IIDS: Intelligent Intrusion Detection System for Sustainable Development in Autonomous Vehicles

被引:30
作者
Anbalagan, Sudha [1 ]
Raja, Gunasekaran [2 ]
Gurumoorthy, Sugeerthi
Suresh, R. Deepak [2 ]
Dev, Kapal [3 ]
机构
[1] Vellore Inst Technol, Ctr Smart Grid Technol, Sch Comp Sci & Engn, Chennai 600127, India
[2] Anna Univ, Dept Comp Technol, NGN Lab, MIT Campus, Chennai 600044, India
[3] Univ Johannesburg, Dept Inst Intelligent Syst, ZA-2006 Johannesburg, South Africa
关键词
Intrusion detection; Security; Real-time systems; Autonomous vehicles; Vehicle-to-everything; Safety; Electronic mail; Deep learning; autonomous vehicles; intrusion detection; safety monitoring; IoV; 5G-V2X; ANOMALY DETECTION; SECURE; BLOCKCHAIN;
D O I
10.1109/TITS.2023.3271768
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Connected and Autonomous Vehicles (CAVs) enable various capabilities and functionalities like automated driving assistance, navigation and path planning, cruise control, independent decision making, and low-carbon transportation in the real-time environment. However, the increased CAVs usage renders the potential vulnerabilities in the Internet of Vehicles (IoV) environment, making it susceptible to cyberattacks. An Intrusion Detection System (IDS) is a technique to report network assaults by potential Autonomous Vehicles (AVs) without encryption and authorization procedures for internal and external vehicular communications. This paper proposes an Intelligent IDS (IIDS) to enhance intrusion detection and categorize malicious AVs using a modified Convolutional Neural Network (CNN) with hyperparameter optimization approaches for IoV systems. The proposed IIDS framework works in a 5G Vehicle-to-Everything (V2X) environment to effectively broadcast messages about malicious AVs. Thus IIDS aids in preventing collisions and chaos, enhancing safety monitoring in the traffic. The experimental results depict that the proposed IIDS achieves 98% accuracy in detecting attacks.
引用
收藏
页码:15866 / 15875
页数:10
相关论文
共 32 条
[1]   NovelADS: A Novel Anomaly Detection System for Intra-Vehicular Networks [J].
Agrawal, Kushagra ;
Alladi, Tejasvi ;
Agrawal, Ayush ;
Chamola, Vinay ;
Benslimane, Abderrahim .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (11) :22596-22606
[2]   A Survey of Collaborative Machine Learning Using 5G Vehicular Communications [J].
Balkus, Salvador, V ;
Wang, Honggang ;
Cornet, Brian D. ;
Mahabal, Chinmay ;
Ngo, Hieu ;
Fang, Hua .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (02) :1280-1303
[3]   Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks [J].
Cui, Mingjian ;
Wang, Jianhui ;
Yue, Meng .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) :5724-5734
[4]  
Dhanalaxmi B., 2020, 2020 International Conference for Emerging Technology (INCET), P1
[5]   In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method [J].
Duan, Xuting ;
Yan, Huiwen ;
Tian, Daxin ;
Zhou, Jianshan ;
Su, Jian ;
Hao, Wei .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :2122-2134
[6]   5G Evolution: A View on 5G Cellular Technology Beyond 3GPP Release 15 [J].
Ghosh, Amitabha ;
Maeder, Andreas ;
Baker, Matthew ;
Chandramouli, Devaki .
IEEE ACCESS, 2019, 7 :127639-127651
[7]  
Han X, 2022, IEEE T INTELL TRANSP, V24, P1
[8]   A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks Using Convolutional Neural Network [J].
Ho S. ;
Jufout S.A. ;
Dajani K. ;
Mozumdar M. .
IEEE Open Journal of the Computer Society, 2021, 2 :14-25
[9]  
Hoglund Andreas, 2018, IEEE Communications Standards Magazine, V2, P90, DOI 10.1109/MCOMSTD.2018.1800002
[10]   Resource Optimization for Delay-Tolerant Data in Blockchain-Enabled IoT With Edge Computing: A Deep Reinforcement Learning Approach [J].
Li, Meng ;
Yu, F. Richard ;
Si, Pengbo ;
Wu, Wenjun ;
Zhang, Yanhua .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :9399-9412