Deep Learning-based Intrusion Detection Approach for Autonomous Electric Vehicles

被引:0
作者
Ramoliya, Fenil [1 ]
Darji, Krisha [1 ]
Trivedi, Chinmay [1 ]
Gupta, Rajesh [1 ]
Kakkar, Riya [1 ]
Tanwar, Sudeep [1 ]
Agrawal, Smita [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad, Gujarat, India
来源
2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024 | 2024年
关键词
AEVs; IoT; malicious attack; cyber-security; alert;
D O I
10.1109/ICCWORKSHOPS59551.2024.10615796
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Technological advancements have given rise to Autonomous Electric Vehicles (AEVs), self-driving and independent computational entities integrated into the IoT landscape, promising enhanced efficiency in the transportation ecosystem. However, within this intricate web of interconnectedness of IoT network which used AEVs, ensuring the security of data transmission and actuation takes center stage as a critical and paramount concern. Preserving the integrity and confidentiality of data in this complex IoT environment becomes essential to thwart potential malicious attacks. To confront this pressing challenge, we propose a state-of-the-art approach centered around the utilization of Convolutional Neural Networks (CNNs). This novel approach is meticulously designed for real-time threat detection, culminating in a robust alert system that fortifies AEV security within the IoT ecosystem. Loss and Accuracy curves with confusion matrix is included in the paper to evaluate performance of CNN. Rigorous evaluation, including diverse optimizers and comprehensive metrics, underscores the approach's reliability, affirming its potential in safeguarding IoT-based autonomous transportation.
引用
收藏
页码:1828 / 1833
页数:6
相关论文
共 14 条
[1]   An Intelligent Secured Framework for Cyberattack Detection in Electric Vehicles' CAN Bus Using Machine Learning [J].
Avatefipour, Omid ;
Al-Sumaiti, Ameena Saad ;
El-Sherbeeny, Ahmed M. ;
Awwad, Emad Mahrous ;
Elmeligy, Mohammed A. ;
Mohamed, Mohamed A. ;
Malik, Hafiz .
IEEE ACCESS, 2019, 7 :127580-127592
[2]   A review on safety failures, security attacks, and available countermeasures for autonomous vehicles [J].
Cui, Jin ;
Liew, Lin Shen ;
Sabaliauskaite, Giedre ;
Zhou, Fengjun .
AD HOC NETWORKS, 2019, 90
[3]   Autonomous electric vehicles can reduce carbon emissions and air pollution in cities [J].
Ercan, Tolga ;
Onat, Nuri C. ;
Keya, Nowreen ;
Tatari, Omer ;
Eluru, Naveen ;
Kucukvar, Murat .
TRANSPORTATION RESEARCH PART D-TRANSPORT AND ENVIRONMENT, 2022, 112
[4]  
Haider N, 2020, Arxiv, DOI arXiv:2007.04490
[5]   Machine Learning-Based Detection for Cyber Security Attacks on Connected and Autonomous Vehicles [J].
He, Qiyi ;
Meng, Xiaolin ;
Qu, Rong ;
Xi, Ruijie .
MATHEMATICS, 2020, 8 (08)
[6]   Lightweight Cryptographic Techniques for Automotive Cybersecurity [J].
Jadoon, Ahmer Khan ;
Wang, Licheng ;
Li, Tong ;
Zia, Muhammad Azam .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[7]  
Kakkar Riya, 2023, 2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence), P412, DOI 10.1109/Confluence56041.2023.10048881
[8]   Roadmap for Cybersecurity in Autonomous Vehicles [J].
Kukkala, Vipin Kumar ;
Thiruloga, Sooryaa Vignesh ;
Pasricha, Sudeep .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) :13-22
[9]  
Mankodiya H., 2021, 2021 INT C COMM COMP, P1
[10]   A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks [J].
Mousavian, Seyedamirabbas ;
Erol-Kantarci, Melike ;
Wu, Lei ;
Ortmeyer, Thomas .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (06) :6160-6169