Sensor and Decision Fusion-Based Intrusion Detection and Mitigation Approach for Connected Autonomous Vehicles

被引:2
|
作者
Moradi, Milad [1 ]
Kordestani, Mojtaba [1 ]
Jalali, Mahsa [1 ]
Rezamand, Milad [1 ]
Mousavi, Mehdi [1 ]
Chaibakhsh, Ali [2 ]
Saif, Mehrdad [1 ]
机构
[1] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[2] Univ Guilan, Fac Mech Engn, Rasht 4199613769, Iran
基金
加拿大自然科学与工程研究理事会;
关键词
Sensors; Intrusion detection; Long short term memory; Sensor systems; Security; Feature extraction; Sensor fusion; Controller area network (CAN); information fusion; intrusion detection; resilient system; Yager's rule; IN-VEHICLE; ANOMALY DETECTION; NETWORK; SYSTEM;
D O I
10.1109/JSEN.2024.3397966
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The safety of connected and autonomous vehicle (CAV) depends on the security of in-vehicle communication. The controller area network (CAN) bus holds a crucial position in ensuring in-vehicle security. Injecting attacks (e.g., increasing the speed) by hackers can affect drivers. This article proposes a fusion intrusion detection and resilient approach to maintain system performance against intrusion. The proposed system consists of two parts: sensor validation and sensor value estimation. In the sensor validation step, a new fusion approach uses three feature ranking approaches, autoencoder, and estimator-based detectors. Finally, Yager's rules are used to handle conflict between classifiers and enrich intrusion detection accuracy. Afterward, in the second part, if any intrusion is detected, the estimated values of that sensor which is under intrusion will be replaced based on estimated values by long short-term memory-based deep regressor (LSTMDR) to avoid any performance disruption of the system. The main contribution of this study is that the proposed fusion approach uses the inherent redundancy among heterogeneous sensors to create a resilient system against compromised sensors. Using Yager's rule and the ordered weighted average for information fusion significantly increases the reliability of intrusion detection systems and improves their detection rates. It also improves the performance of soft sensors and enhances the effectiveness of the mitigation phase. To evaluate the proposed approach, a real-world dataset entitled AEGIS-advanced big data value chain for public safety and personal security-is used. Test results indicate that the proposed fusion method is robust and reaches more accurate results compared with other detectors in three different considered attacks including replay, denial of service, and false data injection.
引用
收藏
页码:20908 / 20919
页数:12
相关论文
共 50 条
  • [21] VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles
    Guo, Pinyao
    Kim, Hunmin
    Guan, Le
    Zhu, Minghui
    Liu, Peng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 377 - 396
  • [22] Improving Radar-Camera Fusion-based 3D Object Detection for Autonomous Vehicles
    Kurniawan, Irfan Tito
    Trilaksono, Bambang Riyanto
    2022 12TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET 2022), 2022, : 42 - 47
  • [23] Sensor Fusion-Based Line Detection for Unmanned Navigation
    Chun, Changmook
    Suh, SeungBeum
    Roh, Chi-won
    Kang, Yeonsik
    Kang, Sungchul
    Lee, Jung-yup
    Han, Chang-soo
    2010 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2010, : 191 - 196
  • [24] Towards data fusion-based big data analytics for intrusion detection
    Jemili, Farah
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2023, 7 (04) : 409 - 436
  • [25] Explainable Artificial Intelligence (XAI) for Intrusion Detection and Mitigation in Intelligent Connected Vehicles: A Review
    Nwakanma, Cosmas Ifeanyi
    Ahakonye, Love Allen Chijioke
    Njoku, Judith Nkechinyere
    Odirichukwu, Jacinta Chioma
    Okolie, Stanley Adiele
    Uzondu, Chinebuli
    Nweke, Christiana Chidimma Ndubuisi
    Kim, Dong-Seong
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [26] MULTICRITERIA DECISION MAKING APPROACH TO SUPPORT ADOPTION OF CONNECTED AND AUTONOMOUS VEHICLES
    Farrag, Siham
    Sahli, Nabil
    Yasar, Ansar
    Janssens, Davy
    COMPUTING AND INFORMATICS, 2022, 41 (02) : 503 - 526
  • [27] Cybersecurity of Connected Autonomous Vehicles A ranking based approach
    Burzio, Gianfranco
    Cordella, Giuseppe Faranda
    Colajanni, Michele
    Marchetti, Mirco
    Stabili, Dario
    2018 INTERNATIONAL CONFERENCE OF ELECTRICAL AND ELECTRONIC TECHNOLOGIES FOR AUTOMOTIVE, 2018,
  • [28] Object Detection in Adverse Weather for Autonomous Vehicles Based on Sensor Fusion and Incremental Learning
    Su, Huiping
    Gao, Hongbo
    Wang, Xinmiao
    Fang, Xiaozhao
    Liu, Qingchao
    Huang, Guang-Bin
    Li, Xin
    Cao, Qi
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2024, 73
  • [29] Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles
    Aloraini, Fatimah
    Javed, Amir
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 714 - 719
  • [30] Adversarial Attacks on Intrusion Detection Systems in In-Vehicle Networks of Connected and Autonomous Vehicles
    Aloraini, Fatimah
    Javed, Amir
    Rana, Omer
    SENSORS, 2024, 24 (12)