Abstract
In this article, we built up and through simulations, assessed a novel architecture of Adaptive Network Defenses (AND) to achieve robust security in IoV. In our proposed architecture, the vehicles are functioned as sensors with processing and analysis capabilities and a SDN controller is directed and programmed to adapt to changes in traffic conditions and security attack measures. Moreover, the high-highway communication link is a shared-medium link. In which, the security commands of vehicle are saved and graphed as entries and that can be used to optimize the SFC decision. For analyzing the security of the proposed system, our comprehensive simulations for the different attacking scenarios and traffic conditions have been executed. The simulation results demonstrate that the proposed security architecture, after encountering the security changes, will detect the malicious nod in nearly one second, with recovering the link between the functions of an attacked nodes and the network.References
Vemoori, Vamsi. "Comparative Assessment of Technological Advancements in Autonomous Vehicles, Electric Vehicles, and Hybrid Vehicles vis-à-vis Manual Vehicles: A Multi-Criteria Analysis Considering Environmental Sustainability, Economic Feasibility, and Regulatory Frameworks." Journal of Artificial Intelligence Research 1.1 (2021): 66-98.
Tatineni, Sumanth. "An Integrated Approach to Predictive Maintenance Using IoT and Machine Learning in Manufacturing." International Journal of Electrical Engineering and Technology (IJEET) 11.8 (2020).
S. A. Abdel Hakeem, H. H. Hussein, and H. W. Kim, "Security Requirements and Challenges of 6G Technologies and Applications," 2022. ncbi.nlm.nih.gov
A. Talpur and M. Gurusamy, "Machine Learning for Security in Vehicular Networks: A Comprehensive Survey," 2021. [PDF]
J. Xu, S. Hu, J. Yu, X. Liu et al., "Mixed Precision of Quantization of Transformer Language Models for Speech Recognition," 2021. [PDF]
A. Qayyum, M. Usama, J. Qadir, and A. Al-Fuqaha, "Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward," 2019. [PDF]
M. J. Kang and J. W. Kang, "Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security," 2016. ncbi.nlm.nih.gov
P. Meyer, T. Häckel, T. Lübeck, F. Korf et al., "A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks," 2024. [PDF]
K. Halba, C. Mahmoudi, and E. Griffor, "Robust Safety for Autonomous Vehicles through Reconfigurable Networking," 2018. [PDF]
M. Chowdhury, M. Islam, and Z. Khan, "Security of Connected and Automated Vehicles," 2020. [PDF]
M. B Jedh, J. Kai Lee, and L. ben Othmane, "Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles," 2022. [PDF]
T. H. H. Aldhyani and H. Alkahtani, "Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity," 2022. ncbi.nlm.nih.gov
M. Dibaei, X. Zheng, K. Jiang, S. Maric et al., "An Overview of Attacks and Defences on Intelligent Connected Vehicles," 2019. [PDF]
A. Molina-Markham, R. K. Winder, and A. Ridley, "Network Defense is Not a Game," 2021. [PDF]
M. N. Injadat, A. Moubayed, A. Bou Nassif, and A. Shami, "Machine Learning Towards Intelligent Systems: Applications, Challenges, and Opportunities," 2021. [PDF]
T. H. Luan, Y. Zhang, L. Cai, Y. Hui et al., "Autonomous Vehicular Networks: Perspective and Open Issues," 2021. [PDF]
V. Kumar Kukkala, S. Vignesh Thiruloga, and S. Pasricha, "Roadmap for Cybersecurity in Autonomous Vehicles," 2022. [PDF]
H. Peng, Q. Ye, and X. Shen, "SDN-Based Resource Management for Autonomous Vehicular Networks: A Multi-Access Edge Computing Approach," 2018. [PDF]
A. Di Maio, M. Rita Palattella, R. Soua, L. Lamorte et al., "Enabling SDN in VANETs: What is the Impact on Security?," 2016. ncbi.nlm.nih.gov
H. Baharlouei, A. Makanju, and N. Zincir-Heywood, "ADVENT: Attack/Anomaly Detection in VANETs," 2024. [PDF]
Y. Deng, T. Zhang, G. Lou, X. Zheng et al., "Deep Learning-Based Autonomous Driving Systems: A Survey of Attacks and Defenses," 2021. [PDF]