An intrusion detection system for connected vehicles in smart cities

Abstract In the very near future, transportation will go through a transitional period that will shape the industry beyond recognition. Smart vehicles have played a significant role in the advancement of intelligent and connected transportation systems. Continuous vehicular cloud service availability in smart cities is becoming a crucial subscriber necessity which requires improvement in the vehicular service management architecture. Moreover, as smart cities continue to deploy diversified technologies to achieve assorted and high-performance cloud services, security issues with regards to communicating entities which share personal requester information still prevails. To mitigate these concerns, we introduce an automated secure continuous cloud service availability framework for smart connected vehicles that enables an intrusion detection mechanism against security attacks and provides services that meet users’ quality of service (QoS) and quality of experience (QoE) requirements. Continuous service availability is achieved by clustering smart vehicles into service-specific clusters. Cluster heads are selected for communication purposes with trusted third-party entities (TTPs) acting as mediators between service requesters and providers. The most optimal services are then delivered from the selected service providers to the requesters. Furthermore, intrusion detection is accomplished through a three-phase data traffic analysis, reduction, and classification technique used to identify positive trusted service requests against false requests that may occur during intrusion attacks. The solution adopts deep belief and decision tree machine learning mechanisms used for data reduction and classification purposes, respectively. The framework is validated through simulations to demonstrate the effectiveness of the solution in terms of intrusion attack detection. The proposed solution achieved an overall accuracy of 99.43% with 99.92% detection rate and 0.96% false positive and false negative rate of 1.53%.

[1]  Saad Amin,et al.  A New Digital Forensics Model of Smart City Automated Vehicles , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[2]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[3]  Carla Purdy,et al.  Toward an Online Anomaly Intrusion Detection System Based on Deep Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[4]  H. T. Mouftah,et al.  Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures , 2018, 2018 IEEE International Conference on Communications (ICC).

[5]  Tomas Olovsson,et al.  Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[6]  R K Narla Siva,et al.  コネクテッドビークル技術の進化:スマートドライバーからスマートカーへ...自律運転自動車へ | 文献情報 | J-GLOBAL 科学技術総合リンクセンター , 2013 .

[7]  Lijuan Zheng,et al.  Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[8]  Shahzad Khan,et al.  Artificial intelligence framework for smart city microgrids: State of the art, challenges, and opportunities , 2018, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC).

[9]  Tat-Chee Wan,et al.  Links Lifetime Estimation Based on Nodes Affinity in Wireless Ad-hoc Networks , 2008, 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[10]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[11]  Jin-Woo Jung,et al.  Electric vehicles and smart grid interaction: A review on vehicle to grid and renewable energy sources integration , 2014 .

[12]  Mohammad Reza Parsaei,et al.  A Hybrid Data Mining Approach for Intrusion Detection on Imbalanced NSL-KDD Dataset , 2016 .

[13]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[14]  Michael Patriksson,et al.  A Mixed User‐Equilibrium and System‐Optimal Traffic Flow for Connected Vehicles Stated as a Complementarity Problem , 2017, Comput. Aided Civ. Infrastructure Eng..

[15]  Yaser Jararweh,et al.  Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments , 2019, IEEE Communications Magazine.

[16]  Ling Gao,et al.  An Intrusion Detection Model Based on Deep Belief Networks , 2014 .

[17]  Quanyan Zhu,et al.  Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[18]  Siva R K Narla,et al.  The Evolution of Connected Vehicle Technology: From Smart Drivers to Smart Cars to....Self-Driving Cars. , 2013 .

[19]  Fredrik Gustafsson,et al.  Particle filters for positioning, navigation, and tracking , 2002, IEEE Trans. Signal Process..

[20]  Burak Kantarci,et al.  Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications , 2017, IEEE Sensors Letters.

[21]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.

[22]  Gill,et al.  Automated vehicles: the coming of the next disruptive technology , 2015 .

[23]  Dewan Md. Farid,et al.  Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.

[24]  H. T. Mouftah,et al.  Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud , 2016, IEEE Access.

[25]  Sherali Zeadally,et al.  Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.

[26]  Ali Kariminezhad,et al.  Optimal Power Splitting for Simultaneous Information Detection and Energy Harvesting , 2017, IEEE Signal Processing Letters.

[27]  Ayaz Ahmad,et al.  A review of EVs charging: From the perspective of energy optimization, optimization approaches, and charging techniques , 2018, Transportation Research Part D: Transport and Environment.

[28]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[29]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[30]  Dietmar P. F. Möller,et al.  Intrusion detection in connected cars , 2017, 2017 IEEE International Conference on Electro Information Technology (EIT).

[31]  Yaser Jararweh,et al.  Congestion Mitigation in Densely Crowded Environments for Augmenting QoS in Vehicular Clouds , 2018, DIVANet'18.

[32]  Shiwen Mao,et al.  Wireless Multimedia Cognitive Radio Networks: A Comprehensive Survey , 2018, IEEE Communications Surveys & Tutorials.

[33]  Simone A. Ludwig Intrusion detection of multiple attack classes using a deep neural net ensemble , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).

[34]  A. K. Pujari,et al.  Data Mining Techniques , 2006 .

[35]  M. Repetto,et al.  Design of Wireless Power Transmission for a Charge While Driving System , 2014, IEEE Transactions on Magnetics.

[36]  Marion Berbineau,et al.  Chain-Branch-Leaf: A clustering scheme for vehicular networks using only V2V communications , 2018, Ad Hoc Networks.

[37]  Hussein T. Mouftah,et al.  Connected and Autonomous Electric Vehicles (CAEVs) , 2018, IT Professional.

[38]  Kshirasagar Naik,et al.  Evaluating Electric Vehicles’ Response Time to Regulation Signals in Smart Grids , 2018, IEEE Transactions on Industrial Informatics.

[39]  Hong Liu,et al.  Securing wireless communications of connected vehicles with artificial intelligence , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).

[40]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[41]  Geoffrey E. Hinton Training Products of Experts by Minimizing Contrastive Divergence , 2002, Neural Computation.

[42]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[43]  Yaser Jararweh,et al.  A collaborative mobile edge computing and user solution for service composition in 5G systems , 2018, Transactions on Emerging Telecommunications Technologies.

[44]  Ismaeel Al Ridhawi,et al.  Workflow-Net Based Service Composition Using Mobile Edge Nodes , 2017, IEEE Access.

[45]  H. T. Mouftah,et al.  Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[46]  Md Zahangir Alom,et al.  Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).

[47]  Ahmed Karmouch,et al.  Simulator-Assisted Joint Service-Level-Agreement and Vertical-Handover Adaptation for Profit Maximization , 2012, 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet.

[48]  Qiang Ni,et al.  Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.

[49]  Baoyi Wang,et al.  Research on Feature Selection Method of Intrusion Detection Based on Deep Belief Network , 2015 .

[50]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.

[51]  Dipak Ghosal,et al.  Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.

[52]  Benyuan Liu,et al.  Pricing and revenue sharing mechanism for secondary redistribution of data service for mobile devices , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[53]  Helena Rifà-Pous,et al.  Attack Classification Schema for Smart City WSNs , 2017, Sensors.

[54]  Christian Bonnet,et al.  Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.

[55]  Leandros A. Maglaras,et al.  Social Internet of Vehicles for Smart Cities , 2016, J. Sens. Actuator Networks.

[56]  H. T. Mouftah,et al.  Vehicle as a resource for continuous service availability in smart cities , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[57]  Marina Thottan,et al.  Market sharing games applied to content distribution in ad hoc networks , 2006, IEEE J. Sel. Areas Commun..

[58]  H. T. Mouftah,et al.  A continuous diversified vehicular cloud service availability framework for smart cities , 2018, Comput. Networks.