Hybrid PLS-ML Authentication Scheme for V2I Communication Networks
- URL: http://arxiv.org/abs/2308.14693v1
- Date: Mon, 28 Aug 2023 16:34:50 GMT
- Title: Hybrid PLS-ML Authentication Scheme for V2I Communication Networks
- Authors: Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari
- Abstract summary: We propose a novel hybrid physical layer security (PLS)-machine learning (ML) authentication scheme by exploiting the position of the transmitter vehicle as a device fingerprint.
We use a time-of-arrival (ToA) based localization mechanism where the ToA is estimated at roadside units (RSUs), and the coordinates of the transmitter vehicle are extracted at the base station (BS).
To track the mobility of the moving legitimate vehicle, we use ML model trained on several system parameters. We observe that our proposed position-based mechanism outperforms the baseline scheme significantly in terms of missed detections.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Vehicular communication networks are rapidly emerging as vehicles become
smarter. However, these networks are increasingly susceptible to various
attacks. The situation is exacerbated by the rise in automated vehicles
complicates, emphasizing the need for security and authentication measures to
ensure safe and effective traffic management. In this paper, we propose a novel
hybrid physical layer security (PLS)-machine learning (ML) authentication
scheme by exploiting the position of the transmitter vehicle as a device
fingerprint. We use a time-of-arrival (ToA) based localization mechanism where
the ToA is estimated at roadside units (RSUs), and the coordinates of the
transmitter vehicle are extracted at the base station (BS).Furthermore, to
track the mobility of the moving legitimate vehicle, we use ML model trained on
several system parameters. We try two ML models for this purpose, i.e., support
vector regression and decision tree. To evaluate our scheme, we conduct binary
hypothesis testing on the estimated positions with the help of the ground
truths provided by the ML model, which classifies the transmitter node as
legitimate or malicious. Moreover, we consider the probability of false alarm
and the probability of missed detection as performance metrics resulting from
the binary hypothesis testing, and mean absolute error (MAE), mean square error
(MSE), and coefficient of determination $\text{R}^2$ to further evaluate the ML
models. We also compare our scheme with a baseline scheme that exploits the
angle of arrival at RSUs for authentication. We observe that our proposed
position-based mechanism outperforms the baseline scheme significantly in terms
of missed detections.
Related papers
- A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks [0.4077787659104315]
We present an assessment framework that allows for reproducible, comparable, and rapid evaluation of anomaly detection algorithms.
We evaluate exemplary detection mechanisms and reveal how the detection performance is influenced by different combinations of TSN traffic flows and anomaly types.
arXiv Detail & Related papers (2024-05-02T14:29:42Z) - MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network [9.305680247704542]
Control Area Network (CAN) is an essential communication protocol that interacts between Electronic Control Units (ECUs) in the vehicular network.
CAN is facing stringent security challenges due to innate security risks.
We propose a self-supervised multi-knowledge fused anomaly detection model, called MKF-ADS.
arXiv Detail & Related papers (2024-03-07T07:40:53Z) - Exploring Highly Quantised Neural Networks for Intrusion Detection in
Automotive CAN [13.581341206178525]
Machine learning-based intrusion detection models have been shown to successfully detect multiple targeted attack vectors.
In this paper, we present a case for custom-quantised literature (CQMLP) as a multi-class classification model.
We show that the 2-bit CQMLP model, when integrated as the IDS, can detect malicious attack messages with a very high accuracy of 99.9%.
arXiv Detail & Related papers (2024-01-19T21:11:02Z) - DARTH: Holistic Test-time Adaptation for Multiple Object Tracking [87.72019733473562]
Multiple object tracking (MOT) is a fundamental component of perception systems for autonomous driving.
Despite the urge of safety in driving systems, no solution to the MOT adaptation problem to domain shift in test-time conditions has ever been proposed.
We introduce DARTH, a holistic test-time adaptation framework for MOT.
arXiv Detail & Related papers (2023-10-03T10:10:42Z) - Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review [51.31851488650698]
Machine learning (ML) sees an increasing prevalence of being used in the internet-of-things (IoT)-based smart grid.
adversarial distortion injected into the power signal will greatly affect the system's normal control and operation.
It is imperative to conduct vulnerability assessment for MLsgAPPs applied in the context of safety-critical power systems.
arXiv Detail & Related papers (2023-08-30T03:29:26Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Extensible Machine Learning for Encrypted Network Traffic Application
Labeling via Uncertainty Quantification [0.0]
We present a new, public dataset of network traffic that includes labeled, Virtual Private Network (VPN)-encrypted network traffic generated by 10 applications and corresponding to 5 application categories.
We also present an ML framework that is designed to rapidly train with modest data requirements and provide both calibrated, predictive probabilities as well as an interpretable out-of-distribution'' (OOD) score to flag novel traffic samples.
arXiv Detail & Related papers (2022-05-11T16:54:37Z) - AI-aided Traffic Control Scheme for M2M Communications in the Internet
of Vehicles [61.21359293642559]
The dynamics of traffic and the heterogeneous requirements of different IoV applications are not considered in most existing studies.
We consider a hybrid traffic control scheme and use proximal policy optimization (PPO) method to tackle it.
arXiv Detail & Related papers (2022-03-05T10:54:05Z) - AVTPnet: Convolutional Autoencoder for AVTP anomaly detection in
Automotive Ethernet Networks [2.415997479508991]
In this paper, we propose a convolutional autoencoder (CAE) for offline detection of anomalies on the Audio Video Transport Protocol (AVTP)
Our proposed approach is evaluated on the recently published " Automotive Ethernet Intrusion dataset"
arXiv Detail & Related papers (2022-01-31T19:13:20Z) - A Driving Behavior Recognition Model with Bi-LSTM and Multi-Scale CNN [59.57221522897815]
We propose a neural network model based on trajectories information for driving behavior recognition.
We evaluate the proposed model on the public BLVD dataset, achieving a satisfying performance.
arXiv Detail & Related papers (2021-03-01T06:47:29Z) - Probing Model Signal-Awareness via Prediction-Preserving Input
Minimization [67.62847721118142]
We evaluate models' ability to capture the correct vulnerability signals to produce their predictions.
We measure the signal awareness of models using a new metric we propose- Signal-aware Recall (SAR)
The results show a sharp drop in the model's Recall from the high 90s to sub-60s with the new metric.
arXiv Detail & Related papers (2020-11-25T20:05:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.