Enhancing Secure Communication in IoT-Based Automated Vehicle Systems through Accurate Prediction of Abnormal Traffic Data

Enhancing Secure Communication in IoT-Based Automated Vehicle Systems through Accurate Prediction of Abnormal Traffic Data

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-3
Year of Publication : 2024
Author : Kesava Reddy Jangam, R. Kumudham, V. Rajendran, M. Ramkumar Prabhu
DOI : 10.14445/22315381/IJETT-V72I3P131

How to Cite?

Kesava Reddy Jangam, R. Kumudham, V. Rajendran, M. Ramkumar Prabhu, "Enhancing Secure Communication in IoT-Based Automated Vehicle Systems through Accurate Prediction of Abnormal Traffic Data," International Journal of Engineering Trends and Technology, vol. 72, no. 3, pp. 358-369, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I3P131

Abstract
Ensuring secure communication among Automated Vehicles (AV) on the Internet of Things (IoT) applications requires accurate prediction of abnormal traffic data. Information security within vehicles is crucial for transmitting trafficrelated information reliably and guiding vehicles along the correct path. Existing algorithms for classification and prediction have aimed to provide clear predictions of malicious data. However, traditional techniques have faced challenges in achieving both accuracy and computational efficiency. This study proposes a three-stage implementation to address these issues. The first phase involves pre-processing to reduce computational complexities. This initial step streamlines the data for further analysis. The processed data then undergoes feature selection in the second phase, employing a multi-GGA (Greedy Genetic Algorithm) approach to identify the most relevant features. By utilizing this algorithm, the system can detect significant information even in the presence of misleading data. Finally, the third phase involves classification using a combination of Random Forest (RF) and AdaBoost algorithms. This integrated approach enables the system to distinguish between normal and abnormal traffic data in vehicle-to-vehicle datasets. Through experimental evaluations and comparative analysis, the efficiency of the proposed system is demonstrated in terms of accuracy, precision, recall, and F1-score, outperforming several existing algorithms. Overall, this proposed prediction system shows great potential in effectively classifying misleading and normal data with high accuracy. Addressing the limitations of traditional techniques offers a reliable solution for secure communication and decision-making in AV systems.

Keywords
Autonomous Vehicle, Internet of Vehicle, MGGA, Hybrid RF, and Adaboost.

References
[1] Hui Yang et al., “BLCS: Brain-Like Distributed Control Security in Cyber-Physical Systems,” IEEE Network, vol. 34, no. 3, pp. 8-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Saraju P. Mohanty, “Advances in Transportation Cyber-Physical System (T-CPS),” IEEE Consumer Electronics Magazine, vol. 9, no. 4, pp. 4-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Shuang Jin et al., “Modeling and Stability Analysis of Mixed Traffic with Conventional and Connected Automated Vehicles from Cyber-Physical Perspective,” Physica A: Statistical Mechanics and its Applications, vol. 551, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Ao Li, Jinwen Wang, and Ning Zhang, “Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-Physical Systems,” Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2426-2428, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Jinbao Wang, Zhipeng Cai, and Jiguo Yu, “Achieving Personalized K-Anonymity-Based Content Privacy for Autonomous Vehicles in CPS,” IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4242-4251, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Hoang-Dung Tran et al., “Safety Verification of Cyber-Physical Systems with Reinforcement Learning Control,” ACM Transactions on Embedded Computing Systems, vol. 18, no. 55, pp. 1-22, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Yassine Maleh, Machine Learning Techniques for IoT Intrusions Detection in Aerospace Cyber-Physical Systems, Machine Learning and Data Mining in Aerospace Technology, vol. 836, pp. 205-232, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Franco Van Wyk et al., “Real-Time Sensor Anomaly Detection and Identification in Automated Vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 3, pp. 1264-1276, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Nelson H. Carreras Guzman, and Adam Gergo Mezovari, “Design of IoT-Based Cyber-Physical Systems: A Driverless Bulldozer Prototype,” Information, vol. 10, no. 11, pp. 1-15, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Khan Sakib Mahmud, “Connected and Automated Vehicles in Urban Transportation Cyber-Physical Systems,” Clemson University, pp. 1-141, 2019.
[Google Scholar] [Publisher Link]
[11] Bradley Potteiger, Zhenkai Zhang, and Xenofon Koutsoukos, “Integrated Moving Target Defense and Control Reconfiguration for Securing Cyber-Physical Systems,” Microprocessors and Microsystems, vol. 73, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Denise Ratasich et al., “A Roadmap toward the Resilient Internet of Things for Cyber-Physical Systems,” IEEE Access, vol. 7, pp. 13260-13283, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Sebastian Paul, and Patrik Scheible, “Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication,” 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, vol. 12309, pp. 295-316, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Johan Olstam et al., “An Approach for Handling Uncertainties Related to Behavior and Vehicle Mixes in Traffic Simulation Experiments with Automated Vehicles,” Journal of Advanced Transportation, vol. 2020, pp. 1-17, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Abdul Rehman Javed et al., “Ensemble AdaBoost Classifier for Accurate and Fast Detection of Botnet Attacks in Connected Vehicles,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 10, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Adi Alhudhaif et al., “A Particle Swarm Optimization Based Deep Learning Model for Vehicle Classification,” Computer Systems Science and Engineering, vol. 40, no. 1, pp. 223-235, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yee Mun Lee et al., “Road Users Rarely Use Explicit Communication When Interacting in Today’s Traffic: Implications for Automated Vehicles,” Cognition, Technology & Work, vol. 23, pp. 367-380, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Ying Liu et al., “CT2‐MDS: Cooperative Trust‐Aware Tolerant Misbehavior Detection System for Connected and Automated Vehicles,” IET Intelligent Transport Systems, vol. 16, no. 2, pp. 218-231, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Sina Nordhoff et al., “A Multi-Level Model on Automated Vehicle Acceptance (MAVA): A Review-Based Study,” Theoretical Issues in Ergonomics Science, vol. 20, no. 6, pp. 682-710, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Yiyang Wang, Neda Masoud, and Anahita Khojandi, “Real-Time Sensor Anomaly Detection and Recovery in Connected Automated Vehicle Sensors,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 3, pp. 1411-1421, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Manuel Dietrich, “Addressing Unequal Risk Exposure in the Development of Automated Vehicles,” Ethics and Information Technology, vol. 23, pp. 727-738, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Malik Mustafa et al., Multitask Learning for Security and Privacy in IoV (Internet of Vehicles), Chapter 12, Autonomous Vehicles Volume 1: Using Machine Intelligence, Wiley Online Library, vol. 1, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Wang Hao, Adam Asrul, and Han Fengrong, “Improving the Efficiency of Customer Requirements Classification on the Autonomous Vehicle by Natural Language Processing,” International Journal of Computing and Digital Systems, vol. 9, no. 6, pp. 1213-1219, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Xiaohua Ge et al., “Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks,” IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 1, pp. 31-46, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Muammer Eren Sahin, Lo’ai Tawalbeh, and Fadi Muheidat, “The Security Concerns on Cyber-Physical Systems and Potential Risks Analysis Using Machine Learning,” Procedia Computer Science, vol. 201, pp. 527-534, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] R.J. Kavitha et al., “Automated Vehicle Theft Prevention Using Atmega Embedded Systems,” International Journal of Research in Engineering, Science and Management, vol. 3, no. 5, pp. 901-904, 2020.
[Google Scholar] [Publisher Link]
[27] Prinkle Sharma, and Hong Liu, “A Machine-Learning-Based Data-Centric Misbehavior Detection Model for the Internet of Vehicles,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4991-4999, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Sana Aurangzeb et al., “CyberSecurity for Autonomous Vehicles against Malware Attacks in Smart-Cities,” Cluster Computing, pp. 1- 16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Lulu Guo et al., “Systematic Assessment of Cyber-Physical Security of Energy Management System for Connected and Automated Electric Vehicles,” IEEE Transactions on Industrial Informatics, vol. 17, no. 5, pp. 3335-3347, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Nelson H. Carreras Guzman et al., “Conceptualizing the Key Features of Cyber‐Physical Systems in a Multi‐Layered Representation for Safety and Security Analysis,” The Journal of the International Council on System Engineering, vol. 23, no. 25, pp. 189-210, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Muhammad Zohaib Anwar, Zeeshan Kaleem, and Abbas Jamalipour, “Machine Learning Inspired Sound-Based Amateur Drone Detection for Public Safety Applications,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2526-2534, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Rajesh Gupta et al., “Machine Learning Models for Secure Data Analytics: A Taxonomy and Threat Model,” Computer Communications, vol. 153, pp. 406-440, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Xiaokang Zhou et al., “Two-Layer Federated Learning with Heterogeneous Model Aggregation for 6g Supported Internet of Vehicles,” IEEE Transactions on Vehicular Technology, vol. 70, no. 6, pp. 5308-5317, 2021.
[CrossRef] [Google Scholar] [Publisher Link]