","unstructured":"Singh, P.K., Gupta, S., Vashistha, R., Nandi, S.K., Nandi, S.: Machine learning based approach to detect position falsification attack in VANETs. In: Security and Privacy, pp. 166\u2013178. Springer (2019). https:\/\/doi.org\/10.1007\/978-981-13-7561-3_13","DOI":"10.1007\/978-981-13-7561-3_13"},{"key":"830_CR18","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.compeleceng.2020.106591","volume":"83","author":"JB Pinto Neto","year":"2020","unstructured":"Pinto Neto, J.B., Gomes, L.C., Ortiz, F.M., Almeida, T.T., Campista, M.E.M., Costa, L.H.M., Mitton, N.: An accurate cooperative positioning system for vehicular safety applications. Comput. Electr. Eng. 83, 106\u2013591 (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106591","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"830_CR19","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s11277-022-10098-1","volume":"129","author":"A Sangwan","year":"2023","unstructured":"Sangwan, A., Sangwan, A., Singh, R.P.: A classification of misbehavior detection schemes for VANETs: a survey. Wirel. Pers. Commun. 129(1), 285\u2013322 (2023). https:\/\/doi.org\/10.1007\/s11277-022-10098-1","journal-title":"Wirel. Pers. Commun."},{"key":"830_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5069104","author":"B Karthiga","year":"2022","unstructured":"Karthiga, B., Durairaj, D., Nawaz, N., Venkatasamy, T.K., Ramasamy, G., Hariharasudan, A.: Intelligent intrusion detection system for VANET using machine learning and deep learning approaches. Wirel. Commun. Mob. Comput. (2022). https:\/\/doi.org\/10.1155\/2022\/5069104","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"830_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.vehcom.2019.100214","volume":"23","author":"Z El-Rewini","year":"2020","unstructured":"El-Rewini, Z., Sadatsharan, K., Selvaraj, D.F., Plathottam, S.J., Ranganathan, P.: Cybersecurity challenges in vehicular communications. Veh. Commun. 23, 100\u2013214 (2020). https:\/\/doi.org\/10.1016\/j.vehcom.2019.100214","journal-title":"Veh. Commun."},{"key":"830_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-023-01508-7","volume":"16","author":"J Nagarajan","year":"2023","unstructured":"Nagarajan, J., Mansourian, P., Shahid, M.A., Arunita, J., Saini, I., Zhang, N., Kneppers, M.: Machine learning based intrusion detection systems for connected autonomous vehicles: a survey. Peer-to-Peer Netw. Appl. 16, 1\u201333 (2023). https:\/\/doi.org\/10.1007\/s12083-023-01508-7","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"11","key":"830_CR23","doi-asserted-by":"publisher","first-page":"12013","DOI":"10.1109\/TVT.2021.3113807","volume":"70","author":"T Alladi","year":"2021","unstructured":"Alladi, T., Gera, B., Agrawal, A., Chamola, V., Yu, F.R.: DeepADV: a deep neural network framework for anomaly detection in VANETs. IEEE Transact. Veh. Technol. 70(11), 12013\u201312023 (2021). https:\/\/doi.org\/10.1109\/TVT.2021.3113807","journal-title":"IEEE Transact. Veh. Technol."},{"issue":"11","key":"830_CR24","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1080\/1206212X.2022.2099122","volume":"44","author":"R Sultana","year":"2022","unstructured":"Sultana, R., Grover, J., Meghwal, J., Tripathi, M.: Exploiting machine learning and deep learning models for misbehavior detection in VANET. Int. J. Comput. Appl. 44(11), 1024\u20131038 (2022). https:\/\/doi.org\/10.1080\/1206212X.2022.2099122","journal-title":"Int. J. Comput. Appl."},{"key":"830_CR25","doi-asserted-by":"publisher","unstructured":"Obaidat, M., Khodjaeva, M., Holst, J., Ben\u00a0Zid, M.: Security and Privacy Challenges in Vehicular Ad Hoc Networks, pp. 223\u2013251. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-36167-9_9","DOI":"10.1007\/978-3-030-36167-9_9"},{"key":"830_CR26","doi-asserted-by":"publisher","unstructured":"So, S., Petit, J., Starobinski, D.: Physical layer plausibility checks for misbehavior detection in V2X networks. In: The proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp. 84\u201393 (2019). https:\/\/doi.org\/10.1145\/3317549.3323406","DOI":"10.1145\/3317549.3323406"},{"issue":"3","key":"830_CR27","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s00607-021-01001-0","volume":"104","author":"H Bangui","year":"2022","unstructured":"Bangui, H., Ge, M., Buhnova, B.: A hybrid machine learning model for intrusion detection in VANET. Computing 104(3), 503\u2013531 (2022). https:\/\/doi.org\/10.1007\/s00607-021-01001-0","journal-title":"Computing"},{"key":"830_CR28","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.vehcom.2020.100247","volume":"25","author":"D Manivannan","year":"2020","unstructured":"Manivannan, D., Moni, S.S., Zeadally, S.: Secure authentication and privacy-preserving techniques in vehicular Ad-hoc NETworks (VANETs). Veh. Commun. 25, 100\u2013247 (2020). https:\/\/doi.org\/10.1016\/j.vehcom.2020.100247","journal-title":"Veh. Commun."},{"key":"830_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11591\/eei.v9i3.xxxx","volume":"9","author":"M Hamdi","year":"2020","unstructured":"Hamdi, M., Audah, L., Abood, M., Rashid, S., Mahdi, H., Mustafa, A.S., Al-Hiti, A.: A review on various security attacks in vehicular ad hoc networks (vanets). Bull. Electr. Eng. Inf. 9, 1\u20139 (2020). https:\/\/doi.org\/10.11591\/eei.v9i3.xxxx","journal-title":"Bull. Electr. Eng. Inf."},{"key":"830_CR30","doi-asserted-by":"publisher","unstructured":"Anyanwu, G.O., Nwakanma, C.I., Lee, J.M., Kim, D.S.: Real-time position falsification attack detection system for internet of vehicles. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ), pp. 1\u20134 (2021). https:\/\/doi.org\/10.1109\/ETFA45728.2021.9613271","DOI":"10.1109\/ETFA45728.2021.9613271"},{"key":"830_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/OJVT.2021.3138354","volume":"3","author":"A Sharma","year":"2022","unstructured":"Sharma, A., Jaekel, A.: Machine learning based misbehaviour detection in VANET using consecutive BSM approach. IEEE Open J. Veh. Technol. 3, 1\u201314 (2022). https:\/\/doi.org\/10.1109\/OJVT.2021.3138354","journal-title":"IEEE Open J. Veh. Technol."},{"key":"830_CR32","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.compeleceng.2022.108542","volume":"105","author":"Y Wu","year":"2023","unstructured":"Wu, Y., Wu, L., Cai, H.: A deep learning approach to secure vehicle to road side unit communications in intelligent transportation system. Comput. Electr. Eng. 105, 108\u2013542 (2023). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108542","journal-title":"Comput. Electr. Eng."},{"issue":"12","key":"830_CR33","doi-asserted-by":"publisher","first-page":"14037","DOI":"10.1109\/TITS.2023.3305342","volume":"24","author":"MM Hasan","year":"2023","unstructured":"Hasan, M.M., Jahan, M., Kabir, S.: A trust model for edge-driven vehicular ad hoc networks using fuzzy logic. IEEE Transact. Intell. Transport. Syst. 24(12), 14037\u201314050 (2023). https:\/\/doi.org\/10.1109\/TITS.2023.3305342","journal-title":"IEEE Transact. Intell. Transport. Syst."},{"issue":"6","key":"830_CR34","doi-asserted-by":"publisher","first-page":"4991","DOI":"10.1109\/JIOT.2020.3035035","volume":"8","author":"P Sharma","year":"2021","unstructured":"Sharma, P., Liu, H.: A machine-learning-based data-centric misbehavior detection model for internet of vehicles. IEEE Internet Things J. 8(6), 4991\u20134999 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3035035","journal-title":"IEEE Internet Things J."},{"key":"830_CR35","doi-asserted-by":"publisher","unstructured":"Kamel, J., Kaiser, A., ben Jemaa, I., Cincilla, P., Urien, P.: CaTch: A confidence range tolerant misbehavior detection approach. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20138 (2019). https:\/\/doi.org\/10.1109\/WCNC.2019.8885740","DOI":"10.1109\/WCNC.2019.8885740"},{"issue":"10","key":"830_CR36","doi-asserted-by":"publisher","first-page":"2290","DOI":"10.3390\/electronics12102290","volume":"12","author":"A Kumar","year":"2023","unstructured":"Kumar, A., Kaur, A., Singh, P., Driss, M., Boulila, W.: Efficient multiclass classification using feature selection in high-dimensional datasets. Electronics 12(10), 2290 (2023). https:\/\/doi.org\/10.3390\/electronics12102290","journal-title":"Electronics"},{"key":"830_CR37","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/ACCESS.2021.3136706","volume":"10","author":"S Ercan","year":"2022","unstructured":"Ercan, S., Ayaida, M., Messai, N.: Misbehavior detection for position falsification attacks in VANETs using machine learning. IEEE Access 10, 1893\u20131904 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2021.3136706","journal-title":"IEEE Access"},{"key":"830_CR38","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.compeleceng.2022.108460","volume":"104","author":"A Haddaji","year":"2022","unstructured":"Haddaji, A., Ayed, S., Fourati, L.C.: Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: survey. Comput. Electr. Eng. 104, 108\u2013460 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108460","journal-title":"Comput. Electr. Eng."},{"issue":"8","key":"830_CR39","doi-asserted-by":"publisher","first-page":"8871","DOI":"10.1109\/TVT.2020.2996620","volume":"69","author":"S Gyawali","year":"2020","unstructured":"Gyawali, S., Qian, Y., Hu, R.Q.: Machine learning and reputation based misbehavior detection in vehicular communication networks. IEEE Transact. Veh. Technol. 69(8), 8871\u20138885 (2020). https:\/\/doi.org\/10.1109\/TVT.2020.2996620","journal-title":"IEEE Transact. Veh. Technol."},{"key":"830_CR40","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.ins.2019.11.004","volume":"513","author":"F Thabtah","year":"2020","unstructured":"Thabtah, F., Hammoud, S., Kamalov, F., Gonsalves, A.: Data imbalance in classification: experimental evaluation. Inf. Sci. 513, 429\u2013441 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.11.004","journal-title":"Inf. Sci."},{"key":"830_CR41","doi-asserted-by":"publisher","unstructured":"Gyawali, S., Qian, Y.: Misbehavior detection using machine learning in vehicular communication networks. In: ICC 2019\u20142019 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/ICC.2019.8761300","DOI":"10.1109\/ICC.2019.8761300"},{"key":"830_CR42","doi-asserted-by":"publisher","first-page":"78054","DOI":"10.1109\/ACCESS.2020.2989870","volume":"8","author":"MA Hossain","year":"2020","unstructured":"Hossain, M.A., Noor, R.M., Yau, K.L.A., Azzuhri, S.R., Z\u2019aba, M.R., Ahmedy, I.: Comprehensive survey of machine learning approaches in cognitive radio-based vehicular ad hoc networks. IEEE Access 8, 78054\u201378108 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2989870","journal-title":"IEEE Access"},{"key":"830_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/9997771","volume":"2021","author":"J Mahmood","year":"2021","unstructured":"Mahmood, J., Duan, Z., Yang, Y., Wang, Q., Nebhen, J., Bhutta, M.N.M.: Security in vehicular ad hoc networks: challenges and countermeasures. Secur. Commun. Netw. 2021, 1\u201320 (2021). https:\/\/doi.org\/10.1155\/2021\/9997771","journal-title":"Secur. Commun. Netw."},{"key":"830_CR44","doi-asserted-by":"publisher","unstructured":"van\u00a0der Heijden, R.W., Lukaseder, T., Kargl, F.: VeReMi: a dataset for comparable evaluation of misbehavior detection in VANETs (2018). https:\/\/doi.org\/10.48550\/arXiv.1804.06701","DOI":"10.48550\/arXiv.1804.06701"},{"issue":"6","key":"830_CR45","doi-asserted-by":"publisher","first-page":"6631","DOI":"10.1109\/TVT.2020.2984878","volume":"69","author":"J Kamel","year":"2020","unstructured":"Kamel, J., Ansari, M., Petit, J., Kaiser, A., Ben Jemaa, I., Urien, P.: Simulation framework for misbehavior detection in vehicular networks. IEEE Transact. Veh. Technol. 69(6), 6631\u20136643 (2020). https:\/\/doi.org\/10.1109\/TVT.2020.2984878","journal-title":"IEEE Transact. Veh. Technol."},{"issue":"1","key":"830_CR46","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s13173-021-00113-x","volume":"27","author":"JS Weber","year":"2021","unstructured":"Weber, J.S., Neves, M., Ferreto, T.: VANET simulators: an updated review. J. Braz. Comput. Soc. 27(1), 8 (2021). https:\/\/doi.org\/10.1186\/s13173-021-00113-x","journal-title":"J. Braz. Comput. Soc."},{"key":"830_CR47","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.procs.2019.04.012","volume":"151","author":"M Amoozadeh","year":"2019","unstructured":"Amoozadeh, M., Ching, B., Chuah, C.N., Ghosal, D., Zhang, H.M.: Ventos: vehicular network open simulator with hardware-in-the-loop support. Procedia Comput. Sci. 151, 61\u201368 (2019). https:\/\/doi.org\/10.1016\/j.procs.2019.04.012","journal-title":"Procedia Comput. Sci."},{"key":"830_CR48","unstructured":"OMNeT++ - Simulation Manual (2022). https:\/\/doc.omnetpp.org\/omnetpp\/manual\/#sec:config-options:config-options"},{"key":"830_CR49","doi-asserted-by":"crossref","unstructured":"Kamel, J., Wolf, M., Van Der\u00a0Hei, R.W., Kaiser, A., Urien, P., Kargl, F.: Veremi extension: a dataset for comparable evaluation of misbehavior detection in vanets. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"830_CR50","doi-asserted-by":"publisher","unstructured":"Amanullah, M.A., Baruwal\u00a0Chhetri, M., Loke, S.W., Doss, R.: BurST-ADMA: towards an australian dataset for misbehaviour detection in the internet of vehicles. In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 624\u2013629 (2022). https:\/\/doi.org\/10.1109\/PerComWorkshops53856.2022.9767505","DOI":"10.1109\/PerComWorkshops53856.2022.9767505"},{"issue":"4","key":"830_CR51","doi-asserted-by":"publisher","first-page":"4543","DOI":"10.1007\/s10489-021-02550-9","volume":"52","author":"P Dhal","year":"2022","unstructured":"Dhal, P., Azad, C.: A comprehensive survey on feature selection in the various fields of machine learning. Appl. Intell. 52(4), 4543\u20134581 (2022). https:\/\/doi.org\/10.1007\/s10489-021-02550-9","journal-title":"Appl. Intell."},{"key":"830_CR52","doi-asserted-by":"publisher","unstructured":"Duboue, P.: The Art of Feature Engineering: Essentials for Machine Learning, (1 edn.) TJ International, Padstow Cornwall (2020). https:\/\/doi.org\/10.1017\/9781108671682","DOI":"10.1017\/9781108671682"},{"issue":"1","key":"830_CR53","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s40854-022-00441-7","volume":"9","author":"HH Htun","year":"2023","unstructured":"Htun, H.H., Biehl, M., Petkov, N.: Survey of feature selection and extraction techniques for stock market prediction. Financ. Innov. 9(1), 26 (2023). https:\/\/doi.org\/10.1186\/s40854-022-00441-7","journal-title":"Financ. Innov."},{"key":"830_CR54","doi-asserted-by":"publisher","unstructured":"Ghosh, A., Ibrahim, H.M., Mohammad, W., Nova, F.C., Hasan, A., Rab, R.: CoWrap: An Approach of Feature Selection for Network Anomaly Detection. In: L.\u00a0Barolli, F.\u00a0Hussain, T.\u00a0Enokido (eds.) Advanced Information Networking and Applications, Lecture Notes in Networks and Systems, vol.\u00a02, pp. 547\u2013559. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99587-4_47","DOI":"10.1007\/978-3-030-99587-4_47"},{"key":"830_CR55","doi-asserted-by":"publisher","unstructured":"Raju, V.N.G., Lakshmi, K.P., Jain, V.M., Kalidindi, A., Padma, V.: Study the influence of normalization\/transformation process on the accuracy of supervised classification. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 729\u2013735 (2020). https:\/\/doi.org\/10.1109\/ICSSIT48917.2020.9214160","DOI":"10.1109\/ICSSIT48917.2020.9214160"},{"issue":"2","key":"830_CR56","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1016\/j.jksuci.2023.01.014","volume":"35","author":"A Mohammed","year":"2023","unstructured":"Mohammed, A., Kora, R.: A comprehensive review on ensemble deep learning: opportunities and challenges. J. King Saud Univ. Comput. Inf. Sci. 35(2), 757\u2013774 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.01.014","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"10","key":"830_CR57","doi-asserted-by":"publisher","first-page":"94","DOI":"10.22937\/IJCSNS.2020.20.10.13","volume":"20","author":"A Sonker","year":"2020","unstructured":"Sonker, A., Gupta, R.K.: A new combination of machine learning algorithms using stacking approach for misbehavior detection in VANETs. Int. J. Comput. Sci. Netw. Secur. 20(10), 94\u2013100 (2020). https:\/\/doi.org\/10.22937\/IJCSNS.2020.20.10.13","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"830_CR58","doi-asserted-by":"publisher","unstructured":"Ercan, S., Ayaida, M., Messai, N.: New features for position falsification detection in VANETs using machine learning. In: ICC 2021 - IEEE International Conference on Communications, pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ICC42927.2021.9500411","DOI":"10.1109\/ICC42927.2021.9500411"},{"issue":"3","key":"830_CR59","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.11591\/ijece.v11i3.pp2535-2547","volume":"11","author":"A Sonker","year":"2021","unstructured":"Sonker, A., Gupta, R.K.: A new procedure for misbehavior detection in vehicular ad-hoc networks using machine learning. Int. J. Electr. Comput. Eng. (IJECE) 11(3), 2535\u20132547 (2021). https:\/\/doi.org\/10.11591\/ijece.v11i3.pp2535-2547","journal-title":"Int. J. Electr. Comput. Eng. (IJECE)"},{"key":"830_CR60","doi-asserted-by":"publisher","unstructured":"Uprety, A., Rawat, D.B., Li, J.: Privacy preserving misbehavior detection in IoV using federated machine learning. In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369513","DOI":"10.1109\/CCNC49032.2021.9369513"},{"key":"830_CR61","doi-asserted-by":"publisher","unstructured":"Sharma, A., Jaekel, A.: Machine learning approach for detecting location spoofing in VANET. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ICCCN52240.2021.9522170","DOI":"10.1109\/ICCCN52240.2021.9522170"},{"key":"830_CR62","doi-asserted-by":"publisher","unstructured":"Cervantes, J., Garcia-Lamont, F., Rodr\u00edguez-Mazahua, L., Lopez, A.: A comprehensive survey on support vector machine classification: applications, challenges and trends. Neurocomputing 408, 189\u2013215 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2019.10.118","DOI":"10.1016\/j.neucom.2019.10.118"},{"issue":"2","key":"830_CR63","doi-asserted-by":"publisher","first-page":"141","DOI":"10.3390\/e22020141","volume":"22","author":"A Murari","year":"2020","unstructured":"Murari, A., Rossi, R., Lungaroni, M., Gaudio, P., Gelfusa, M.: Quantifying total influence between variables with information theoretic and machine learning techniques. Entropy 22(2), 141 (2020). https:\/\/doi.org\/10.3390\/e22020141","journal-title":"Entropy"},{"issue":"3","key":"830_CR64","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TCSS.2020.2966910","volume":"7","author":"AA Marouf","year":"2020","unstructured":"Marouf, A.A., Hasan, M.K., Mahmud, H.: Comparative analysis of feature selection algorithms for computational personality prediction from social media. IEEE Transact. Comput. Soc. Syst. 7(3), 587\u2013599 (2020). https:\/\/doi.org\/10.1109\/TCSS.2020.2966910","journal-title":"IEEE Transact. Comput. Soc. Syst."},{"key":"830_CR65","doi-asserted-by":"publisher","unstructured":"Biswas, P., Samanta, T.: A method for fault detection in wireless sensor network based on pearson\u2019s correlation coefficient and support vector machine classification. Wirel. Personal Commun. 123(3), 2649\u20132664 (2022). https:\/\/doi.org\/10.1007\/s11277-021-09257-7","DOI":"10.1007\/s11277-021-09257-7"},{"key":"830_CR66","doi-asserted-by":"publisher","unstructured":"Montesinos\u00a0L\u2019opez, O.A., Montesinos\u00a0L\u00f3pez, A., Crossa, J.: Overfitting, model tuning, and evaluation of prediction performance, pp. 109\u2013139. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-89010-0_4","DOI":"10.1007\/978-3-030-89010-0_4"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00830-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00830-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00830-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T22:10:07Z","timestamp":1716761407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00830-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,7]]},"references-count":66,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["830"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00830-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3280061\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,7]]},"assertion":[{"value":"7 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}