Malicious User Detection for Cooperative Mobility Tracking in Autonomous Driving

The mobility status of self and surrounding vehicles provides important information to various tasks in autonomous driving (AD) and intelligent transportation system (ITS). Accordingly, a precise, stable, and robust mobility tracking framework is essential. Compared with self-tracking that relies only on mobility observations from onboard sensors [e.g., global positioning system (GPS), inertial measurement unit (IMU), and camera], cooperative tracking markedly increases the precision and reliability of the mobility information by integrating observations from roadside units (RSUs) and nearby vehicles through vehicle-to-everything (V2X) communications in the Internet of Vehicles (IoV). Nevertheless, cooperative tracking can be quite vulnerable if there are malicious users sending bogus observations in the cooperative network. In this article, we present a malicious user detection framework, which includes two sequential detection algorithms and a secure mobility data exchange and fusion model to detect and remove bogus mobility information and integrate proposed detection algorithms with previous data fusion algorithms, which secures the cooperative mobility tracking in AD, ITS. Simulations validate the effectiveness and robustness of the proposed framework under different types of attacks.

[1]  Qiang Zhang,et al.  An MEF-Based Localization Algorithm against Outliers in Wireless Sensor Networks , 2016, Sensors.

[2]  Ryan M. Gerdes,et al.  A data trust framework for VANETs enabling false data detection and secure vehicle tracking , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[3]  Xiang Cheng,et al.  Vehicle-to-Vehicle Distributed Storage in Vehicular Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[4]  Imtiaz Ahmad,et al.  Secure localization using hypothesis testing in wireless networks , 2018, Ad Hoc Networks.

[5]  Feng Han,et al.  A Range-Based Secure Localization Algorithm for Wireless Sensor Networks , 2019, IEEE Sensors Journal.

[6]  Giancarlo Fortino,et al.  Modelling and simulation of Opportunistic IoT Services with Aggregate Computing , 2019, Future Gener. Comput. Syst..

[7]  Jens B. Schmitt,et al.  Secure Track Verification , 2015, 2015 IEEE Symposium on Security and Privacy.

[8]  Xiang Cheng,et al.  OPTIMAL MULTI-SENSOR MULTI-VEHICLE (MSMV) LOCALIZATION AND MOBILITY TRACKING , 2018, 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[9]  Giancarlo Fortino,et al.  Data-driven clustering for multimedia communication in Internet of vehicles , 2019, Future Gener. Comput. Syst..

[10]  Cedric Nishan Canagarajah,et al.  Mobility Tracking in Cellular Networks Using Particle Filtering , 2007, IEEE Transactions on Wireless Communications.

[11]  Gongjun Yan,et al.  Providing VANET position integrity through filtering , 2009, 2009 12th International IEEE Conference on Intelligent Transportation Systems.

[12]  Peng Ning,et al.  Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).

[13]  Sorin A. Huss,et al.  A Novel Framework for Efficient Mobility Data Verification in Vehicular Ad-hoc Networks , 2012, Int. J. Intell. Transp. Syst. Res..

[14]  Jin Cui,et al.  A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.

[15]  Hirozumi Yamaguchi,et al.  Cooperative Vehicle Positioning via V2V Communications and Onboard Sensors , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[16]  Mehrdad Dianati,et al.  A Survey of the State-of-the-Art Localization Techniques and Their Potentials for Autonomous Vehicle Applications , 2018, IEEE Internet of Things Journal.

[17]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[18]  Urbano Nunes,et al.  Collaborative Vehicle Self-Localization Using Multi-GNSS Receivers and V2V/V2I Communications , 2015, 2015 IEEE 18th International Conference on Intelligent Transportation Systems.

[19]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[20]  Mujahid Muhammad,et al.  Survey on existing authentication issues for cellular-assisted V2X communication , 2018, Veh. Commun..

[21]  Yao Lu,et al.  Secure Localization Algorithms in Wireless Sensor Networks: A Review , 2019 .

[22]  Giuseppe M. L. Sarnè,et al.  A reputation framework to share resources into IoT-based environments , 2017, 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC).

[23]  Imad Mahgoub,et al.  Fuzzy logic based localization for vehicular ad hoc networks , 2014, 2014 IEEE Symposium on Computational Intelligence in Vehicles and Transportation Systems (CIVTS).

[24]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[25]  Xiang Cheng,et al.  Occupancy Grid Map Formation and Fusion in Cooperative Autonomous Vehicle Sensing (Invited Paper) , 2018, 2018 IEEE International Conference on Communication Systems (ICCS).

[26]  Giuseppe M. L. Sarnè,et al.  A Reputation Agent Model for Reliable Vehicle-to-Vehicle Information , 2018, WOA.

[27]  Dominique Gruyer,et al.  A new decentralized Bayesian approach for cooperative vehicle localization based on fusion of GPS and inter-vehicle distance measurements , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[28]  Xiang Cheng,et al.  In-Vehicle Caching (IV-Cache) Via Dynamic Distributed Storage Relay (D$^2$SR) in Vehicular Networks , 2019, IEEE Transactions on Vehicular Technology.

[29]  Jonathan Petit,et al.  Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .

[30]  Zheng Nanning,et al.  Cooperative Intelligence for Autonomous Driving , 2019 .

[31]  Xiang Cheng,et al.  5G-Enabled Vehicular Communications and Networking , 2018, Wireless Networks.

[32]  Jiannong Cao,et al.  Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.

[33]  Chi-Chun Lo,et al.  Vehicle Localization and Velocity Estimation Based on Mobile Phone Sensing , 2016, IEEE Access.

[34]  Xiang Cheng,et al.  5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework: When Benz Meets Marconi , 2017, IEEE Intelligent Systems.

[35]  Jing Jiang,et al.  Cyber Security Challenges and Solutions for V2X Communications: A Survey , 2019, Comput. Networks.

[36]  Xiang Cheng,et al.  Wireless Toward the Era of Intelligent Vehicles , 2019, IEEE Internet of Things Journal.

[37]  Dinesh K Anvekar,et al.  Secure Localization for Underwater Wireless Sensor Networks Based on Probabilistic Approach , 2018, 2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC).

[38]  Imad Mahgoub,et al.  Mobility data verification for vehicle localization in Vehicular Ad Hoc Networks , 2016, 2016 IEEE Wireless Communications and Networking Conference.