Improved Transformer-Based Privacy-Preserving Architecture for Intrusion Detection in Secure V2X Communications

被引:6
作者
Lai, Qifeng [1 ,2 ]
Xiong, Chen [1 ]
Chen, Jian [1 ,2 ]
Wang, Wei [1 ,2 ,3 ]
Chen, Junxin [1 ,4 ]
Gadekallu, Thippa Reddy [5 ,6 ,7 ,8 ,9 ]
Cai, Ming [1 ]
Hu, Xiping [1 ,2 ,3 ]
机构
[1] Sun Yat Sen Univ, Sch Intelligent Syst Engn, Shenzhen 518000, Peoples R China
[2] Shenzhen MSU BIT Univ, Artificial Intelligence Res Inst, Guangdong Hong Kong Macao Joint Lab Emot Intellige, Shenzhen 518172, Guangdong, Peoples R China
[3] Beijing Inst Technol, Sch Med Technol, Beijing 100081, Peoples R China
[4] Dalian Univ Technol, Sch Software, Dalian 116621, Peoples R China
[5] Zhongda Grp, Res & Dev, Jiaxing 314312, Zhejiang, Peoples R China
[6] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos, Lebanon
[7] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, India
[8] Jiaxing Univ, Coll Informat Sci & Engn, Jiaxing 314001, Peoples R China
[9] Lovely Profess Univ, Div Res & Dev, Phagwara 144001, India
关键词
Transformers; Training; Image edge detection; Feature extraction; Telecommunication traffic; Intrusion detection; Vehicle-to-everything; transformer; deep learning; data security; edge cloud; NETWORK;
D O I
10.1109/TCE.2023.3324081
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Vehicles (IoVs) makes communications between numerous devices that use various protocols susceptible to hacker incursions and attacks, which can compromise privacy and seriously jeopardize driving safety. Many studies have been proposed to detect intrusions hitherto, but two major limitations remain. First, traditional Vehicles-to-Cloud (V2C) have difficulty in figuring out the decentralized distribution of data and computational power in IoVs. Second, the majority of studies suffer from unbalanced data in which the attacks only make up a small part and fail to detect low-probability attacks. To address these limitations, we design a Federated Learning-Edge Cloud (FL-EC) communication architecture for IoVs with a Feature Select Transformer (FSFormer) for effective intrusion detection: In FL-EC, mobile users collect and encrypt data before uploading it to edges for training, with edges and cloud functioning as clients and servers in FL, ensuring privacy and efficient data transmission. In FSFormer, we propose a Feature Attention mechanism to search and promote significant features. Furthermore, the Feed-Forward Network is replaced with a Routing module for a deeper but less-parameter network. Extensive experiments show that our model effectively boosts the detection rate of low-probability attacks and outperforms five baseline models in almost all scenarios.
引用
收藏
页码:1810 / 1820
页数:11
相关论文
共 54 条
[1]   Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems [J].
Abdel-Basset, Mohamed ;
Moustafa, Nour ;
Hawash, Hossam ;
Razzak, Imran ;
Sallam, Karam M. ;
Elkomy, Osama M. .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (03) :2523-2537
[2]   Hidden Markov models for malware classification [J].
Annachhatre, Chinmayee ;
Austin, Thomas H. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :59-73
[3]  
[Anonymous], 2005, P 43 ANN SE REG C, DOI DOI 10.1145/1167253.1167288
[4]  
[Anonymous], 2020, World vehicles-in-use
[5]  
Bay SD., 2000, ACM SIGKDD Explorations Newsletter-Special issue on "Scalable data mining algorithms", V2, P81, DOI 10.1145/380995.381030
[6]   Effective Intrusion Detection System Using XGBoost [J].
Dhaliwal, Sukhpreet Singh ;
Abdullah-Al Nahid ;
Abbas, Robert .
INFORMATION, 2018, 9 (07)
[7]  
Dosovitskiy A, 2021, Arxiv, DOI [arXiv:2010.11929, 10.48550/arXiv.2010.11929, DOI 10.48550/ARXIV.2010.11929]
[8]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[9]  
Hasan M. A. M., 2014, J. Intell. Learn. Syst. Appl., V2014, P45, DOI DOI 10.4236/JILSA.2014.61005
[10]   A bidirectional LSTM deep learning approach for intrusion detection [J].
Imrana, Yakubu ;
Xiang, Yanping ;
Ali, Liaqat ;
Abdul-Rauf, Zaharawu .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 185 (185)