False-Alarm Detection in the Fog-Based Internet of Connected Vehicles

One of the serious security breaches that threatens today's smart technologies is the broadcasting of false alarms. These alarms may severely affect road management systems. Vehicular networks suffer from this type of threat because of the opacity and the on-purpose broadcasting of false contents which occur frequently. Modern cloud-fog communication architectures force the organization of hierarchical communications, resulting in more robust governance of disseminated contents. This paper proposes a prediction technique that is based on a binary classification using hidden Markov model (HMM). Our contribution in this research area are as follows: 1) modeling fog data features to enforce organization of communication, 2) proposing a technique for the automatic modeling of HMM parameters, which facilitate the precise prediction of false contents, and 3) proposing a dissemination algorithm for fast communication. We conducted several experiments to measure and compare the performance of the proposed model with the state-of-the-art classification algorithms. We also performed a misuse analysis to measure the ability of our proposed model to detect false alarms in synthesis and real-world datasets. In addition, we conducted some further analysis to demonstrate the sensitivity of our methodology to cutoff points. The results showed that our HMM-based technique provides promising prediction accuracy and significantly outperforms existing classification techniques in detecting false-alarm contents.

[1]  M. Shamim Hossain,et al.  HELOS: Heterogeneous Load Scheduling for Electric Vehicle-Integrated Microgrids , 2017, IEEE Transactions on Vehicular Technology.

[2]  M. Shamim Hossain,et al.  Transferring activity recognition models in FOG computing architecture , 2018, J. Parallel Distributed Comput..

[3]  Sok-Ian Sou,et al.  Random Packet Inspection Scheme for Network Intrusion Prevention in LTE Core Networks , 2017, IEEE Transactions on Vehicular Technology.

[4]  Yu Wang Review of vehicular networks, from theory to practice, edited by Stephan Olariu and Michele C. Weigle , 2012, SIGA.

[5]  Seema Bawa,et al.  A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..

[6]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[7]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[8]  T.Y. Lin,et al.  Anomaly detection , 1994, Proceedings New Security Paradigms Workshop.

[9]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[10]  M. Shamim Hossain,et al.  Cloud-assisted secure video transmission and sharing framework for smart cities , 2017, Future Gener. Comput. Syst..

[11]  Liang Zhou,et al.  Cooperation advances on vehicular communications: A survey , 2014, Veh. Commun..

[12]  Yi-Ming Chen,et al.  An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[13]  M. Shamim Hossain,et al.  A knowledge-driven approach for activity recognition in smart homes based on activity profiling , 2020, Future Gener. Comput. Syst..

[14]  Yu-Dong Yao,et al.  Primary User Boundary Detection in Cognitive Radio Networks: Estimated Secondary User Locations and Impact of Malicious Secondary Users , 2018, IEEE Transactions on Vehicular Technology.

[15]  Abdulsalam Yassine,et al.  Autonomous monitoring in healthcare environment: Reward-based energy charging mechanism for IoMT wireless sensing nodes , 2019, Future Gener. Comput. Syst..

[16]  M. Shamim Hossain,et al.  An Annotation Technique for In-Home Smart Monitoring Environments , 2018, IEEE Access.

[17]  M. Shamim Hossain,et al.  Emotion recognition using deep learning approach from audio-visual emotional big data , 2019, Inf. Fusion.

[18]  David B. Skillicorn,et al.  A Distributed Approach for Prediction in Sensor Networks , 2005 .

[19]  M. Anwar Hossain,et al.  An ODT-based abstraction for mining closed sequential temporal patterns in IoT-cloud smart homes , 2017, Cluster Computing.

[20]  Mohammed G. H. al Zamil,et al.  Dynamic event classification for intrusion and false alarm detection in vehicular ad hoc networks , 2016, Int. J. Inf. Commun. Technol..

[21]  Bob Familiar,et al.  Real-Time Processing Using Azure Stream Analytics , 2017 .

[22]  Mohammed G. H. al Zamil,et al.  Dynamic rough-based clustering for vehicular ad-hoc networks , 2015, Int. J. Inf. Decis. Sci..

[23]  Yi-Ming Chen,et al.  Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs , 2012, WISA.

[24]  M. Shamim Hossain,et al.  Localization Based on Social Big Data Analysis in the Vehicular Networks , 2017, IEEE Transactions on Industrial Informatics.

[25]  Samer Samarah,et al.  Model Checking Based Classification Technique for Wireless Sensor Networks , 2012 .

[26]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[27]  Gerhard P. Hancke,et al.  A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study , 2018, Sensors.

[28]  M. Shamim Hossain,et al.  Secure Enforcement in Cognitive Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[29]  M. Shamim Hossain,et al.  Reliable service delivery in Tele-health care systems , 2018, J. Netw. Comput. Appl..

[30]  Janelle J. Harms,et al.  Distributed classification of acoustic targets in wireless audio-sensor networks , 2008, Comput. Networks.

[31]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[32]  Dharma P. Agrawal,et al.  Intrusion detection in Gaussian distributed Wireless Sensor Networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.