scispace - formally typeset
Journal ArticleDOI

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection

TLDR
A vehicular-edge computing (VEC) fog-enabled scheme allowing offloading intrusion detection tasks to federated vehicle nodes located within nearby formed ad hoc vehicular fog to be cooperatively executed with minimal latency is proposed.
Abstract
Internet of Vehicles and vehicular networks have been compelling targets for malicious security attacks where several intrusion detection solutions have been proposed for protecting them. Nonetheless, their main problem lies in their heavy computation, which makes them unsuitable for next-generation artificial intelligence-powered self-driving vehicles whose computational power needs to be primarily reserved for real-time driving decisions. To address this challenge, several approaches have been lately presented to take advantage of the cloud computing for offloading intrusion detection tasks to central cloud servers, thus reducing storage and processing costs on vehicles. However, centralized cloud computing entails high latency on intrusion detection related data transmission and plays against its adoption in delay-critical intelligent applications. In this context, this article proposes a vehicular-edge computing (VEC) fog-enabled scheme allowing offloading intrusion detection tasks to federated vehicle nodes located within nearby formed ad hoc vehicular fog to be cooperatively executed with minimal latency. The problem has been formulated as a multiobjective optimization model and solved using a genetic algorithm maximizing offloading survivability in the presence of high mobility and minimizing computation execution time and energy consumption. Experiments performed on resource-constrained devices within actual ad hoc fog environment illustrate that our solution significantly reduces the execution time of the detection process while maximizing the offloading survivability under different real-life scenarios.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond

TL;DR: In this article, a survey of federated learning (FL) topics and research fields is presented, including core system models and designs, application areas, privacy and security, and resource management.
Journal ArticleDOI

Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach

TL;DR: Wang et al. as mentioned in this paper proposed a deep learning-based intrusion detection algorithm based on the generative adversarial network (GAN), which can provide computing, storage, and network connection resources for remote devices.
Journal ArticleDOI

On Demand Fog Federations for Horizontal Federated Learning in IoV

TL;DR: A horizontal-based federated learning architecture, empowered by fog federations, devised for the mobile environment is proposed and results show that the proposed model can achieve better accuracy and quality of service than other models presented in the literature.
Journal ArticleDOI

On Demand Fog Federations for Horizontal Federated Learning in IoV

TL;DR: In this article , a horizontal-based federated learning architecture, empowered by fog federations, is devised for the mobile environment, where fog computing providers form stable fog federators using a Hedonic game-theoretical model to expand their geographical footprints.
Journal ArticleDOI

Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment

TL;DR: This is the first study to present an Effective Seeker Optimization model in conjunction with a Machine Learning-Enabled Intrusion Detection System (ESOML-IDS) model for the FC and EC environments, which designs a new ESO-based feature selection (FS) approach to choose an optimal subset of features to identify the occurrence of intrusions.
References
More filters
Journal ArticleDOI

A fast and elitist multiobjective genetic algorithm: NSGA-II

TL;DR: This paper suggests a non-dominated sorting-based MOEA, called NSGA-II (Non-dominated Sorting Genetic Algorithm II), which alleviates all of the above three difficulties, and modify the definition of dominance in order to solve constrained multi-objective problems efficiently.
Proceedings ArticleDOI

Accurate online power estimation and automatic battery behavior based power model generation for smartphones

TL;DR: PowerBooter is an automated power model construction technique that uses built-in battery voltage sensors and knowledge of battery discharge behavior to monitor power consumption while explicitly controlling the power management and activity states of individual components.
Journal ArticleDOI

Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges

TL;DR: The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration.
Journal ArticleDOI

Deep Learning for IoT Big Data and Streaming Analytics: A Survey

TL;DR: In this article, the authors provide a thorough overview on using a class of advanced machine learning techniques, namely deep learning (DL), to facilitate the analytics and learning in the IoT domain.
Journal ArticleDOI

Mobile-Edge Computing for Vehicular Networks: A Promising Network Paradigm with Predictive Off-Loading

TL;DR: A cloud-based mobileedge computing (MEC) off-loading framework in vehicular networks is proposed, where the tasks are adaptively off-loaded to the MEC servers through direct uploading or predictive relay transmissions, which greatly reduces the cost of computation and improves task transmission efficiency.
Related Papers (5)