SP-CIDS: Secure and Private Collaborative IDS for VANETs

被引:35
作者
Raja, Gunasekaran [1 ]
Anbalagan, Sudha [2 ]
Vijayaraghavan, Geetha [1 ]
Theerthagiri, Sudhakar [3 ]
Suryanarayan, Saran Vaitangarukav [1 ]
Wu, Xin-Wen [4 ]
机构
[1] Anna Univ, Dept Comp Technol, NGNLab, Chennai 600025, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Sch Comp Coll Engn & Technol, Chennai 603203, Tamil Nadu, India
[3] Amrita Vishwa Vidhyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Chennai 601103, Tamil Nadu, India
[4] Indiana Univ Penn, Dept Math & Comp Sci, Indiana, PA 15705 USA
关键词
ADMM; CIDS; differential privacy; distributed machine learning; ITS; privacy-preserving; AUTHENTICATION; MECHANISM;
D O I
10.1109/TITS.2020.3036071
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Vehicular Ad hoc NETworks (VANETs) serve as the backbone of Intelligent Transportation Systems (ITS), providing passengers with safety and comfort. However, VANETs are vulnerable to major threats that affect data privacy and network services either from an individual or distributed attacker. In this paper, a Secure and Private-Collaborative Intrusion Detection System (SP-CIDS) is proposed to detect network attacks and to mitigate security concerns. In SP-CIDS, a Distributed Machine Learning (DML) model based on the Alternating Direction Method of Multipliers (ADMM) is used, which leverages the potential of vehicle-to-vehicle collaboration in the learning process to improve the storage efficiency, accuracy, and scalability of the IDS. However, there are significant data privacy concerns possible in such collaboration, where a CIDS can act as a malicious system that has access to the intermediate stages of the learning process. Additionally, the SP-CIDS system uses Differential Privacy (DP) technique to address the aforementioned data privacy risk associated with the DML-based CIDS. The SP-CIDS system is evaluated with logistic regression, naive bayes, and ensemble classifiers. Simulation results substantiate that a private ensemble classifier secures the training data with DP and also achieves 96.94% accuracy.
引用
收藏
页码:4385 / 4393
页数:9
相关论文
共 31 条
  • [1] Alcoy P., 2018, NETSCOUT ARBORS 13 A
  • [2] Quality of Service Provisioning for Heterogeneous Services in Cognitive Radio-Enabled Internet of Things
    Ali, Amjad
    Feng, Li
    Bashir, Ali Kashif
    El-Sappagh, Shaker
    Ahmed, Syed Hassan
    Iqbal, Muddesar
    Raja, Gunasekaran
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (01): : 328 - 342
  • [3] A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE
    Arul, Rajakumar
    Raja, Gunasekaran
    Bashir, Ali Kashif
    Chaudry, Junaid
    Ali, Amjad
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) : 2677 - 2689
  • [4] Barry BIA, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P193, DOI 10.1007/978-3-642-04117-4_10
  • [5] QoS-Aware Frequency-Based 4G+Relative Authentication Model for Next Generation LTE and Its Dependent Public Safety Networks
    Baskaran, Sheeba Backia Mary
    Raja, Gunasekaran
    Bashir, Ali Kashif
    Murata, Masayuki
    [J]. IEEE ACCESS, 2017, 5 : 21977 - 21991
  • [6] Large-Scale Machine Learning with Stochastic Gradient Descent
    Bottou, Leon
    [J]. COMPSTAT'2010: 19TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL STATISTICS, 2010, : 177 - 186
  • [7] Distributed optimization and statistical learning via the alternating direction method of multipliers
    Boyd S.
    Parikh N.
    Chu E.
    Peleato B.
    Eckstein J.
    [J]. Foundations and Trends in Machine Learning, 2010, 3 (01): : 1 - 122
  • [8] Chaudhuri K., 2009, P ADV NEUR INF PROC, P289
  • [9] Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
  • [10] Calibrating noise to sensitivity in private data analysis
    Dwork, Cynthia
    McSherry, Frank
    Nissim, Kobbi
    Smith, Adam
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284