Peer Review History

Original SubmissionApril 2, 2025
Decision Letter - Gen Li, Editor

Dear Dr. Mekonen,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

==============================

Dear authors, please revise the manuscript according to the comments

==============================

Please submit your revised manuscript by Jul 05 2025 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org . When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols . Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols .

We look forward to receiving your revised manuscript.

Kind regards,

Gen Li

Academic Editor

PLOS ONE

Journal requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please note that PLOS ONE has specific guidelines on code sharing for submissions in which author-generated code underpins the findings in the manuscript. In these cases, we expect all author-generated code to be made available without restrictions upon publication of the work. Please review our guidelines at https://journals.plos.org/plosone/s/materials-and-software-sharing#loc-sharing-code and ensure that your code is shared in a way that follows best practice and facilitates reproducibility and reuse.

3. Thank you for uploading your study's underlying data set. Unfortunately, the repository you have noted in your Data Availability statement does not qualify as an acceptable data repository according to PLOS's standards.

At this time, please upload the minimal data set necessary to replicate your study's findings to a stable, public repository (such as figshare or Dryad) and provide us with the relevant URLs, DOIs, or accession numbers that may be used to access these data. For a list of recommended repositories and additional information on PLOS standards for data deposition, please see https://journals.plos.org/plosone/s/recommended-repositories .

3. When completing the data availability statement of the submission form, you indicated that you will make your data available on acceptance. We strongly recommend all authors decide on a data sharing plan before acceptance, as the process can be lengthy and hold up publication timelines. Please note that, though access restrictions are acceptable now, your entire data will need to be made freely accessible if your manuscript is accepted for publication. This policy applies to all data except where public deposition would breach compliance with the protocol approved by your research ethics board. If you are unable to adhere to our open data policy, please kindly revise your statement to explain your reasoning and we will seek the editor's input on an exemption. Please be assured that, once you have provided your new statement, the assessment of your exemption will not hold up the peer review process.

Additional Editor Comments:

Dear authors, please revise the manuscript according to the comments

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

Reviewer #1: Yes

Reviewer #2: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously? -->?>

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available??>

The PLOS Data policy

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English??>

Reviewer #1: Yes

Reviewer #2: Yes

**********

Reviewer #1: This paper investigates the challenge of False Position Attacks (FPAs) in Vehicular Ad-hoc Networks (VANETs). By integrating ensemble learning techniques (specifically Bootstrap Aggregating) into the detection framework, the proposed approach enhances detection accuracy and system robustness. This methodology effectively addresses the dual limitations of cryptographic solutions in authenticating data credibility and conventional machine learning models' insufficient generalization capacity when confronting sophisticated attack patterns in dynamic vehicular environments. The following recommendations are provided for the author's consideration:

1.The experiments are solely based on VeReMi simulation data and do not validate performance in real-world traffic scenarios (e.g., urban congestion, high-speed mobility). Could real-road data testing or comparisons with public VANET real-world datasets (e.g., CarTel) be added to verify the generalization capability of the proposed model?

2.The experiments only cover five predefined attack types (e.g., fixed-position and random-offset attacks) and do not address more stealthy attacks (e.g., dynamic-offset or coordinated attacks). Due to insufficient coverage of attack types, could the attack scenarios be expanded—for instance, by simulating multi-node coordinated position spoofing or dynamically adjusted attack strategies—to evaluate the model’s capability in handling unknown attacks?

3.The "black-box" nature of KNN+Bagging may affect trustworthiness in practical deployment, and the paper lacks analysis on the contributions of critical features. It is recommended to further supplement the analysis in this aspect.

4.The experimental comparisons are limited to traditional machine learning models and do not include some latest advanced methods, such as Graph Neural Networks (GNN) and Federated Learning (FL). Could more comparative experiments or references to recent literature analyses be added to verify the superiority of the proposed method?

5.The study does not consider the impact of practical constraints in real-world deployment, such as communication interruptions and network latency between RSUs (Roadside Units) and vehicles, on the proposed detection system. It is suggested that the authors discuss this aspect.

Reviewer #2: This paper proposes an ensemble learning framework that uses CART, Random Forest, KNN, and MLP classifiers with bagging for Vehicular Ad-hoc Networks vulnerable to location forgery attacks to detect such attacks. By analyzing sequential BSMs from the VeReMi dataset via an RSU-level system, they get the results that KNN with bagging achieved 100% precision, recall, accuracy, and F1 score for Attack 1 and near-perfect performance for complex attacks. Other models have varying performance across simple and complex scenarios. The framework proves the effectiveness of ensemble methods, particularly KNN with bagging, in securing VANETs. The following questions are discussed with the author.

1. It is recommended to introduce the Public Key Infrastructure (PKI) model in the Introduction part before explaining its advantages and functions relative to Intelligent Transportation Systems (ITS).

2. The connection between the first and second paragraphs of the article is not strong. It is recommended to add content to smoothly connect the first paragraph, which emphasizes the necessity of a bad behavior detection model, with the content in the second paragraph regarding the security threats faced by Vehicular Ad Hoc Networks (VANETs).

3. The Introduction part and the Rationale part of the article have introduced the methods used in this article many times. The order of the methods lacks a logical connection, the transition is rigid, and a clear theoretical system is not formed. To enhance the readability and academic standardization of the article, it is suggested that the author should reorganize the chapter structure of the method, integrate the repetitive content, adopt the method of comparative analysis or progressive logic arrangement, simplify the expression, highlight the core technical details and innovation points.

4. It is recommended to introduce the existing applications of the four classification models used in this study, such as Decision tree, Random Forest, K-Nearest Neighbor algorithm and Multilayer Perceptron classifier, so that readers can better understand the research mechanism of this study.

5. Because the method proposed in this paper aims to further improve the accuracy and robustness of detection, add the following research question to solve the problem of bad behavior detection in vehicular ad hoc networks (VANETs): "How does this study further improve the robustness of detection?" And add the relevant content in the article to explain it.

6. It is recommended to add a comparative analysis of the four machine learning models combined with the bagging method in the fourth part of the article, presented in the form of tables, so that their respective application scenarios, similarities and differences are more intuitive.

7. In this paper, the bagging method is combined with four machine learning models, but only the hyperparameter tuning of KNN is performed. The author explains the reason for choosing KNN in the paper.

8. In this paper, the selection of hyperparameters is based on the preliminary experimental results. However, to make readers better understand the basis and rationality of the selection of hyperparameters, it is suggested that the author should increase the principle and process of the preliminary experiment, so that other researchers can refer to and learn from similar work.

9. In the research, although accuracy, recall, precision and F1-score are proposed as the evaluation indexes of the generalization ability of the model, the specific data of accuracy, recall, precision and F1 - score are not elaborated and analyzed in the text, which leads to the absence of key data in the evaluation system and affects the integrity and objectivity of the model performance evaluation.

**********

what does this mean? ). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy

Reviewer #1: No

Reviewer #2: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/ . PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org . Please note that Supporting Information files do not need this step.

Revision 1

We would like to express our gratitude for your valuable feedback. We have addressed each of your comments and made the necessary revisions to improve the manuscript.

Attachments
Attachment
Submitted filename: Response_to_Reviewers_PONE-D-25-17735.docx
Decision Letter - Gen Li, Editor

Detection of false position attacks in VANETs through bagging ensemble learning

PONE-D-25-17735R1

Dear Dr. Mekonen,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager®  and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Gen Li

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

Reviewer #1: All comments have been addressed

Reviewer #2: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions??>

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously? -->?>

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available??>

The PLOS Data policy

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English??>

Reviewer #1: Yes

Reviewer #2: Yes

**********

Reviewer #1: (No Response)

Reviewer #2: Vehicle mounted ad hoc networks (VANETs) are crucial for intelligent transportation systems (ITS), as they enable vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communication to improve road safety and traffic flow. The proposed framework emphasizes the effectiveness of integration technology, especially KNN with bagging, in protecting VANET communication systems, providing a scalable, efficient, and robust solution for VANET security. The paper has clear ideas, concise methods, and reliable conclusions. It is recommended to accept this manuscript.

**********

what does this mean? ). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy

Reviewer #1: No

Reviewer #2: Yes:  Baohua Guo

**********

Formally Accepted
Acceptance Letter - Gen Li, Editor

PONE-D-25-17735R1

PLOS ONE

Dear Dr. Mekonen,

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team.

At this stage, our production department will prepare your paper for publication. This includes ensuring the following:

* All references, tables, and figures are properly cited

* All relevant supporting information is included in the manuscript submission,

* There are no issues that prevent the paper from being properly typeset

You will receive further instructions from the production team, including instructions on how to review your proof when it is ready. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few days to review your paper and let you know the next and final steps.

Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

If we can help with anything else, please email us at customercare@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Gen Li

Academic Editor

PLOS ONE

Open letter on the publication of peer review reports

PLOS recognizes the benefits of transparency in the peer review process. Therefore, we enable the publication of all of the content of peer review and author responses alongside final, published articles. Reviewers remain anonymous, unless they choose to reveal their names.

We encourage other journals to join us in this initiative. We hope that our action inspires the community, including researchers, research funders, and research institutions, to recognize the benefits of published peer review reports for all parts of the research system.

Learn more at ASAPbio .