scispace - formally typeset
Journal ArticleDOI

An intrusion detection system for connected vehicles in smart cities

TLDR
This work introduces an automated secure continuous cloud service availability framework for smart connected vehicles that enables an intrusion detection mechanism against security attacks and provides services that meet users’ quality of service (QoS) and quality of experience (QoE) requirements.
Abstract
In the very near future, transportation will go through a transitional period that will shape the industry beyond recognition. Smart vehicles have played a significant role in the advancement of intelligent and connected transportation systems. Continuous vehicular cloud service availability in smart cities is becoming a crucial subscriber necessity which requires improvement in the vehicular service management architecture. Moreover, as smart cities continue to deploy diversified technologies to achieve assorted and high-performance cloud services, security issues with regards to communicating entities which share personal requester information still prevails. To mitigate these concerns, we introduce an automated secure continuous cloud service availability framework for smart connected vehicles that enables an intrusion detection mechanism against security attacks and provides services that meet users’ quality of service (QoS) and quality of experience (QoE) requirements. Continuous service availability is achieved by clustering smart vehicles into service-specific clusters. Cluster heads are selected for communication purposes with trusted third-party entities (TTPs) acting as mediators between service requesters and providers. The most optimal services are then delivered from the selected service providers to the requesters. Furthermore, intrusion detection is accomplished through a three-phase data traffic analysis, reduction, and classification technique used to identify positive trusted service requests against false requests that may occur during intrusion attacks. The solution adopts deep belief and decision tree machine learning mechanisms used for data reduction and classification purposes, respectively. The framework is validated through simulations to demonstrate the effectiveness of the solution in terms of intrusion attack detection. The proposed solution achieved an overall accuracy of 99.43% with 99.92% detection rate and 0.96% false positive and false negative rate of 1.53%.

read more

Citations
More filters
Journal ArticleDOI

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

TL;DR: A survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study to evaluate the efficiency of several methods are presented.
Journal ArticleDOI

Applications of Artificial Intelligence and Machine learning in smart cities

TL;DR: The role of artificial intelligence (AI), machine learning (ML), and deep reinforcement learning (DRL) in the evolution of smart cities is explored and various research challenges and future research directions where the aforementioned techniques can play an outstanding role to realize the concept of a smart city are presented.
Journal ArticleDOI

Blockchain Technology in Healthcare: A Comprehensive Review and Directions for Future Research

TL;DR: This survey provides a comprehensive review of emerging blockchain-based healthcare technologies and related applications and shows the potential of blockchain technology in revolutionizing healthcare industry.
Journal ArticleDOI

A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities

TL;DR: A survey of the theoretical and practical challenges and opportunities of CPSs in smart cities are enumerated not only in terms of their technical aspects, but also in Terms of policy and governance issues of concern.
References
More filters
Journal ArticleDOI

A fast learning algorithm for deep belief nets

TL;DR: A fast, greedy algorithm is derived that can learn deep, directed belief networks one layer at a time, provided the top two layers form an undirected associative memory.
Journal ArticleDOI

Training products of experts by minimizing contrastive divergence

TL;DR: A product of experts (PoE) is an interesting candidate for a perceptual system in which rapid inference is vital and generation is unnecessary because it is hard even to approximate the derivatives of the renormalization term in the combination rule.
Proceedings ArticleDOI

A detailed analysis of the KDD CUP 99 data set

TL;DR: A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.
Journal ArticleDOI

Particle filters for positioning, navigation, and tracking

TL;DR: The technique of map matching is used to match an aircraft's elevation profile to a digital elevation map and a car's horizontal driven path to a street map and it is shown that the accuracy is comparable with satellite navigation but with higher integrity.
Journal ArticleDOI

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

TL;DR: The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/ DM for cyber security is presented, and some recommendations on when to use a given method are provided.
Related Papers (5)