Loading…

Ambient Intelligence for Securing Intelligent Vehicular Networks: Edge-Enabled Intrusion and Anomaly Detection Strategies

The Internet of Things (IoT) is increasingly being deployed in smart city applications such as vehicular networks. The presence of a large number of communicating vehicles greatly increases the number and types of possible anomalies in the network. These anomalies could range from faulty vehicular d...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things magazine 2023-03, Vol.6 (1), p.128-132
Main Authors: Alladi, Tejasvi, Agrawal, Ayush, Gera, Bhavya, Chamola, Vinay, Yu, F. Richard
Format: Magazinearticle
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The Internet of Things (IoT) is increasingly being deployed in smart city applications such as vehicular networks. The presence of a large number of communicating vehicles greatly increases the number and types of possible anomalies in the network. These anomalies could range from faulty vehicular data being broadcast by the vehicles to more catastrophic attacks such as disruptive attacks and Denial of Service (DoS) attacks to name a few. This calls for a need to develop robust security schemes such as intrusion detection and anomaly detection schemes. With a humongous growth in the amount of vehicular traffic data expected, artificial intelligence (AI)-based detection strategies need to be developed to address this burgeoning demand. In this article, we propose three AI-based intrusion detection strategies for vehicular network applications, leading to an effective Ambient Intelligence based vehicular network paradigm. The detection tasks are run on local edge servers deployed at the network edge. By showing the prediction results on an experimental testbed emulating the edge servers, we show the feasibility of deploying the proposed strategies in the vehicular network scenario.
ISSN:2576-3180
2576-3199
DOI:10.1109/IOTM.001.2200197