An IoT-Based Deep-Learning Architecture to Secure Automated Electric Vehicles Against Cyberattacks and Data Loss

被引:14
作者
Bergies, Shimaa [1 ]
Aljohani, Tawfiq M. [2 ]
Su, Shun-Feng [1 ]
Elsisi, Mahmoud [3 ,4 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect Engn, Taipei 10607, Taiwan
[2] Taibah Univ, Coll Engn Yanbu, Dept Elect Engn, Yanbu Al Bahr 41911, Saudi Arabia
[3] Natl Kaohsiung Univ Sci & Technol, Dept Elect Engn, Kaohsiung, Taiwan
[4] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11629, Egypt
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2024年 / 54卷 / 09期
关键词
Wheels; Computer crime; Internet of Things; Computer architecture; Vehicle dynamics; Sensors; Security; Automated electric vehicles (AEVs); cyberattacks; data loss; deep neural network (DNN); dynamic programming (DP); homomorphic encryption; Internet of Things (IoT); model predictive control (MPC); PREDICTIVE CONTROL; FRAMEWORK; SYSTEMS;
D O I
10.1109/TSMC.2024.3409314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the realm of modern transportation, automated electric vehicles (AEVs) assume a seminal role in realizing the vision of intelligent and electrified mobility. The advancement of AEVs hinges on the utilization of smart Internet of Things (IoT) devices as indispensable components to propel their evolution. These devices not only amplify the operational capabilities of AEVs but also underpin their security in the face of escalating cyber threats. In this regard, this study proposes a novel IoT architectural paradigm, encompassing integration of model predictive control (MPC) and deep neural network (DNN) frameworks. The proposed architecture aims to enhance AEV performance, empowering them to counteract the disruptive impact of erroneous data intrusions that result from cyber breaches. To ensure the timely identification of potential threats without compromising privacy considerations, this study augments the framework to encompass trajectory prediction. This extension is achieved through dynamic programming (DP) to craft effective control strategies governing AEV motions, conjoined with DNNs adept in discerning deviations from projected behavioral norms within AEVs' control signals. This cohesive symbiosis propels the expeditious detection of anomalies indicative of potential security breaches. As data privacy remains a paramount consideration, this work employs Homomorphic Encryption, enabling anomaly score computation on encrypted data, thereby upholding privacy standards. Various test scenarios are conducted to emphasize the effectiveness of the proposed IoT architecture with MPC, DP, and DNN to improve the performance of the AEV. The results attest that the proposed approach can tackle cyberattacks and data loss effectively which enhances the production process and decision making.
引用
收藏
页码:5717 / 5732
页数:16
相关论文
共 46 条
[1]   Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations [J].
Aljohani, Tawfiq ;
Almutairi, Abdulaziz .
AIN SHAMS ENGINEERING JOURNAL, 2024, 15 (07)
[2]   Cyberattacks on Energy Infrastructures as Modern War Weapons—Part I: Analysis and Motives [J].
Aljohani, Tawfiq M. .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2024, 43 (02) :59-69
[3]   Cyberattacks on Energy Infrastructures as Modern War Weapons—Part II: Gaps, Standardization, and Mitigation [J].
Aljohani, Tawfiq M. .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2024, 43 (02) :70-77
[4]   DeepADV: A Deep Neural Network Framework for Anomaly Detection in VANETs [J].
Alladi, Tejasvi ;
Gera, Bhavya ;
Agrawal, Ayush ;
Chamola, Vinay ;
Yu, Fei Richard .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) :12013-12023
[5]   Two-Stage Intrusion Detection System in Intelligent Transportation Systems Using Rule Extraction Methods From Deep Neural Networks [J].
Almutlaq, Samah ;
Derhab, Abdelouahid ;
Hassan, Mohammad Mehedi ;
Kaur, Kuljeet .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) :15687-15701
[6]  
[Anonymous], IOT PLATTFORM DIGITA
[7]  
Atherton D.P., 1999, Proceedings of the Americal Control Conference, P3843, DOI DOI 10.1109/ACC.1999.786236
[8]  
Borase RP, 2021, INT J DYNAM CONTROL, V9, P818, DOI [10.36106/ijar/5209034, 10.1007/s40435-020-00665-4]
[9]  
Cai X, 2023, IEEE T SYST MAN CY-S, V53, P275, DOI 10.1109/TSMC.2022.3180006
[10]  
Chandramohan S., 2021, P MAT MAN ENG SING, P337