Next Article in Journal
Mounting Behaviour Recognition for Pigs Based on Deep Learning
Next Article in Special Issue
Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network
Previous Article in Journal
Magnetic-based Soft Tactile Sensors with Deformable Continuous Force Transfer Medium for Resolving Contact Locations in Robotic Grasping and Manipulation
Previous Article in Special Issue
A Joint Power and Channel Scheduling Scheme for Underlay D2D Communications in the Cellular Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Anomaly Detection for Internet of Vehicles Based on Traffic Cellular Automata and Driving Style

School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China
*
Authors to whom correspondence should be addressed.
Sensors 2019, 19(22), 4926; https://doi.org/10.3390/s19224926
Submission received: 18 September 2019 / Revised: 28 October 2019 / Accepted: 29 October 2019 / Published: 12 November 2019

Abstract

:
The data validity of safe driving in the Internet of Vehicles (IoV) is the basis of improving the safety of vehicles. Different from a traditional information systems, the data anomaly analysis of vehicle safety driving faces the diversity of data anomaly and the randomness and subjectivity of the driver’s driving behavior. How to combine the characteristics of the IOV data with the driving style analysis to provide effective real-time anomaly data detection has become an important issue in the IOV applications. This paper aims at the critical safety data analysis, considering the large computing cost generated by the real-time anomaly detection of all data in the data package. We preprocess it through the traffic cellular automata model which is built to achieve the ideal abnormal detection effect with limited computing resources. On the basis of this model, the Anomaly Detection based on Driving style (ADD) algorithm is proposed to realize real-time and online detection of anomaly data related to safe driving. Firstly, this paper designs the driving coefficient and proposes a driving style quantization model to represent the driving style of the driver. Then, based on driving style quantization model and vehicle driving state information, a data anomaly detection algorithm is developed by using Gaussian mixture model (GMM). Finally, combining with the application scenarios of multi-vehicle collaboration in the Internet of Vehicles, this paper uses real data sets and simulation data sets to analyze the effectiveness of the proposed ADD algorithm.

1. Introduction

The Internet of Vehicles (IOV), a new Ad Hoc Network composed of the basic communication units of mobile vehicles and their surroundings, with the ability of perception, computing, storage and wireless communication running on the road, is an effective measure to improve safe driving. It achieves the communication between vehicle and vehicle, vehicle and road, as well as vehicle and Internet, which is a typical application of Internet of Things (IoT) technology in the field of transportation systems [1]. Multi-vehicle collaboration is a critical technology to solve the problem of unmanned driving, assisted driving and to improve the safety of driving in the IOV. It is the most widely used in IOV application. When dismounted networking is the most widely used field, the most important thing in the scene of assisted driving is to ensure the coordination between vehicles. Data for IOV applications are mainly divided into three categories: critical safety, traffic efficiency, and non-safety. The data of safety driving (e.g., vehicle distance, speed, vehicle control commands), as the basic data of critical safety applications is the foundation of IOV applications. How to guarantee the validity of data in the aspect of safety driving is one of the challenges facing the IOV applications.
Different from the traditional data security prevention methods in the Internet, the data security problems facing the IOV mainly exist in both internal and external causes. On the one hand, the internal safety prevention defects of vehicles are mainly reflected in the existing Internet communication protocols [2], that is, the vehicle lacks an effective verification mechanism for the data transmitted on the Internet, such as Controller Area Network (CAN) protocol. On the other hand, data attacks are diversified due to the open architecture and application of the IOV [3]. For example, hackers remotely controlled the BMW’s onboard system, the Connected Drive, using the security flaw in January 2015. In 2016, Toyota chairman Takeshi Uchiyamada, who has been Chairman of Toyota, claimed that two hackers had also used a computer to access the Prius’ control system before and then removed the car from the driver’s control completely. In June 2018, GCN published a report claiming that connected cars can lie [4], posing a new threat to smart cities.
The research on data anomaly detection method is the key technology for validity and authenticity of interactive data of current multi-vehicle collaboration process in combination with the characteristics of IOV data and driving style analysis. At present, there have been a number of studies on data anomaly detection, such as anomaly detection of traffic flow data based on Turkey smoothing algorithm proposed by Xu et al. [5], and the data cleaning algorithm for redundant data proposed by Wang et al. [6]. However, due to the particularity of IOV application scenario, human behavior is an important parameter that cannot be ignored in the IOV, and driving style has a great influence on the data of IOV. Klauer et al. collected the driving data of 100 incidents; after a deep analysis of the driver’s behavior, they found there was a direct relationship between driving style and vehicle data [7]. Furthermore, different driving styles reflect different characteristics in the data, which is very helpful for us to detect data anomalies. For example, conservative drivers generally have stable data, and frequent data changes are abnormal. For aggressive drivers, this frequent change is a normal behavior. Therefore, this paper combines driving style with anomaly detection. Therefore, this paper aims to propose an anomaly detection algorithm combined with driving style.
Based on the WAVE protocol standard, which defines three types of data for IOV [8]: critical safety, traffic efficiency, and non-safety, this paper aims to analyze security key data, considering that the real-time anomaly detection of all data in the data packet will cause a large computing cost. Thus, in this paper, the traffic cellular automata model is constructed to preprocess the data in order to achieve a desired anomaly detection effect with limited computing resources. On the basis of this model, the Anomaly Detection based on Driving style (ADD) algorithm is proposed based on driving style. In order to quantify driving style better, a new driving style quantization model is proposed, which can more comprehensively quantify driving style via data. The driving style parameter (e) obtained from aforementioned model, velocity (v), acceleration (a), and distance (d) are detected via the Gaussian mixture model (GMM). The experiments show that the ADD algorithm proposed in this paper have good performance in data anomaly detection (This work has been published on GitHub. The URL is https://github.com/IoTLabDLUT/Data-Anomaly-Detection-for-Vehicular-Ad Hoc-Networks).

2. Relative Works

2.1. Traffic Flow Model

According to the definition of traffic flow theory, it is recognized that the measurement scale of traffic flow is divided by two variables [9]: time and space, and the traffic flow model is divided into micro, medium, and macro models. The following model is a typical micro traffic flow model. In the 1950s, John Mitchell and Pipes studied the following theory and built the following theoretical analysis method [10]. After that, scholars did a number of systematic research studies on the following model, published numerous achievements which can be divided into the following categories [11]: the stimulus-response model, the safety distance model, and the physical-mental model. However, the micro-model of a vehicle is also an ideal model with strong assumptions, which is still far from the actual driver’s decision and vehicle behavior (simply describing the local vehicle flow state with less than 10 vehicles on the road, which is mostly used to solve the coordination problem among a small number of vehicles). After the 1990s, researchers built hybrid system models to describe complex traffic flow states based on the theory of a hybrid system and the continuous and discrete characteristics of traffic flow. Lighthill and Whitham first described the one-dimensional theoretical model of fluid dynamics applicable to highway traffic flow on Kinetic waves [12]. After that, many researchers modified the dynamics equation of the model based on traffic practice. Based on the introduction above, Li et al. proposed a new high-order continuous model and carried out a series of calculations to conduct the trend modeling for traffic time series [13].
Prigogine, a famous physicist, and Herman, a famous traffic fluid expert, believed that the influence of individual vehicle behaviors on traffic flow could not be ignored [14]. If using a particle to represent a car, the traffic flow will be considered by many interacting particles gas. Based on the description of the statistical physics in gas motion, the gas dynamic traffic flow model is built by introducing the particle distribution function and establishing a similar Boltzmann equation. Therefore, a number of scholars have proposed many improvements, including changing the relaxation effect term, introducing the correlation between continuous vehicles, investigating the multi-lane effect, and considering imperfect driving, limited space requirements, hybrid vehicles, etc. [15,16]. In addition, many researchers in physics, mathematics, and other disciplines have studied traffic flow problems for the reason of the nonlinearity, complexity, and discreteness of traffic flow. Driven by the science of nonlinearity and complexity, cellular automata model appears, which describes the characteristics of corresponding macro traffic flow by simulating the micro behavior of vehicles. Cellular automata have the characteristics of time discretization, space discretization [17], interaction localization, and dynamic evolution synchronization, which are consistent with the characteristics of traffic flow problems. It has been widely used in the research of traffic flow problems for its simple rules, flexibility, adjustability, and easy simulating [18].

2.2. Data Anomaly Detection

Traditional data validity analysis methods focus on simple vehicle data. Lin et al. [19] proposed the pure software CAN bus security mechanism (IDTB-C) to analyze the validity of CAN bus data, which used a CAN message ID table and message counter to generate a message authentication code (MAC) for authentication. Muter et al. [20] designed a method based on sensor detection: multiple sensors with different functions were placed in the corresponding subnet of the CAN bus network, and the data in the CAN bus network was effectively analyzed and detected via the sensors. Xu et al. [5] provided a new way to analyze the validity of traffic flow data by the Turkey smoothing algorithm, and provided an algorithm for recovering invalid data. Their method aimed at screening invalid data. Volkovs et al. [21] introduced a continuous data cleaning framework that can be used in a dynamic data and constraint environment, which allowed both data and their semantics to evolve and suggest repairs based on the accumulated evidence to date. Khodayari et al. [22] took the reaction time as one of the input variables of the model on the basis of the existing models, established the vehicle’s following model by using the neural network to determine whether the data were wrong, and used the traffic data to verify the validity of the model.
In recent years, research also analyzed driving style via data. Precht et al. [23], based on natural driving data from the second strategic highway research program (SHRP 2), found that anger might influence significantly on driving behavior. Klauer et al. [7] collected driving data of 100 accidents, deeply analyzed driver behavior, and then pointed out that there was a direct relationship between driving style and vehicle data. After constructing a determinate relationship between driving style and vehicle data, researchers quantified driving style via models. Qi et al. [24] proposed a new three-layer structure for driving mode by imitating the modified latent Dirichlet allocation (mLDA) model. Langari et al. [25] used the standard deviation value of acceleration to quantify the driving behavior; Murphey et al. [26] used an acceleration derivative as a parameter to analyze driver behavior; Aljaafreh et al. [27] used triaxial accelerations to extract transverse acceleration, longitudinal acceleration, and vertical acceleration as parameters, respectively, which also achieved good results. Other researchers combined multiple data for quantification. Kedar-Dongarkar et al. [28] used acceleration, brake, speed, and throttle to generate a model to analyze driving style. Fugiglando et al. [29] proposed a new method to classify driver behavior by analyzing the selected subset of CAN bus signals, which including accelerator pedal position, brake pedal pressure, steering wheel angle, steering wheel momentum, velocity, revolutions per minute (RPM), and face and lateral acceleration, etc.
In this paper, a traffic cellular automata model that is applicable to variable density is built based on a hybrid system and the cellular automata theory. On the basis of this model, a new driving style quantitative method is proposed combining the acceleration and the vehicle distance. Then, a data quality analysis algorithm, which conducts the real-time data anomaly detection in order to guarantee driving safety, is designed by adding quantized driving style into data anomaly detection.

3. Model and Description

3.1. Traffic Cellular Automata

Based on the theory of a hybrid system and cellular automata, a traffic flow model of cellular automata adoptive to variable density is constructed. Cellular automata are a dynamical system with discrete space and time, different from a general dynamics model. Instead of being determined by the strict definition of a physical equation or function, it is composed of a series of model construction rule sets, which include the cellular space and states of cellular automata, neighbor states, and space motion rules.
In the TCA (Traffic Cellular Automata), as shown in Figure 1, L represents discrete grids of traffic cellular automata model. It is composed of L lanes, each lane has k cellular, and every cellular is dominated by only one vehicle or being idle in a step time. A vehicle can span multiple sequential cellular, the state of the n t h vehicle represented by the speed v n { 0 , 1 , . . . , v m a x } and position x n { 1 , 2 , . . . , k } , and v m a x represents maximum permitted speed.
The specific process of cellular automata is as follows:
(1) Initialize the traffic cellular automata model
According to previous experience, each cellular automaton corresponds to a road of 7.5 m [30]; however, the TCA model constructed in this way can only be applicable to a specific scenario. For example, on the highway, the vehicle flow density is small, while the vehicle speed and the vehicle distance are large, so that there will be a large number of idle cellular automata in the TCA model, which is not conducive to analysis. Another example is that, in a city with a high traffic density and a small vehicle speed and vehicle distance, all cellular automata will be occupied in the TCA model, or even the same cellular automaton may be occupied by multiple vehicles, so that the TCA model cannot be built correctly. Aiming at this situation, this paper decided to calculate the road length of each cellular automaton according to the average vehicle speed on the road. The formula is as follows:
x c = 1 2 v n ,
where x c is the length of the road that corresponds to each cellular, and v n is the discrete velocity of the nth vehicle at this moment.
(2) Calculation of the safe distance
In order to ensure traffic safety, each vehicle must keep a proper distance from the vehicle in front. Too much distance will reduce the road traffic flow, and too small distance is prone to traffic accidents. A safe distance d s a f e is obtained according to the traffic laws [31], as shown in Table 1.
(3) Update vehicle status based on rule set
The states of all vehicles are updated according to the defined acceleration rules, overtaking/lane-changing rules, deceleration rules, and random slowing rules. The specific evolution rules are given in Section 3.2.
(4) Update the position according to the vehicle status
At the moment of t + 1 , the position of the vehicle is updated according to the updated speed. When the position is greater than the length of road segment L, the vehicle is regarded as leaving the road segment. Then, remove the vehicle, and the total number of vehicles in the road segment N is reduced. Update the location and remove the vehicle according to the following rules:
x n ( t + 1 ) = x n ( t ) + v n ( t + 1 ) .
From the above steps, we can obtain the evolution of our TCA model.

3.2. Rule Set of Traffic Cellular Automata

3.2.1. Accelerate Rule

When the distance between the nth vehicle and its front vehicle is too large, which this paper stipulates as the safety distance being greater than two times, and the speed does not reach the maximum speed that is d n 2 d s a f e and v n < v max , ( d n is the distance between the nth vehicle and its front vehicle, v n is the current speed of the nth vehicle), and the vehicle can continue to speed up with an acceleration a n (general set to 1). The vehicle accelerates according to the following rules:
v n ( t + 1 ) = min v n ( t ) + a n , v max .

3.2.2. Overtaking/Lane-Changing Rule

When the nth vehicle satisfies the overtaking/lane-change condition, it can overtake or change lanes; otherwise, the mandatory deceleration rule is implemented, and the specific conditions are as follows:
d n < min v n + 1 , v max , d n _ other > d n , d n _ b a c k > d s a f e ,
where d n _ o t h e r is the distance between the nth vehicle and the front vehicle in the adjacent lane (change lane), and d n _ b a c k is the vehicle distance between the nth vehicle and the behind vehicle in the adjacent lane, d s a f e is the safety distance. The first formula indicates that the distance between the nth vehicle and the front vehicle in the same lane is no longer able to satisfy the following accelerating driving conditions at time t. The second formula indicates that the driving conditions of adjacent lane are better, which can satisfy the acceleration of the nth vehicle. The third formula is the safety condition, indicating that the lane change of the nth car will not cause congestion to the behind vehicle in the adjacent lane.

3.2.3. Mandatory Deceleration Rule

When the speed of the nth vehicle is too high or the distance from the front vehicle is too small, it is stipulated in this paper that, if v n > v max or d n < d s a f e , and overtaking/lane change rule is not satisfied, the mandatory deceleration rule should be implemented. The vehicle decelerates according to the following rule:
v n ( t + 1 ) = max v n ( t ) a n , 0 .

3.2.4. Random Slowing Rule

In order to get closer to the measured data, according to the sensitive driving model proposed by Larraga et al. [30], considering the driver’s uncertain behavior, the vehicle speed is randomly slowed, and the random slowing probability p n is introduced to randomly slow with acceleration a n . The vehicle is randomly slowed according to the following rules:
v n ( t + 1 ) = max v n ( t ) a n , 0 , p n 1 3 , v n ( t ) , p n > 1 3 .
The rule is to simulate random behavior, and p n is a random value.

3.3. Driving Style Quantization Model

According to the multidimensional driving style table, driving styles are classified in a broad sense [32]. This paper divides driving styles into three types: cautious type (C), normal type (N), and aggressive type (A). There are generally two angles for quantifying driving style via data. The first Angle is quantized according to the speed and acceleration of vehicles. The driver style recognition coefficient R d r i v e r proposed by Murphey et al. [26] is a very classical algorithm. The second Angle is quantized according to the vehicle distance. At present, all of the research is simply quantized from one aspect, so that there is a certain deviation from the actual situation, which will lead to inaccurate quantization results. As shown in Figure 2: (a) When the distance between the vehicle and its front car is too large, the behind car can be considered as free driving, and frequent changes in acceleration are normal. However, from the perspective of acceleration, the driver of the behind vehicle will be judged as aggressive with a high probability; (b) In the case of the same vehicle distance, drivers with frequent changes in acceleration (speed) must have different driving style types from drivers with stable acceleration (speed), but it cannot be reflected by vehicle distance analysis alone.
In this paper, based on the driver style recognition coefficient R d r i v e r proposed by Murphey et al. [26], a new concept–driving style recognition coefficient R d e is proposed by combining acceleration and vehicle distance, and driving style is quantified by using acceleration and vehicle distance.
Define vehicle distance ratio p:
p = s d ,
where d is the vehicle distance, and s is the shortest safe distance, which is obtained according to the safe distance specified in the traffic laws [31], as shown in Table 1.
If the vehicle distance d is less than the safe distance s, the driver is considered to be aggressive (A), and the driving style recognition coefficient R d e is not required to be calculated.
Then, the driver style recognition coefficient R d r i v e r is calculated as follows:
J ( t ) = d 2 v ( t ) d t 2 ,
R driver = R J J ¯ .
J ( t ) is the impact, defined in physics as the rate of acceleration change; J ¯ is the average impact of normal drivers under the same condition; R J is the standard deviation of the impact within a time period with a time window ω . Through a large number of experiments and studies, Murphey suggested setting the time window as 6 s or 9 s, which will have a high recognition precision [26]. This paper refers to this setting.
Driving style recognition coefficient R d e can be expressed as:
R d e = R driver × p = R J J ¯ × s d .
Finally, the calculated driving style coefficient is compared with two thresholds: the normal threshold Norm t h r e s h o l d and the aggressive threshold Agg t h r e s h o l d . Through a lot of experiments, this paper suggests that the two thresholds are 0.5 and 1.0, respectively.

4. Add Algorithm: Anomaly Detection Based on Driving Style

Considering that part of the attacking data in the actual situation will not affect the safety of driving, regarding it as normal data can effectively reduce the calculation cost without affecting the accuracy, thus this paper adopts the following methods to preprocess all the data:
C = 0 , f F a = f ( d ) , 1 , else .
C is the preliminary screening index for anomaly, and C is 1 for possible anomaly, while C is 0 for normal data. F is the rule set of cellular automata traffic flow model, f is one of these rules, a is the decision of the vehicle, and d is the data of the vehicle. Equation (11) shows that, if the vehicle data can keep the TCA system steady, we believe that the data are normal data; otherwise, it is considered suspected abnormal data and proceeds to the next step for further judgment.
The formula for the driving style recognition coefficient R d e is given in Section 3.3.
After obtaining R d e , this paper converted it into the corresponding driving style coefficient e, in order to conduct anomaly detection via GMM later. The corresponding relation of R d e and e is shown as Table 2:
Where Norm t h r e s h o l d is normal threshold, Agg t h r e s h o l d is aggressive threshold (according to the experiment results, it is suggested that two thresholds are valued 0.5 and 1.5 respectively).

4.1. Gaussian Mixed Model (GMM)

After obtaining driving style parameter e, data anomaly detection is conducted. For the sake of research, this paper extracts the velocity v, acceleration a, distance d, and quantized driving style parameter e from the data packet for anomaly detection.
Since Gaussian mixture model (GMM) is applicable to continuous variables and can reflect the correlation between dimensions, this paper uses the GMM to carry out this work, as shown in Figure 3:
GMM is often used in clustering. Taking a point in GMM distribution randomly can be divided into two steps: first, choose one component from K components randomly; the probability of selecting each component is actually its coefficient π k . After selecting components, separately consider selecting one point from this component’s distribution; here, it has returned to normal Gaussian distribution and has converted to known issues. Thus, GMM is used for clustering, and we only need to deduce the probability distribution of GMM according to the data.
The random variable X is set; then, the Gaussian mixture model can be expressed as follows:
P ( X ) = k = 1 K π k N x | μ k , Σ k ,
where N ( x | μ k , Σ K ) is the kth component of the mixture model. Given two clusters, which can be represented by two two-dimensional Gaussian distributions, then the component K = 2. π k is the mixture coefficient that satisfies:
k K π k = 1 , 0 π k 1 ,
where π k is equivalent to the weight of each component N ( x | μ k , Σ K ) ; then, the form of two clustering GMM is shown in the formula:
P ( X ) = π 1 N x | μ 1 , Σ 1 + π 2 N x | μ 2 , Σ 2 .
The problem of GMM parameter estimation is how to determine the value of π 1 and π 2 automatically based on data. To solve this problem, we can use the Expect–Maximization (EM) algorithm. With the EM algorithm, we can iteratively calculate ( π k , x k , Σ k ) in GMM.
The EM algorithm has two steps. The first step is to obtain the rough value of the estimating parameter; the second step is to use the value of the first step to maximize likelihood function. Thus, the likelihood function of GMM should be obtained first; there are three parameters in GMM model to estimate: π, μ and Σ . Rewrite Equation (12):
P ( x | π , μ , Σ ) = k 1 K π k N ( x | μ k , Σ k ) .
In order to estimate the three parameters, the maximum likelihood function of the three parameters needs to be solved respectively. First, solve the maximum likelihood function of μ k . Take the logarithm of Formula (15) and then take the derivative of μ k and set the derivative to 0, the maximum likelihood function can be obtained:
0 = n 1 N π k N x n | μ k , Σ k j π j N x n | μ j , Σ j k x n μ k .
Both sides multiply k 1 , rearranging to get:
μ k = 1 N k n 1 N γ z n k x n ,
where:
N k = n 1 N γ Z n k ,
γ z k = p z k = 1 | x = π k N x | μ k , Σ k j 1 K π j N x | μ j , Σ j .
As shown in Formula (19), γ ( z k ) is defined to represent the posterior probability of the k t h component. In Formulas (17) and (18), N is the number of points, then γ ( z n k ) can represent the posterior probability of n ( x n ) belonging to cluster k, μ k is the weighted average of all points, and n 1 N γ ( z n k ) is the weight of each point, which is related to the k t h cluster.
Calculate the maximum likelihood function of Σ k in the same way; we can obtain:
Σ k = 1 N k n 1 N γ z n k x n μ k x n μ k T .
Finally, the maximum likelihood function of π k remains; it can be regarded as the prior probability of z k = 1 . Note that there are constraints k 1 K π k = 1 of π k , so we need to add the Lagrangian operator:
ln p ( x | π , μ , Σ ) + λ k 1 K π k 1 .
To calculate the maximum likelihood function of π k above in the same way, we can obtain:
0 = n 1 N N x n | μ k , Σ k j π j N x n | μ j , Σ j + λ .
Both sides multiply π k , and we can obtain λ = N , which leads to a more concise expression of π k :
π k = N k N .
Using the EM algorithm to estimate GMM parameters is to maximize Formulas (17), (20) and (23), Formulas (17), (19), (20) and (23) are required. First, assign the initial value of π, μ and Σ , which is substituted into Formula (19) to obtain γ ( z n k ) . Then, substitute γ ( z n k ) into Formulas (18), (20) and (23) to obtain π k , μ k and Σ k . Subsequently, substitute π k , μ k and Σ k into Formula (19) to obtain new γ ( z n k ) , then substitute new γ ( z n k ) into Formulas (17), (20) and (23). Repeat the former steps until the algorithm converges.

4.2. Add Algorithm

Anomaly detection algorithm of IOV data, ADD, is proposed based on driving style. The state transition diagram of ADD algorithm is shown in Figure 4.
The main process is as follows:
S0: Pre-detection by traffic flow model. If the vehicle data conforms to the TCA model (C = 0), determine it as normal data and continue S0; if the vehicle data does not conform to the TCA model (C = 1), anomalies may exist and further comprehensive determination is needed, and proceed to S1.
S1: Data preprocessing. Speed v, acceleration a and distance d are extracted from the data packet. The distance d and the minimum safe distance s are compared. If d s , proceed to S2; otherwise, proceed to S3.
S2: The driving style recognition coefficient R d e is calculated according to the Formula (10).
S3: The driving style coefficient e is obtained according to the comparison table of driving style parameters.
S4: The obtained driving style coefficient e, velocity v, acceleration a, and distance d are used to obtain the anomalies list via the Gaussian mixture model (GMM).For a given m-dimensional data set { x 1 , x 2 , ... , x m } , x R , using a Gaussian mixture model to calculate mathematical expectation μ and build the covariance matrix Σ of all the characteristics, as shown in Formulas (24) and (25):
μ = 1 m i = 1 m x i ,
Σ = 1 m i = 1 m ( x i μ ) ( x i μ ) T .
The probability density function is as shown in Formula (26):
P ( x ; μ , σ 2 ) = 1 ( 2 π ) π 2 | Σ | 1 2 e x p ( 1 2 ( x μ ) T Σ 1 ( x μ ) ) .
The probability density function calculated in Formula (26) is used to judge the new data, and P ( x ) can be compared with the adaptive threshold to detect anomaly data; finally, the anomalies list can be obtained through output.

5. Experiment and Analysis

In this paper, the ADD algorithm is proposed to analyze the validity of IOV data. Two data sets are used in the simulation experiment.
Data set 1: NGSIM data set for experimental simulation [33]. Researchers collected detailed vehicle trajectory data on southbound US 101 and Lankershim Boulevard in Los Angeles, CA, USA eastbound I-80 in Emeryville, CA, USA and Peachtree Street in Atlanta, GA, USA. Data were collected through a network of synchronized digital video cameras. NGVIDEO, a customized software application developed for the NGSIM program (Dataset 1.1; USDOT; Los Angeles, California; Emeryville, California; Atlanta, Georgia; America), transcribed the vehicle trajectory data from the video. This vehicle trajectory data provided the precise location of each vehicle within the study area every 0.1 s, resulting in detailed lane positions and locations relative to other vehicles.
Data set 2: The self-made data set simulated by Simulation of Urban MObility (SUMO), using a “five-car model” and custom vehicle to generate autonomous vehicles required by the experiment. In order to distinguish the two different types of vehicles, we use red vehicles to represent autonomous vehicles and yellow vehicles to represent environmental vehicles, as shown in Figure 5. Then, collect the simulated data and analyze it as the interactive data between vehicles.
This paper only changes the speed to simulate anomaly data. According to the actual situation and the investigation of Chen et al. [34], four types of anomaly data are defined, as Figure 6:
1. a = 0 , | Δ v | 5 % , the acceleration is 0, but the speed changes;
2. a 0 , | Δ v | 5 % , the acceleration is not 0, but the speed remains unchanged;
3. The distance(d) is too small when the speed or acceleration is large;
4. | Δ v | > 50 % , a step occurs in speed or acceleration.
In order to prove the performance of the algorithm proposed in this paper, two algorithms are adopted for comparison: (1) HTM algorithm: Hole et al. [35] carried out anomaly detection on the time series data, whose data set was derived from the collected time series data of various industries, including the vehicle speed in the IOV. In this paper, the HTM algorithm is only used for anomaly detection of one-dimensional data, velocity v, for comparison. (2) LSTM algorithm: Filonov et al. [36] adopted a method based on LSTM neural network to monitor and detect anomalies in multivariable time series data. In this paper, the LSTM algorithm is used to detect the anomalies of the three-dimensional IOV data (speed, acceleration, distance) without driving style for comparison.
In this paper, ten cars in the NGSIM data set are randomly selected as the GMM training data set. Figure 7 shows the speed trend of the training set, where the velocity step between two vehicles is marked as anomaly 4.
There are 11 anomaly intervals in the graph above, the specific situation is as follows:
Anomaly intervals (5) and (8): when the acceleration is 0, the velocity changes (anomaly 1);
Anomaly intervals (6) and (9): when the acceleration is not 0, the velocity remains unchanged (anomaly 2);
Anomaly interval (1) and (11): when the vehicle distance d is small, the speed or acceleration is large (anomaly 3);
Anomaly intervals (2), (3), (4), (7), and (10): when velocity or acceleration step is generated, which is not normalcy (anomaly 4).
GMM test data set is composed of two parts. Test set 1 is the vehicles randomly selected from the NGSIM data set, and the following three test sets are obtained:
State 1 selects the vehicles as 14, 233, 999, and 2333. The anomaly data include all four anomaly conditions. The schematic diagram is shown in Figure 8a. Figure 8b is the preliminary screening index of anomalies obtained via the cellular automata traffic flow model.
State 2 selects the vehicles as 28 and 78, and the anomaly data includes anomaly 1, 2, and 3. All these three anomalies are considered to be related to each other; the schematic diagram is shown in Figure 9a. Figure 9b is the preliminary screening index of anomalies obtained via the cellular automata traffic flow model.
State 3 selects the vehicles as 59 and 1202, and there is only anomaly 4. In this case, there was only step anomaly of speed, as shown in Figure 10a. Figure 10b is the preliminary screening index of anomalies obtained via the cellular automata traffic flow model.
Test set 2 is obtained by adding the anomaly data (including all four anomalies, in the first situation) into the SUMO simulation data set, as shown in Figure 11.

5.1. Experimental Results and Analysis

According to the actual situation and the study of Murphey et al. [26], the changes of driving style are not a mutation process reflected in the data; thus, this paper proposes that the driving style e is a transient data, which is quantified by a sliding time window (it is suggested that the time window should be consistent with ω ). The driving style quantification result of a vehicle (Id: 562) is shown in Figure 12.
When comparing the experimental results of the test set, the three parameters–Precision, Recall and F 1 score, which are commonly used in the field of data anomaly identification, are selected as the evaluation criteria. The common method for calculating Precision, Recall, and F 1 scores is shown in Formulas (27) to (29):
P r e c i s i o n = T p T p + F p ,
R e c a l l = T p T p + F n ,
F 1 = 2 P r e c i s i o n R e c a l l R e c a l l + P r e c i s i o n ,
where T p represents the number of correctly detected, F p represents the number of false positives, and F n represents the number of false negatives. As shown in Formulas (27)–(29), the number of T p , F p and F n will determine the Precision and Recall. The precision is used for judging how sensitive the anomaly detection algorithm is to anomalies. The recall rate reflects the ability of the algorithm to detect anomalies. The accuracy and recall values together affect the final F 1 score, which represents the overall performance of the anomaly detection algorithm.

5.1.1. Experimental Results Analysis of the First Situation

In the first situation, data anomaly detection results are shown in Table 3 and Table 4, where Table 3 is the result of test set 1 (NGSIM data set) and Table 4 is the result of test set 2 (SUMO simulation data set).
It can be seen from the table that the HTM algorithm only performs anomaly detection on one-dimensional speed data, and its Precision is generally high, but Recall is very low because the HTM algorithm can detect step anomalies well and has low false positive ( F p ). The correlation between multidimensional data cannot be taken into account in the HTM algorithm, which will result in high false negative ( F n ). Therefore, the Recall of each group is very low, and the final calculated F 1 score is also very low.
The Precision of the LSTM algorithm is not much different from that of the ADD algorithm; however, the Recall of the LSTM algorithm is significantly higher than that of the former. Because the ADD algorithm takes into account the driving style, the detection is more comprehensive, the false negative ( F n ) detection result is very low, and the final calculated F 1 score is also significantly higher than the other two algorithms.

5.1.2. Experimental Results Analysis of the Second Situation

In the second situation, the results of anomaly data detection are shown in Table 5. The HTM algorithm used for detection has low Precision and Recall, and the final calculated F 1 score will be far lower than the latter two. The results of LSTM algorithm and ADD algorithm are not much different from the first situation. The Precision of the ADD algorithm is similar to the former, but the Recall is higher than the former, and the final F 1 score is also higher than the former.

5.1.3. Experimental Results Analysis of the Third Situation

In the third situation, the results of anomaly data detection are shown in Table 6. There is only velocity step anomaly, and any algorithm used for detection will have high Precision and Recall. The final calculated F 1 score will be close to each other. The detection effects of the three algorithms will not be much different.
We can clearly determine that the performance used multidimensional data to carry out validity analysis is much better than using only one-dimensional speed data via the comparison among three situations because it will not consider the correlation between multidimensional data, which will lead to high false negative results and a very low final calculated F 1 score. In the same situations above, the method of adding the driving style parameter e is better than the method irrespective of that. Although it will create unnecessary mistakes and increase false positive ( F p ), more comprehensive calculation can detect more anomalies, decrease false negative ( F n ), and improve Recall; finally, the F 1 score calculated by combining Precision and Recall will be significantly higher than the method irrespective of driving style.

6. Conclusions

This paper builds a traffic cellular automata model based on the hybrid system and cellular automata theory, and preprocesses the data of IOV according to this model, in order to achieve an ideal anomaly detection effect with limited computing resources. On the basis of this model, a new driving style quantization method is proposed by combining acceleration and vehicle distance, and the ADD algorithm, a data validity detection method for IOV, is proposed based on driving style demonstrated in Section 4, which is more reasonable. Then, NGSIM data sets and SUMO simulation data are used to verify the proposed method. Experiments show that adding driving style parameters to data validity analysis will bring better performance, and the method proposed in this paper is reasonable and feasible.

Author Contributions

N.D., Study design, data analysis and write; H.M., Literature search, data collection and write. C.Z., Data collection, data interpretation and write figure; Y.M., Study design, data analysis and write; H.G., Study design and data analysis.

Funding

This research received no external funding.

Acknowledgments

This work is supported by the National Key R&D Program of China under Grant 2018YFB1700102, the National Natural Science Foundation of China (No. 61471084), and the Fundamental Research Funds for the Central Universities (No. DUT19JCC29).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ding, N.; Ma, H.; Zhao, C.; Ma, Y.; Ge, H. Driver Emotional State Based-Data Anomaly Detection for Vehicular Ad Hoc Networks. In Proceedings of the IEEE SmartIot, Tianjin, China, 9–11 August 2019. [Google Scholar]
  2. Ahmed, E.; Gharavi, H. Cooperative vehicular networking: A survey. IEEE Trans. Intell. Transp. Syst. 2018, 19, 996–1014. [Google Scholar] [CrossRef] [PubMed]
  3. Qiu, T.; Liu, J.; Si, W.; Wu, D.O. Robustness Optimization Scheme With Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks. IEEE/ACM Trans. Netw. 2019, 27, 1028–1042. [Google Scholar] [CrossRef]
  4. GCN, Connected Cars Can Lie–Posing a New Threat to Smart Cities. 2018. Available online: https:gcn.comarticles20180613/connected-cars-malicious.aspx (accessed on 1 October 2019).
  5. Xu, C.; Zhao, F.; Guan, J.; Zhang, H.; Muntean, G.M. Qoe-drivenuser-centric vod services in urban multihomed p2p–based vehicular networks. IEEE Trans. Veh. Technol. 2013, 62, 2273–2289. [Google Scholar] [CrossRef]
  6. Wang, L.; Da, X.L.; Bi, Z.; Xu, Y. Data cleaning for RFID and WSN integration. IEEE Trans. Ind. Inf. 2013, 10, 408–418. [Google Scholar] [CrossRef]
  7. Klauer, S.G.; Dingus, T.A.; Neale, V.L.; Sudweeks, J.D.; Ramsey, D.J. The impact of driver inattention on near-crash/crash risk: An analysis using the 100-car naturalistic driving study data. United States. In A Human Factors Evaluation of the Spatial Gesture Interface for In-Vehicle Information Systems; National Highway Traffic Safety Administration: Washington, DC, USA, 2006. [Google Scholar]
  8. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
  9. Jinna, H.; Qiu, T.; Atiquzzaman, M.; Ren, Z. CVCG: Cooperative V2V-aided transmission scheme based on coalitional game for popular content distribution in vehicular ad-hoc networks. IEEE Trans. Mob. Comput. 2018. [Google Scholar] [CrossRef]
  10. Del Castillo, J.M.; Benitez, F.G. On the functional form of the speed-density relationship—I: General theory. Transp. Res. Part B Methodol. 1995, 29, 373–389. [Google Scholar] [CrossRef]
  11. Yu, H.; Wu, Z.; Wang, S.; Wang, Y.; Ma, X. Spatiotemporal recurrent convolutional networks for traffic prediction in transportation networks. Sensors 2017, 17, 1501. [Google Scholar] [CrossRef] [PubMed]
  12. Lighthill, M.J.; Whitham, G.B. On kinematic waves II. A theory of traffic flow on long crowded roads. Proc. R. Soc. Lond. Ser. A Math. Phys. Sci. 1955, 229, 317–345. [Google Scholar]
  13. Li, L.; Su, X.; Zhang, Y.; Lin, Y.; Li, Z. Trend modeling for traffic time series analysis: An integrated study. IEEE Trans. Intell. Transp. Syst. 2015, 16, 3430–3439. [Google Scholar] [CrossRef]
  14. Prigogine, I.; Herman, R. Kinetic Theory of Vehicular Traffic: Comparison with Data. Transp. Sci. 1972, 6, 440–452. [Google Scholar]
  15. Diao, X.; Chen, C.H. A sequence model for air traffic flow management rerouting problem. Transp. Res. Part E Logist. Transp. Rev. 2018, 110, 15–30. [Google Scholar] [CrossRef]
  16. Khan, Z.H.; Gulliver, T.A. A macroscopic traffic model for traffic flow harmonization. Eur. Transp. Res. Rev. 2018, 10, 30. [Google Scholar] [CrossRef]
  17. Zhao, H.T.; Yang, S.; Chen, X.X. Cellular automata model for urban road traffic flow considering pedestrian crossing street. Phys. A Stat. Mech. Appl. 2016, 462, 1301–1313. [Google Scholar] [CrossRef]
  18. Bouadi, M.; Jetto, K.; Benyoussef, A.; El Kenz, A. The investigation of the reentrance phenomenon in cellular automaton traffic flow model. Phys. A Stat. Mech. Appl. 2017, 469, 1–14. [Google Scholar] [CrossRef]
  19. Lin, C.W.; Sangiovanni-Vincentelli, A. Cyber-security for the controller area network (CAN) communication protocol. In Proceedings of the 2012 International Conference on Cyber Security, Washington, DC, USA, 14–16 December 2012; pp. 1–7. [Google Scholar]
  20. Müter, M.; Groll, A.; Freiling, F.C. A structured approach to anomaly detection for in-vehicle networks. In Proceedings of the 2010 Sixth International Conference on Information Assurance and Security, Atlanta, GA, USA, 23–25 August 2010; pp. 92–98. [Google Scholar]
  21. Volkovs, M.; Chiang, F.; Szlichta, J.; Miller, R.J. Continuous data cleaning. In Proceedings of the 2014 IEEE 30th International Conference on Data Engineering, Chicago, IL, USA, 31 March–4 April 2014; pp. 244–255. [Google Scholar]
  22. Khodayari, A.; Ghaffari, A.; Kazemi, R.; Braunstingl, R. A modified car-following model based on a neural network model of the human driver effects. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2012, 42, 1440–1449. [Google Scholar] [CrossRef]
  23. Precht, L.; Keinath, A.; Krems, J.F. Effects of driving anger on driver behavior–Results from naturalistic driving data. Transp. Res. Part F Traffic Psychol. Behav. 2017, 45, 75–92. [Google Scholar] [CrossRef]
  24. Qi, G.; Du, Y.; Wu, J.; Hounsell, N.; Jia, Y. What is the appropriate temporal distance range for driving style analysis? IEEE Trans. Intell. Transp. Syst. 2015, 17, 1393–1403. [Google Scholar] [CrossRef]
  25. Langari, R.; Won, J.S. Intelligent energy management agent for a parallel hybrid vehicle-part I: System architecture and design of the driving situation identification process. IEEE Trans. Veh. Technol. 2005, 54, 925–934. [Google Scholar] [CrossRef]
  26. Murphey, Y.L.; Milton, R.; Kiliaris, L. Driver’s style classification using jerk analysis. In Proceedings of the 2009 IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems, Nashville, TN, USA, 30 March–2 April 2009; pp. 23–28. [Google Scholar]
  27. Aljaafreh, A.; Alshabatat, N.; Al-Din MS, N. Driving style recognition using fuzzy logic. In Proceedings of the 2012 IEEE International Conference on Vehicular Electronics and Safety (ICVES 2012), Istanbul, Turkey, 24–27 July 2012; pp. 460–463. [Google Scholar]
  28. Kedar-Dongarkar, G.; Das, M. Driver classification for optimization of energy usage in a vehicle. Procedia Comput. Sci. 2012, 8, 388–393. [Google Scholar] [CrossRef]
  29. Fugiglando, U.; Massaro, E.; Santi, P.; Milardo, S.; Abida, K.; Stahlmann, R.; Netter, F.; Ratti, C. Driving behavior analysis through CAN bus data in an uncontrolled environment. IEEE Trans. Intell. Transp. Syst. 2018, 20, 737–748. [Google Scholar] [CrossRef]
  30. Lárraga, M.E.; Alvarez-Icaza, L. Cellular automata model for traffic flow with safe driving conditions. Chin. Phys. B 2014, 23, 050701. [Google Scholar] [CrossRef]
  31. Safety Vehicle Distance Regulation. Available online: http://www.calaw.cn/article/default.asp?id=4433 (accessed on 1 October 2019).
  32. Taubman-Ben-Ari, O.; Mikulincer, M.; Gillath, O. The multidimensional driving style inventory—Scale construct and validation. Accid. Anal. Prev. 2004, 36, 323–332. [Google Scholar] [CrossRef]
  33. Next, Generation Simulation (NGSIM) Vehicle Trajectories and Supporting Data. Available online: https://catalog.data.gov/dataset/next-generation-simulation-ngsim-vehicle-trajectories (accessed on 1 October 2019).
  34. Chen, Y. Design and Implementation of Network Resource Management and Configuration System based on Container Cloud Platform. In Advances in Engineering Research (AER); In Proceedings of the 5th International Conference on Frontiers of Manufacturing Science and Measuring Technology (FMSMT 2017); Atlantis Press: Paris, France, 2017; pp. 2352–5401. [Google Scholar]
  35. Hole, K.J. Anomaly Detection with Htm; Anti-fragile ICT Systems; Springer: Cham, Switzerland, 2016; pp. 125–132. [Google Scholar]
  36. Filonov, P.; Lavrentyev, A.; Vorontsov, A. Multivariate Industrial Time Series with Cyber-Attack Simulation: Fault Detection Using an Lstm-Based Predictive Data Model. arXiv 2016, arXiv:1612.06676. [Google Scholar]
Figure 1. Traffic cellular automata.
Figure 1. Traffic cellular automata.
Sensors 19 04926 g001
Figure 2. The defect of unilateral quantization.
Figure 2. The defect of unilateral quantization.
Sensors 19 04926 g002
Figure 3. Gaussian Mixed Model parameter.
Figure 3. Gaussian Mixed Model parameter.
Sensors 19 04926 g003
Figure 4. State transition diagram.
Figure 4. State transition diagram.
Sensors 19 04926 g004
Figure 5. Simulation of Urban MObility simulation platform.
Figure 5. Simulation of Urban MObility simulation platform.
Sensors 19 04926 g005
Figure 6. Data anomalies definition.
Figure 6. Data anomalies definition.
Sensors 19 04926 g006
Figure 7. Speed diagram of training set.
Figure 7. Speed diagram of training set.
Sensors 19 04926 g007
Figure 8. Schematic diagram of the first situation.
Figure 8. Schematic diagram of the first situation.
Sensors 19 04926 g008
Figure 9. Schematic diagram of the second situation.
Figure 9. Schematic diagram of the second situation.
Sensors 19 04926 g009
Figure 10. Schematic diagram of the third situation.
Figure 10. Schematic diagram of the third situation.
Sensors 19 04926 g010
Figure 11. Schematic diagram of SUMO data set.
Figure 11. Schematic diagram of SUMO data set.
Sensors 19 04926 g011
Figure 12. The driving style quantification result.
Figure 12. The driving style quantification result.
Sensors 19 04926 g012
Table 1. Safety distance.
Table 1. Safety distance.
Driving TypeCondition (km/h)Safety Distance
high speed driving v > 100 s 100  m
fast speed driving 70 < v 100 s 80  m
medium speed driving 40 < v 70 s 60  m
low speed driving 20 < v 40 s 30  m
turtle speed driving v 20 s 10  m
Table 2. Driving style coefficient contrast table.
Table 2. Driving style coefficient contrast table.
R de Driving StyleCoefficient e
R d e < N o r m t h r e s h o l d Cautious (C)1
N o r m R d e A g g Normal (N)2
R d e > A g g t h r e s h o l d Aggressive (A)3
Table 3. Results of test set 1.
Table 3. Results of test set 1.
(a) Precision
IDHTMLSTMADD
140.760.890.90
2330.670.860.90
9990.600.810.88
23330.740.890.91
AVG0.690.860.90
(b) Recall
IDHTMLSTMADD
140.360.810.94
2330.390.870.95
9990.430.890.86
23330.440.950.95
AVG0.400.880.95
(c) F1 score
IDHTMLSTMADD
140.490.840.92
2330.490.860.92
9990.500.850.92
23330.550.920.93
AVG0.510.870.92
HTM: Hierarchical Temporal Memory. LSTM: Long short-term memory. ADD: Anomaly Detection Based on Driving Style.
Table 4. Results of test set 2.
Table 4. Results of test set 2.
prerecf1
HTM0.750.360.49
GMM0.790.640.71
ADD0.830.740.78
HTM: Hierarchical Temporal Memory. LSTM: Long short-term memory. ADD: Anomaly Detection Based on Driving Style. pre: Precision; rec: Recall; f1: F1 score.
Table 5. Results of the second situation.
Table 5. Results of the second situation.
(a) Precision
IDHTMLSTMADD
280.310.770.84
780.300.810.82
AVG0.300.790.83
(b) Recall
IDHTMLSTMADD
280.160.670.87
780.130.720.91
AVG0.140.690.89
(c) F1 score
IDHTMLSTMADD
280.210.720.86
780.180.760.86
AVG0.190.740.86
HTM: Hierarchical Temporal Memory. LSTM: Long short-term memory. ADD: Anomaly Detection Based on Driving Style.
Table 6. Results of the third situation.
Table 6. Results of the third situation.
(a) Precision
IDHTMLSTMADD
590.950.890.91
12020.910.820.86
AVG0.930.860.88
(b) Recall
IDHTMLSTMADD
590.920.950.95
12020.910.920.94
AVG0.910.930.94
(c) F1 score
IDHTMLSTMADD
590.930.920.93
12020.910.870.89
AVG0.910.890.91
HTM: Hierarchical Temporal Memory. LSTM: Long short-term memory. ADD: Anomaly Detection Based on Driving Style.

Share and Cite

MDPI and ACS Style

Ding, N.; Ma, H.; Zhao, C.; Ma, Y.; Ge, H. Data Anomaly Detection for Internet of Vehicles Based on Traffic Cellular Automata and Driving Style. Sensors 2019, 19, 4926. https://doi.org/10.3390/s19224926

AMA Style

Ding N, Ma H, Zhao C, Ma Y, Ge H. Data Anomaly Detection for Internet of Vehicles Based on Traffic Cellular Automata and Driving Style. Sensors. 2019; 19(22):4926. https://doi.org/10.3390/s19224926

Chicago/Turabian Style

Ding, Nan, Haoxuan Ma, Chuanguo Zhao, Yanhua Ma, and Hongwei Ge. 2019. "Data Anomaly Detection for Internet of Vehicles Based on Traffic Cellular Automata and Driving Style" Sensors 19, no. 22: 4926. https://doi.org/10.3390/s19224926

APA Style

Ding, N., Ma, H., Zhao, C., Ma, Y., & Ge, H. (2019). Data Anomaly Detection for Internet of Vehicles Based on Traffic Cellular Automata and Driving Style. Sensors, 19(22), 4926. https://doi.org/10.3390/s19224926

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop