An Intelligent Data-Driven Model to Secure Intravehicle Communications Based on Machine Learning

被引:47
作者
Al-Saud, Mamdooh [1 ,2 ]
Eltamaly, Ali M. [3 ,4 ]
Mohamed, Mohamed A. [5 ]
Kavousi-Fard, Abdollah [6 ]
机构
[1] King Saud Univ, Elect Engn Dept, Riyadh 12372, Saudi Arabia
[2] King Saud Univ, Saudi Elect Co Chair Power Syst Reliabil & Secur, Riyadh 12372, Saudi Arabia
[3] King Saud Univ, Sustainable Energy Technol Ctr, Riyadh 11421, Saudi Arabia
[4] Mansoura Univ, Elect Engn Dept, Mansoura 35516, Egypt
[5] Minia Univ, Fac Engn, Elect Engn Dept, Al Minya 61519, Egypt
[6] Univ Michigan, Dept Elect & Comp Engn, Dearborn, MI 48128 USA
关键词
Anomaly detection; controller area networks (CAN) bus; electric vehicle; intravehicle; optimization;
D O I
10.1109/TIE.2019.2924870
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The high relying of electric vehicles on either in-vehicle or between-vehicle communications can cause big issues in the system. This paper is going to mainly address the cyberattack in electric vehicles and propose a secured and reliable intelligent framework to avoid hackers from penetration into the vehicles. The proposed model is constructed based on an improved support vector machine model for anomaly detection based on the controller area network bus protocol. In order to improve the capabilities of the model for fast malicious attack detection and avoidance, a new optimization algorithm based on social spider optimization algorithm is developed, which will reinforce the training process offline. Also, a two-stage modification method is proposed to increase the search ability of the algorithm and avoid premature convergence. Last but not least, the simulation results on the real datasets reveal the high performance, reliability, and security of the proposed model against denial-of-service hacking in the electric vehicles.
引用
收藏
页码:5112 / 5119
页数:8
相关论文
共 19 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], 2009, P BTW
[4]   Efficient Protocols for Secure Broadcast in Controller Area Networks [J].
Groza, Bogdan ;
Murvay, Stefan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (04) :2034-2042
[5]   Research on the Efficiency of Cultural Manufacturing Industry in China Based on DEA-Malmuquist [J].
Gu, Ping ;
Chen, Zili ;
Chen, Cheng .
INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT INNOVATIONS (ICEMI 2017), VOL 1, ISSUE 1, 2017, :18-20
[6]   Security threats to automotive CAN networks-Practical examples and selected short-term countermeasures [J].
Hoppe, Tobias ;
Kiltz, Stefan ;
Dittmann, Jana .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2011, 96 (01) :11-25
[7]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)
[8]   A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles [J].
Loukas, George ;
Karapistoli, Eirini ;
Panaousis, Emmanouil ;
Sarigiannidis, Panagiotis ;
Bezemskij, Anatolij ;
Tuan Vuong .
AD HOC NETWORKS, 2019, 84 :124-147
[9]  
Ma RH, 2008, IEEE INT C NETW SENS, P1284
[10]   Advancing cyber-physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles [J].
Mohandes, Baraa ;
Al Hammadi, Reem ;
Sanusi, Wasiu ;
Mezher, Toufic ;
El Khatib, Sameh .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 23 :33-48