1. Introduction
With the development of science technology, Vehicular Ad Hoc Network and Intelligent Vehicle Road (VANET) collaborative system [
1] have greatly affected the intelligent transportation system. The former establishes connections between vehicles and vehicles through wireless communication devices, such as on-board equipment and shares real-time information in the network, while the latter realizes real-time information sharing and collaborative decision making through communication and data interaction between vehicles and road infrastructure. VANET involves massive and important data transmission and information exchange between vehicles and roadside infrastructure, and between vehicles and vehicles. Compared with non-connected vehicles, connected vehicles (CVs) require more frequent information interaction and are highly dependent on external information. This means that compared with traditional vehicles, connected vehicles will be faced with more potential threats from malicious attackers to attack the network, steal, tamper and falsify data [
2]. According to Upstream’s Global Automotive Cybersecurity 2023 report, cyberattacks have caused more than USD 500 billion in losses to the global automotive industry over the past five years, with remote cyberattacks accounting for about 70% of vehicle security threats. Kim et al. [
3] pointed out that network attacks on autonomous vehicles can be divided into three categories: automatic control system, components of autonomous driving system and vehicle-connected communication, among which the defense against vehicle-connected communication attacks is anomaly detection. Highly trusted data interaction is the key guarantee of intelligent transportation system, abnormal data detection and credibility discrimination are important means to ensure the reliability of data.
There have been many studies on how to solve these problems by means of communication and computer system security technology. Yao et al. [
4] proposed a dynamic entity-centric trust model based on weight which is simple enough to realize fast trust evaluation for the data in VANETs and helps vehicles to detect false or forged data. Azees et al. [
5] proposed an efficient anonymous authentication scheme to avoid malicious vehicles from entering the VANET, and designed a condition tracking mechanism applicable to vehicles and roadside units (RSUs), to improve the efficiency of the VANET system while maintaining privacy. El-Rewini et al. [
6] proposed a layered framework for traditional vehicle information security threats, which consists of sensing, communication, and control layers to investigate attacks and threats related to the communication layer and propose corresponding countermeasures. To avoid the privacy disclosure of requesting users due to the cracking of anonymous servers, Zhou et al. [
7] proposed a group signature location privacy protection scheme with backward irrelevance, which has higher security and lower computing cost. Zheng et al. [
8] proposed a vehicle identity authentication protocol based on a lightweight group signature, which can authenticate the vehicles anonymously in a fast and efficient way, aiming to solving the problem of illegal member’s tracking attacks. Yang et al. [
9] proposed an identity authentication scheme based on vehicle behavior prediction for software-defined Internet of Vehicles (IoV) within the Mobile Edge Computing (MEC) framework, to solve cryptography-based authentication schemes in IoV. Yang et al. [
10] proposed introducing the idea of edge computing (EC) into VANETs and using idle nodes’ resources to assist RSUs in quickly authenticating messages.
However, the above information security means still have some limitations, and there is a lack of effective protection mechanisms in terms of continuous trusted identity authentication and traffic business characteristics verification of data. Therefore, some scholars have proposed a credibility discrimination method based on traffic business characteristics. This method is mainly divided into two stages: one is the extraction of traffic business features (including traffic physical boundary, vehicle motion state and driver’s driving behavior [
11]) and the other is the credibility discrimination of the extracted features.
The excellent performance of the rapidly developing machine learning technology in the intelligent transportation system has been widely considered by researchers [
12]. To solve the problems of recognition and prediction, domestic and foreign scholars have applied machine learning to traffic business characteristics extraction [
13,
14], and carried out the following studies: With the indexes of speed, acceleration, lateral offset, space headway, speed difference and time headway, Ji et al. [
15] divided the driving behaviors of minibuses into car-following, LC and overtaking. Chen et al. [
16] divided the LC process of vehicles into the car-following (CF) stage, LC preparatory stage and LC execution stage based on multi-classification support vector machine. Xie et al. [
17] modeled the LC process that is composed of LC decisions (LCD) and LC implementation (LCI) based on deep belief network (DBN) and LSTM. Huang et al. [
18] proposed a LSTM neural networks (NN) based CF model considering asymmetric driving behavior to predict vehicle speed. Considering the effects of LC of side cars, Zhao et al. [
19] proposed a two-lane multi-speed difference following(FS-MAVD) model, and constructed a convolutional bidirectional LSTM network combined with a temporal attention mechanism model to predict acceleration. Cai et al. [
20] proposed a SLSTMAT(Social-LSTM-attention) algorithm, which innovatively introduced social characteristics of target vehicles and extracted them through convolutional neural networks to establish a vehicle behavior recognition model based on deep learning. Zhao et al. [
21] designed a driving intention recognition and vehicle trajectory prediction model based on graph neural network and Gated Recurrent Unit. The results showed that the proposed model can better identify the driving intention of vehicles. Huang et al. [
22] proposed a LC intention recognition method based on Attention-BiLSTM network. Compared with the LSTM model, the accuracy and F1 score of the proposed Attention-BiLSTM model increased by 13.2% and 10.5%, respectively.
Domestic and foreign scholars have carried out the following studies on characteristics-based credibility discrimination: Feng et al. [
23] systematically studied the network security of traffic signal control system in the environment of CV, analyzed the potential threats of traffic signal control system, proposed a network security analysis framework, and completed network attack and defense on a security test platform. Iqbal et al. [
24] provided a data set based on machine learning methods for training and evaluating malicious threat detection against Connected and Autonomous Vehicles (CAVs), and proposed a method to simulate network security attacks against VANET using simulation to improve the network security of CAVs. Steven et al. [
25] proposed a system framework to detect and classify misbehavior in VANET, using plausibility checks as the feature vectors of the machine learning model, and K-nearest neighbor algorithm and SVM to improve the overall detection accuracy. Huang et al. [
26] proposed a data-driven method to identify falsified trajectories generated by compromised CVs, and proposed trajectory embedding model, computed the similarity distance between trajectories based on vector representations, used hierarchical clustering to identify anomalous trajectories. Shangguan et al. [
27] designed a vehicle infrastructure cooperative credible interaction framework, and constructed a model of vehicle behavior state deduction and one path perturbation factor quantification. Wu et al. [
28] proposed an extended LC model (ELC) which can model CAV’s LC behaviors under cyberattacks; simulations were conducted to illustrate the impact of different malicious attacks on vehicles’ LC movements. Shi et al. [
11] built a credibility discrimination model for CF behavior based on SVM and LSTM neural network, which was trained and verified with NGSIM data sets, and the correct discrimination rate on normal and abnormal data sets reached more than 97%.
At present, many studies have been carried out in the research direction of traffic information credibility discrimination based on traffic business characteristics, but the existing studies have not fully covered various traffic scenarios in practical applications, especially for micro scenarios. Scholars focus more on discrimination methods for autonomous driving fleets, traffic control systems, and other objects, and less research on discriminating the driving information of a single vehicle. Shi et al. [
11] proposed a credibility discrimination method for traffic information in the CF scenario. Compared with the CF scenario, the traffic factors to be considered in LC are more complex and more dangerous [
29], and the features are more difficult to extract. The LC scenario targeted in this paper is more complex than the CF scenario in the literature [
11]. The CF state focused in literature [
11] only needs to consider the longitudinal speed of the vehicle, while the LC state also needs to consider the transverse speed in addition to the longitudinal speed, so our model is more complex. And because of the optimization of hyperparameters, the accuracy of our velocity model is higher.
Based on the above analysis, several research gaps can be identified as follows:
- (1)
There are many parameters and large dimensions in the process of lane change, and the data are difficult to process;
- (2)
Credibility discrimination models and methods based on traffic business characteristics under LC scenarios have not been studied;
- (3)
The integrality of steps such as vehicle state recognition and speed prediction is insufficient, and the input and output of each stage model are inconsistent.
To fill up the above research gaps, in this paper, a method of information recognition and credibility discrimination of LC behavior based on machine learning is proposed. The main contributions of this paper are as follows:
- (1)
To recognize LC behavior state and solve the problem of multi-dimensional parameter continuous time series sampling, an eigenvector dimensionality reduction method is proposed;
- (2)
A credibility discrimination method is proposed based on traffic business characteristics, including identification, prediction, and discrimination under LC scenarios. Both the credibility discrimination process and evaluation rules are designed;
- (3)
In the prediction model, a parameter consistency processing method is proposed to deal with the complex input parameters of different models. The input matrix is formed by the feature vector in the state recognition according to the time dimension.
The structure of the full text is as follows.
Section 2 describes the vehicle LC scenario and related parameters and analyzes the key problems in the process of implementing the model.
Section 3 introduces the input and output of each algorithm of the model. In
Section 4, the model training, testing, and verification processes are presented. In
Section 5, the research conclusion is summarized.