On-Demand Security Framework for 5GB Vehicular Networks

被引:6
|
作者
Boualouache A. [1 ]
Brik B. [2 ]
Senouci S.-M. [2 ]
Engel T. [1 ]
机构
[1] University of Luxembourg, Luxembourg
[2] University of Bourgogne, France
来源
IEEE Internet of Things Magazine | 2023年 / 6卷 / 02期
关键词
Compendex;
D O I
10.1109/IOTM.001.2200233
中图分类号
学科分类号
摘要
Building accurate Machine Learning (ML) attack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model's security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trusted interactions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an efficient consensus algorithm with an intelligent incentive mechanism to select the best FL workers that deliver highly accurate local ML models. Our experiments demonstrate that the framework achieves higher accuracy on a well-known vehicular dataset with a lower blockchain consensus time than related solutions. Specifically, our framework enhances the accuracy by 14 percent and decreases the consensus time, at least by 50 percent, compared to related works. Finally, this article discusses the framework's key challenges and potential solutions. © 2018 IEEE.
引用
收藏
页码:26 / 31
页数:5
相关论文
共 50 条
  • [21] A 5Gb/s Adaptive Equalizer Using Filter Switching
    Tomioka, Tsutomu
    Fujita, Takahiro
    Sasaki, Kozue
    Sato, Hiroki
    Hyogo, Akira
    Sekine, Keitaro
    2008 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2008), VOLS 1-4, 2008, : 688 - 691
  • [22] A Survey: Security and Privacy in 5G Vehicular Networks
    Saglam, Ezgi Tetik
    Bahtiyar, Serif
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 108 - 112
  • [23] On-Demand Security Architecture for Cloud Computing
    Chen, Jianyong
    Wang, Yang
    Wang, Xiaomin
    COMPUTER, 2012, 45 (07) : 73 - 78
  • [24] A Security Service on-demand Architecture in SDN
    Chou, Li-Der
    Tseng, Chia-Wei
    Huang, Yu-Ki
    Chen, Kuo-Chung
    Ou, Tsung-Fu
    Yen, Chia-Kuan
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 287 - 291
  • [25] Provable security of on-demand distance vector routing in wireless ad hoc networks
    Acs, G
    Buttyán, L
    Vajda, I
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 113 - 127
  • [26] On-demand Misbehavior Detection for Vehicular Ad Hoc Network
    Ho, Yao-Hua
    Lin, Chun-Han
    Chen, Ling-Jyh
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (10):
  • [27] A Novel Architecture and Mechanism for On-demand Services in Vehicular Networks with Minimum Overhead in Target Vehicle Tracking
    Rayeni, Mehdi Sharifi
    Hafid, Abdelhakim Senhaji
    Sahu, Pratap Kumar
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [28] On-demand security configuration for IoT devices
    Chung, Boheung
    Kim, Jeongyeo
    Jeon, Youngsung
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1082 - 1084
  • [29] 5G On-Demand SI Acquisition Framework and Performance Evaluation
    Yang, Wei-Yu
    Lin, Kuang-Hsun
    Wei, Hung-Yu
    IEEE ACCESS, 2019, 7 : 163245 - 163261
  • [30] Security Games for Vehicular Networks
    Alpcan, Tansu
    Buchegger, Sonja
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) : 280 - 290