[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3592538.3594274acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Anomaly Detection Framework for Securing Next Generation Networks of Platoons of Autonomous Vehicles in a Vehicle-to-Everything System

Published: 19 July 2023 Publication History

Abstract

We consider a security setting involving a platoon of autonomous vehicles (AVs) that commute from one place to another. Such vehicle platooning is utilized to optimize the usage and safety of highways. We propose a dynamic framework for a network of platoons that captures both the communication between different platoons along with the communication between different AVs within the single platoon. We propose an authenticity score scheme for monitoring the behavior of the platoons. We also propose a two-phase anomaly detection within a single platoon to elect and maintain a benign platoon leader. We then propose a long-short term memory (LSTM)-based RSU level anomaly detection scheme to safeguard the whole network of platoons. Finally, we adapt group-based signatures and channel switching schemes for ensuring that the communication channels between AVs and platoons stay secure against man-in-the-middle and denial of service attacks. We perform extensive numerical simulations to evaluate the different components in our framework.

References

[1]
Mustafa Abdallah, Wo Jae Lee, Nithin Raghunathan, Charilaos Mousoulis, John W Sutherland, and Saurabh Bagchi. 2021. Anomaly detection through transfer learning in agriculture and manufacturing IoT systems. arXiv preprint arXiv:2102.05814 (2021).
[2]
Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, and Saurabh Bagchi. 2022. Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 249–266.
[3]
Youssef Abou Harfouch, Shuai Yuan, and Simone Baldi. 2017. An adaptive switched control approach to heterogeneous platooning with intervehicle communication losses. IEEE Transactions on Control of Network Systems 5, 3 (2017), 1434–1444.
[4]
Aiman Al-Sabaawi, Khamael Al-Dulaimi, Ernest Foo, and Mamoun Alazab. 2021. Addressing malware attacks on connected and autonomous vehicles: recent techniques and challenges. In Malware Analysis Using Artificial Intelligence and Deep Learning. Springer, 97–119.
[5]
Murtadha Alazzawi, Hongwei Lu, Ali Yassin, and Kai Chen. 2019. Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access 7 (2019), 71424–71435.
[6]
Ikram Ali, Tandoh Lawrence, and Fagen Li. 2020. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture 103 (2020), 101692.
[7]
Srivalli Boddupalli, Akash Someshwar Rao, and Sandip Ray. 2022. Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning. IEEE Transactions on Intelligent Transportation Systems (2022).
[8]
Mark Campbell, Magnus Egerstedt, Jonathan P How, and Richard M Murray. 2010. Autonomous driving in urban environments: approaches, lessons and challenges. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 368, 1928 (2010), 4649–4672.
[9]
David Chaum and Eugène Van Heyst. 1991. Group signatures. In Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings 10. Springer, 257–265.
[10]
Qi Chen, Daniel Jiang, and Luca Delgrossi. 2009. IEEE 1609.4 DSRC multi-channel operations and its implications on vehicle safety communications. In 2009 IEEE vehicular networking conference. IEEE, 1–8.
[11]
Shanzhi Chen, Jinling Hu, Yan Shi, Ying Peng, Jiayi Fang, Rui Zhao, and Li Zhao. 2017. Vehicle-to-everything (V2X) services supported by LTE-based systems and 5G. IEEE Communications Standards Magazine 1, 2 (2017), 70–76.
[12]
Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman, Alireza Jolfaei, and Rajkumar Das. 2020. Attacks on Self-Driving Cars and Their Countermeasures: A Survey. IEEE Access 8 (2020), 207308–207342.
[13]
Wikimedia Commons. 2021. File:LSTM Cell.svg. https://commons.wikimedia.org/w/index.php?title=File:LSTM_Cell.svg&oldid=597049205 [Online; accessed 30-January-2023].
[14]
A Costandoiu and M Leba. 2019. Convergence of V2X communication systems and next generation networks. In IOP Conference Series: Materials Science and Engineering, Vol. 477. IOP Publishing, 012052.
[15]
Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, and Mashrur Chowdhury. 2020. Prediction-based GNSS spoofing attack detection for autonomous vehicles. arXiv preprint arXiv:2010.11722 (2020).
[16]
Amrita Ghosal and Mauro Conti. 2020. Security issues and challenges in V2X: A Survey. Computer Networks 169 (2020), 107093. https://doi.org/10.1016/j.comnet.2019.107093
[17]
Zhicheng Gu, Zhihao Li, Xuan Di, and Rongye Shi. 2020. An LSTM-based autonomous driving model using a waymo open dataset. Applied Sciences 10, 6 (2020), 2046.
[18]
Randolph Hall and Chinan Chin. 2005. Vehicle sorting for platoon formation: Impacts on highway entry and throughput. Transportation Research Part C: Emerging Technologies 13, 5-6 (2005), 405–420.
[19]
Qiyi He. 2021. A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security. Ph. D. Dissertation. University of Nottingham.
[20]
Henry Hexmoor, Suray Alsamaraee, and Maha Almaghshi. 2018. Blockchain for improved platoon security. International Journal of Information 7, 2 (2018), 1–6.
[21]
Abdul Rehman Javed, Muhammad Usman, Saif Ur Rehman, Mohib Ullah Khan, and Mohammad Sayad Haghighi. 2021. Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network. IEEE Transactions on Intelligent Transportation Systems 22, 7 (2021), 4291–4300.
[22]
I Ge Jin and Gábor Orosz. 2014. Dynamics of connected vehicle systems with delayed acceleration feedback. Transportation Research Part C: Emerging Technologies 46 (2014), 46–64.
[23]
Ali Hussain Khan, Chuadhry Mujeeb Ahmed, Naveed Ul Hassan, and Zartash Afzal Uzmi. 2022. Proof-of-Communication-Capability Based Authentication in Blockchain-enabled Wireless Autonomous Vehicular Networks. In 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring). 1–5. https://doi.org/10.1109/VTC2022-Spring54318.2022.9860891
[24]
Roshan Kumari and Saurabh Kr Srivastava. 2017. Machine learning: A review on binary classification. International Journal of Computer Applications 160, 7 (2017).
[25]
Zhicheng Li, Bin Hu, and Zaiyue Yang. 2021. Co-design of distributed event-triggered controller for string stability of vehicle platooning under periodic jamming attacks. IEEE Transactions on Vehicular Technology 70, 12 (2021), 13115–13128.
[26]
Shahida Malik and Weiqing Sun. 2020. Analysis and simulation of cyber attacks against connected and autonomous vehicles. In 2020 International Conference on Connected and Autonomous Driving (MetroCAD). IEEE, 62–70.
[27]
Mujahid Muhammad and Ghazanfar Ali Safdar. 2018. Survey on existing authentication issues for cellular-assisted V2X communication. Vehicular Communications 12 (2018), 50–65.
[28]
Michael Müter, André Groll, and Felix C Freiling. 2010. A structured approach to anomaly detection for in-vehicle networks. In 2010 Sixth International Conference on Information Assurance and Security. IEEE, 92–98.
[29]
Hai Heng Ng, Ramnath Vasudha, Anh Tuan Hoang, Charlene Kwan, Baitao Zhou, Joanne Cheong, and Alan Quek. 2018. BESAFE: Design and implementation of a DSRC-based test-bed for connected autonomous vehicles. In 2018 21st International Conference on Intelligent Transportation Systems (ITSC). IEEE, 3742–3748.
[30]
Sahaya Beni Prathiba, Gunasekaran Raja, Sudha Anbalagan, Arikumar K S, Sugeerthi Gurumoorthy, and Kapal Dev. 2022. A Hybrid Deep Sensor Anomaly Detection for Autonomous Vehicles in 6G-V2X Environment. IEEE Transactions on Network Science and Engineering (2022), 1–10. https://doi.org/10.1109/TNSE.2022.3188304
[31]
Stefania Santini, Alessandro Salvi, Antonio Saverio Valente, Antonio Pescapè, Michele Segata, and R Lo Cigno. 2015. A consensus-based approach for platooning with inter-vehicular communications. In 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 1158–1166.
[32]
Franco van Wyk, Yiyang Wang, Anahita Khojandi, and Neda Masoud. 2020. Real-Time Sensor Anomaly Detection and Identification in Automated Vehicles. IEEE Transactions on Intelligent Transportation Systems 21, 3 (2020), 1264–1276.
[33]
Qin Wang, Jiangshan Yu, Shiping Chen, and Yang Xiang. 2022. SoK: DAG-based Blockchain Systems. Comput. Surveys (2022).
[34]
Shunyuan Xiao, Xiaohua Ge, Qing-Long Han, and Yijun Zhang. 2021. Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks. IEEE Transactions on Cybernetics (2021).

Cited By

View all
  • (2024)On Evaluating Black-Box Explainable AI Methods for Enhancing Anomaly Detection in Autonomous Driving SystemsSensors10.3390/s2411351524:11(3515)Online publication date: 29-May-2024
  • (2024)Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic ReviewIEEE Access10.1109/ACCESS.2024.340294612(72871-72895)Online publication date: 2024
  • (2024)XAI-ADS: An Explainable Artificial Intelligence Framework for Enhancing Anomaly Detection in Autonomous Driving SystemsIEEE Access10.1109/ACCESS.2024.338343112(48583-48607)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Anomaly Detection Framework for Securing Next Generation Networks of Platoons of Autonomous Vehicles in a Vehicle-to-Everything System

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          CPSS '23: Proceedings of the 9th ACM Cyber-Physical System Security Workshop
          July 2023
          77 pages
          ISBN:9798400700903
          DOI:10.1145/3592538
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 19 July 2023

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Anomaly detection
          2. Attack prevention.
          3. Autonomous driving
          4. Forecasting
          5. Vehicle platooning
          6. Vehicle-to-everything

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          ASIA CCS '23
          Sponsor:

          Acceptance Rates

          Overall Acceptance Rate 43 of 135 submissions, 32%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)72
          • Downloads (Last 6 weeks)13
          Reflects downloads up to 14 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)On Evaluating Black-Box Explainable AI Methods for Enhancing Anomaly Detection in Autonomous Driving SystemsSensors10.3390/s2411351524:11(3515)Online publication date: 29-May-2024
          • (2024)Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic ReviewIEEE Access10.1109/ACCESS.2024.340294612(72871-72895)Online publication date: 2024
          • (2024)XAI-ADS: An Explainable Artificial Intelligence Framework for Enhancing Anomaly Detection in Autonomous Driving SystemsIEEE Access10.1109/ACCESS.2024.338343112(48583-48607)Online publication date: 2024
          • (2023)A Comprehensive Survey of Threats in Platooning—A Cloud-Assisted Connected and Autonomous Vehicle ApplicationInformation10.3390/info1501001415:1(14)Online publication date: 25-Dec-2023

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media