Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3632366.3632388acmconferencesArticle/Chapter ViewAbstractPublication PagesbdcatConference Proceedingsconference-collections
research-article
Open access

Privacy-Preserving Intrusion Detection System for Internet of Vehicles using Split Learning

Published: 03 April 2024 Publication History

Abstract

The Internet of Vehicles (IoV) is envisioned to improve road safety, reduce traffic congestion, and minimize pollution. However, the connectedness of IoV entities increases the risk of cyber attacks, which can have serious consequences. Traditional intrusion detection systems (IDS) transfer large amounts of raw data to central servers, leading to potential privacy concerns. Also, training IDS on resource-constrained IoV devices generally can result in slower training times and poor service quality. To address these issues, we propose a split learning-based privacy-preserving IDS that deploys IDS on edge devices without sharing sensitive raw data. In addition, we propose a regret minimization-based adaptive offloading technique that reduces the training time on resource-constrained devices. Our approach effectively detects anomalous behavior while preserving data privacy and reducing training time, making it a practical solution for IoV. Experimental results show the effectiveness of our approach and its potential to enhance the security of the IoV network.

References

[1]
Paul Agbaje, Afia Anjum, Arkajyoti Mitra, Emmanuel Oseghale, Gedare Bloom, and Habeeb Olufowobi. 2022. Survey of Interoperability Challenges in the Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems 23, 12 (2022), 22838--22861.
[2]
Natasha Alkhatib, Lina Achaji, Maria Mushtaq, Hadi Ghauch, and Jean-Luc Danger. [n. d.]. WIP: AMICA: Attention-based Multi-Identifier model for asynchronous intrusion detection on Controller Area networks. ([n. d.]).
[3]
Samah Almutlaq, Abdelouahid Derhab, Mohammad Mehedi Hassan, and Kuljeet Kaur. 2022. Two-stage intrusion detection system in intelligent transportation systems using rule extraction methods from deep neural networks. IEEE Transactions on Intelligent Transportation Systems (2022).
[4]
Afia Anjum, Paul Agbaje, Sena Hounsinou, and Habeeb Olufowobi. 2022. In-Vehicle Network Anomaly Detection Using Extreme Gradient Boosting Machine. In 2022 11th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1--6.
[5]
Chien-Ming Chen, Bin Xiang, Yining Liu, and King-Hang Wang. 2019. A secure authentication protocol for internet of vehicles. Ieee Access 7 (2019).
[6]
Pierre Gaillard, Gilles Stoltz, and Tim Van Erven. 2014. A second-order bound with excess losses. In Conference on Learning Theory. PMLR, 176--196.
[7]
Amal Hbaieb, Samiha Ayed, and Lamia Chaari. 2022. Federated learning based IDS approach for the IoV. In Proceedings of the 17th International Conference on Availability, Reliability and Security. 1--6.
[8]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780.
[9]
B Karthiga, Danalakshmi Durairaj, Nishad Nawaz, Thiruppathy Kesavan Venkatasamy, Gopi Ramasamy, A Hariharasudan, et al. 2022. Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches. Wireless Communications and Mobile Computing (2022).
[10]
H. Lee, S. H. Jeong, and H. K. Kim. 2017. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame. In 2017 15th Annual Conference on Privacy, Security and Trust (PST), Vol. 00. 57--5709.
[11]
Muhammad Baqer Mollah, Jun Zhao, Dusit Niyato, Yong Liang Guan, Chau Yuen, Sumei Sun, Kwok-Yan Lam, and Leong Hai Koh. 2020. Blockchain for the internet of vehicles towards intelligent transportation systems: A survey. IEEE Internet of Things Journal 8, 6 (2020), 4157--4185.
[12]
Keiron O'Shea and Ryan Nash. 2015. An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015).
[13]
Manjari Singh Rathore, M Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor, and Mounir Hamdi. 2022. A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering 102 (2022).
[14]
Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018), 108--116.
[15]
Nishant Sharma, Naveen Chauhan, and Narottam Chand. 2018. Security challenges in Internet of Vehicles (IoV) environment. In 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
[16]
Surbhi Sharma and Baijnath Kaushik. 2019. A survey on internet of vehicles: Applications, security issues & solutions. Vehicular Communications (2019).
[17]
Li Yang, Abdallah Moubayed, Ismail Hamieh, and Abdallah Shami. 2019. Tree-based intelligent intrusion detection system in internet of vehicles. In 2019 IEEE global communications conference (GLOBECOM). IEEE, 1--6.
[18]
Li Yang, Abdallah Moubayed, and Abdallah Shami. 2021. MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet of Things Journal 9, 1 (2021), 616--632.
[19]
Clinton Young, Joseph Zambreno, Habeeb Olufowobi, and Gedare Bloom. 2019. Survey of automotive controller area network intrusion detection systems. IEEE Design & Test 36, 6 (2019), 48--55.

Cited By

View all
  • (2024)Stacking Enabled Ensemble Learning Based Intrusion Detection Scheme (SELIDS) for IoVSN Computer Science10.1007/s42979-024-03376-15:8Online publication date: 28-Oct-2024
  • (2024)IoV security and privacy survey: issues, countermeasures, and challengesThe Journal of Supercomputing10.1007/s11227-024-06269-580:15(23018-23082)Online publication date: 2-Jul-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
BDCAT '23: Proceedings of the IEEE/ACM 10th International Conference on Big Data Computing, Applications and Technologies
December 2023
187 pages
ISBN:9798400704734
DOI:10.1145/3632366
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 April 2024

Check for updates

Author Tags

  1. intrusion detection
  2. split learning
  3. internet of vehicles
  4. adaptive offloading
  5. optimization

Qualifiers

  • Research-article

Conference

BDCAT '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 27 of 93 submissions, 29%

Upcoming Conference

BDCAT '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)230
  • Downloads (Last 6 weeks)39
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Stacking Enabled Ensemble Learning Based Intrusion Detection Scheme (SELIDS) for IoVSN Computer Science10.1007/s42979-024-03376-15:8Online publication date: 28-Oct-2024
  • (2024)IoV security and privacy survey: issues, countermeasures, and challengesThe Journal of Supercomputing10.1007/s11227-024-06269-580:15(23018-23082)Online publication date: 2-Jul-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media