Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things
Abstract
:1. Introduction
1.1. Paper Contribution
- ▪
- The layer-based paradigm is used to correctly detect and limit the malicious vehicle. This paradigm incorporates a CNN-enabled Internet of Things (IoT) model, geographic pyramid pooling, fixed-layer, and consortium blockchain technology. The primary objective is to achieve accurate application of the “malicious” label while enhancing accuracy and reducing the loss ratio.
- ▪
- The CBCNN technique is employed to ensure tamper-proof protection against a parameter manipulation attack. Additionally, hostile vehicles are tracked and identified using multiple labels to prevent unauthorized entry.
- ▪
- The consortium blockchain implements a proof-of-luck mechanism, enabling vehicles to conserve energy while providing correct information about the nature of the vehicle to the “vehicle management system”.
- ▪
- The proposed CBCNN method is prototyped and experimentally assessed to illustrate its practicability and feasibility in real-time malicious vehicle detection scenarios.
1.2. Remaining Structure of Article
2. Related Works
3. System Model
4. Problem Formulation for Cost Reduction Using Multi-Labels
5. Proposed Malicious Vehicle Detection Process Using Layer-Based Paradigm
- ▪
- Multi-label classification for vehicles.
- ▪
- CNN-enabled IoT layer modeling for vehicles
- ▪
- Spatial pyramid polling layer modeling for vehicles
- ▪
- Fully connected layer modeling
- ▪
- Consortium blockchain technology modeling for vehicles
- ▪
- Multi-label modeling for vehicles
5.1. CNN-Enabled IoT Layer Modeling for Vehicle
5.2. Spatial Pyramid Polling Layer Modeling for Vehicle
Algorithm 1: Spatial pyramid polling modeling for vehicle |
|
5.3. Fully Connected Layer Modeling for Vehicle
5.4. Consortium Blockchain Technology Modeling for Vehicle
Algorithm 2: Malicious vehicle detection process using multi-labels based on consortium blockchain |
|
- ▪
- If the feature detection component is not kept alongside multi-labels, the likelihood of detecting incorrect vehicles is increased, and the hypothesis is rejected.
- ▪
- If the threshold value set for the behavior of the data is negative or higher than one, then the hypothesis can be rejected.
- ▪
- The features of the malicious blocks are set as null values in the feature detection component, and the hypothesis is rejected.
- ▪
- The likelihood that the procedure of assigning the multi-labels to a vehicle would result in a type I error (rejecting the null hypothesis when it is actually true).
5.5. Multi-Labels Modeling for Vehicles
6. Experimental Results
- ▪
- Malicious vehicle detection.
- ▪
- Average accuracy.
- ▪
- Multi-label Loss.
- ▪
- Cost/KWh reduction in energy consumption.
6.1. Datasets
6.2. Malicious Vehical Detection
6.3. Average Accuracy
6.4. Multi-Label Loss
6.5. Cost/KWh Reduction in Energy Consumption
7. Discussion of Result
8. Conclusions and Future Works
8.1. Conclusions
8.2. Future Works
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Noussaiba, M.; Razaque, A.; Rahal, R. Heterogeneous Algorithm for Efficient-Path Detection and Congestion Avoidance for a Vehicular-Management System. Sensors 2023, 23, 5471. [Google Scholar] [CrossRef] [PubMed]
- Wang, X.; Zhu, Z. Context understanding in computer vision: A survey. Comput. Vis. Image Underst. 2023, 229, 103646. [Google Scholar] [CrossRef]
- Razaque, A.; Frej, M.B.H.; Bektemyssova, G.; Almi’ani, M.; Amsaad, F.; Alotaibi, A.; Jhanjhi, N.Z.; Ali, M.; Amanzholova, S.; Alshammari, M. Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning. Electronics 2023, 12, 1129. [Google Scholar] [CrossRef]
- Li, Z.; Xu, M.; Yang, X.; Han, Y.; Wang, J. A Multi-Label Detection Deep Learning Model with Attention-Guided Image Enhancement for Retinal Images. Micromachines 2023, 14, 705. [Google Scholar] [CrossRef]
- Nicolás-Sáenz, L.; Ledezma, A.; Pascau, J.; Muñoz-Barrutia, A. ABANICCO: A New Color Space for Multi-Label Pixel Classification and Color Analysis. Sensors 2023, 23, 3338. [Google Scholar] [CrossRef]
- Rashed, B.M.; Popescu, N. Performance Investigation for Medical Image Evaluation and Diagnosis Using Machine-Learning and Deep-Learning Techniques. Computation 2023, 11, 63. [Google Scholar] [CrossRef]
- Shi, Q.; Li, L.; Feng, J.; Chen, W.; Yu, J. Automated Model Hardening with Reinforcement Learning for On-Orbit Object Detectors with Convolutional Neural Networks. Aerospace 2023, 10, 88. [Google Scholar] [CrossRef]
- Razaque, A.; Frej, M.B.H.; Almi’ani, M.; Alotaibi, M.; Alotaibi, B. Improved support vector machine enabled radial basis function and linear variants for remote sensing image classification. Sensors 2021, 21, 4431. [Google Scholar] [CrossRef]
- Tu, Z.; Liu, B.; Zhao, W.; Yan, R.; Zou, Y. A Feature Fusion Model with Data Augmentation for Speech Emotion Recognition. Appl. Sci. 2023, 13, 4124. [Google Scholar] [CrossRef]
- Andriyanov, N. The Use of Correlation Features in the Problem of Speech Recognition. Algorithms 2023, 16, 90. [Google Scholar] [CrossRef]
- Almiani, M.; AbuGhazleh, A.; Al-Rahayfeh, A.; Atiewi, S.; Razaque, A. Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 2020, 101, 102031. [Google Scholar] [CrossRef]
- Almiani, M.; AbuGhazleh, A.; Jararweh, Y.; Razaque, A. DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network. Int. J. Mach. Learn. Cybern. 2021, 12, 3337–3349. [Google Scholar] [CrossRef]
- Al-Qubaydhi, N.; Alenezi, A.; Alanazi, T.; Senyor, A.; Alanezi, N.; Alotaibi, B.; Alotaibi, M.; Razaque, A.; Abdelhamid, A.A.; Alotaibi, A. Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning. Electronics 2022, 11, 2669. [Google Scholar] [CrossRef]
- Razaque, A.; Nazerke, S.; Bandar, A.; Munif, A.; Akhmetov, M.; Aziz, A. Big data handling approach for unauthorized cloud computing access. Electronics 2022, 11, 137. [Google Scholar] [CrossRef]
- Alfaro, R.; Allende-Cid, H.; Allende, H. Multilabel Text Classification with Label-Dependent Representation. Appl. Sci. 2023, 13, 3594. [Google Scholar] [CrossRef]
- Deeb, A.; Ibrahim, A.; Salem, M.; Pichler, J.; Tkachov, S.; Karaj, A.; Al Machot, F.; Kyandoghere, K. A Robust Automated Analog Circuits Classification Involving a Graph Neural Network and a Novel Data Augmentation Strategy. Sensors 2023, 23, 2989. [Google Scholar] [CrossRef]
- Mo, L.; Zhu, Y.; Zeng, L. A Multi-Label Based Physical Activity Recognition via Cascade Classifier. Sensors 2023, 23, 2593. [Google Scholar] [CrossRef]
- Cui, H.; Li, J.; Hua, Z.; Fan, L. TPET: Two-stage Perceptual Enhancement Transformer Network for Low-light Image Enhancement. Eng. Appl. Artif. Intell. 2022, 116, 105411. [Google Scholar] [CrossRef]
- Wang, G.; Chen, H.; Chen, L.; Zhuang, Y.; Zhang, S.; Zhang, T.; Dong, H.; Gao, P. P 2FEViT: Plug-and-Play CNN Feature Embedded Hybrid Vision Transformer for Remote Sensing Image Classification. Remote Sens. 2023, 15, 1773. [Google Scholar] [CrossRef]
- Ferrario, A.; Loi, M.; Viganò, E. In AI we trust incrementally: A multi-layer model of trust to analyze human-artificial intelligence interactions. Philos. Technol. 2020, 33, 523–539. [Google Scholar] [CrossRef] [Green Version]
- Shikha, D.; Olimov, F.; Rafique, M.A.; Kim, J.; Jeon, M. Label-attention transformer with geometrically coherent objects for image captioning. Inf. Sci. 2023, 623, 812–831. [Google Scholar]
- Kim, T.; Pak, W. Deep Learning-Based Network Intrusion Detection Using Multiple Image Transformers. Appl. Sci. 2023, 13, 2754. [Google Scholar] [CrossRef]
- Ali, E.S.; Hasan, M.K.; Hassan, R.; Saeed, R.A.; Hassan, M.B.; Islam, S.; Nafi, N.S.; Bevinakoppa, S. Machine learning technologies for secure vehicular communication in internet of vehicles: Recent advances and applications. Secur. Commun. Netw. 2021, 2021, 1–23. [Google Scholar] [CrossRef]
- Din, N.U.; Zhang, L.; Yang, Y. Automated Battery Making Fault Classification Using Over-Sampled Image Data CNN Features. Sensors 2023, 23, 1927. [Google Scholar] [CrossRef] [PubMed]
- Liu, X.; Xie, L.; Wang, Y.; Zou, J.; Xiong, J.; Ying, Z.; Vasilakos, A.V. Vasilakos. Privacy and security issues in deep learning: A survey. IEEE Access 2020, 9, 4566–4593. [Google Scholar] [CrossRef]
- Agarwal, U.; Rishiwal, V.; Tanwar, S.; Chaudhary, R.; Sharma, G.; Bokoro, P.N.; Sharma, R. Blockchain technology for secure supply chain management: A comprehensive review. IEEE Access 2022, 10, 85493–85517. [Google Scholar] [CrossRef]
- Razaque, A.; Alotaibi, B.; Alotaibi, M.; Hussain, S.; Alotaibi, A.; Jotsov, V. Clickbait detection using deep recurrent neural network. Appl. Sci. 2022, 12, 504. [Google Scholar] [CrossRef]
- Qian, S.; Ning, H.; He, Y.; Chen, M. Multi-Label Vulnerability Detection of Smart Contracts Based on Bi-LSTM and Attention Mechanism. Electronics 2022, 11, 3260. [Google Scholar] [CrossRef]
- Duan, Y.; Chen, N.; Zhang, P.; Kumar, N.; Chang, L.; Wen, W. MS2GAH: Multi-label semantic supervised graph attention hashing for robust cross-modal retrieval. Pattern Recognit. 2022, 128, 108676. [Google Scholar] [CrossRef]
- Bader, L.; Pennekamp, J.; Matzutt, R.; Hedderich, D.; Kowalski, M.; Lücken, V.; Wehrle, K. Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability. Inf. Process. Manag. 2021, 58, 102529. [Google Scholar] [CrossRef]
- Nasir, I.M.; Khan, M.A.; Armghan, A.; Javed, M.Y. SCNN: A Secure Convolutional Neural Network using Blockchain. In Proceedings of the 2020 2nd International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 13–15 October 2020. [Google Scholar] [CrossRef]
- Liu, H.; Huang, H.; Zhou, Y.; Chen, Q. Improvement of blockchain-based multi-layer location data sharing scheme for Internet of Things. Comput. Commun. 2023, 201, 131–142. [Google Scholar] [CrossRef]
- Jiang, S.; Cao, J.; Wu, H.; Chen, K.; Liu, X. Privacy-preserving and Efficient Data Sharing for Blockchain-based Intelligent Transportation Systems. Inf. Sci. 2023, 635, 72–85. [Google Scholar] [CrossRef]
- Zhang, Z.; Liu, Q.; Huang, Z.; Wang, H.; Lee, C.K.; Chen, E. Model inversion attacks against graph neural networks. IEEE Trans. Knowl. Data Eng. 2022, 1–13. [Google Scholar] [CrossRef]
- Kumar, R.; Wang, W.; Kumar, J.; Yang, T.; Khan, A.; Ali, W.; Ali, I. An integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals. Comput. Med. Imaging Graph. 2021, 87, 101812. [Google Scholar] [CrossRef] [PubMed]
- Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Netw. 2022, in press. [CrossRef]
- Chen, B.; Wang, Z.; Xiang, T.; Yang, J.; He, D.; Choo KK, R. BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh. Commun. 2023, 41, 100602. [Google Scholar] [CrossRef]
- Wang, Y.; He, D.; Li, F.; Long, X.; Zhou, Z.; Ma, J.; Wen, S. Multi-label classification with label graph superimposing. Proc. AAAI Conf. Artif. Intell. 2020, 34, 12265–12272. [Google Scholar] [CrossRef]
- Available online: https://github.com/tkn-tub/ns3-gym (accessed on 15 March 2023).
- Razaque, A.; Elleithy, K.M. Energy-efficient boarder node medium access control protocol for wireless sensor networks. Sensors. 2014, 14, 5074–5117. [Google Scholar] [CrossRef] [Green Version]
- Geiger, A.; Lenz, P.; Urtasun, R. Are we ready for autonomous driving? the kitti vision benchmark suite. In Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012; IEEE: New York, NY, USA; pp. 3354–3361. [Google Scholar]
- Wang, Q.; Li, X.; Lu, M. An Improved Traffic Sign Detection and Recognition Deep Model Based on YOLOv5. IEEE Access 2023, 11, 54679–54691. [Google Scholar] [CrossRef]
Works | Blockchain-Enabled Methods | Features | Vulnerabilities |
---|---|---|---|
Nasir et al. [31] | A blockchain-enabled convolutional neural network model for potential attacks | The blockchain is introduced to protect a convolutional neural network model from potential attacks | Restricted only to the CNN model and lacks accuracy |
Hongyan et al. [32] | A multi-layer location sharing system based on blockchain for single point of failure | The suggested technique is also applicable in dynamic situations. An accumulator is used to enhance the scheme’s effectiveness in data refreshing and verification. Furthermore, the efficacy of the scheme is assessed using a formal security study based on Real-Or-Random | Failed to obtain efficiency |
Shan et al. [33] | The blockchain model is analyzed in depth for vehicle detection | Employed blockchain technology to ensure security and preserve data | Limited only to smart contracts and their implementation |
Zhang et al. [34] | Blockchain is employed in artificial intelligence to secure data sharing and automatically train the models | A blockchain is used to secure data exchange and autonomously train models. To enhance the security and reliability of facial datasets, blockchain technology is used in conjunction with VGGFace deep neural networks. | Focused only on data tampering |
Kumar et al. [35] | Integration of blockchain technology and AI-deep neural network model for secure data sharing | The blockchain network stores and exchanges the trained model to disseminate information about new cancer patients. Updates about new cases of new patients are addressed using a decentralized blockchain, which tracks all types of patients’ histories. | An invalid data sample can jeopardize the classification accuracy of a model as it increases the time required for model training. It consumes more execution time as the deep learning models always require a large amount of resources such as computing power to train the model |
Wang et al. [36] | Privacy-preserving federated learning system for ciphertext-level | Proposed privacy-preserving federated learning system which utilizes blockchain as the fundamental technology to secure data. It also provides model aggregation and model filtering. The Multi-Krum technology is enhanced and coupled with homomorphic encryption | Unable to achieve verifiability |
Chen et al. [37] | A privacy-preserving cross-domain authentication system for VANETs | A secure blockchain-based privacy-preserving cross-domain verification solution for VANETs is proposed. The proposed method blends group signature with blockchain technology. The group signature approach is used to allow cross-domain vehicle verification | The group signature technique does not provide enough privacy. So, it limits the privacy protection |
Our Solution | Layered-based paradigm for malicious vehicle detection | The CBCNN is employed to detect and restrict malicious vehicles to accomplish accurate malicious label identification while enhancing accuracy and decreasing loss ratio. | Limited to specific scenarios of vehicle detection |
Name of Parameters | Description |
---|---|
Simulator | ns-3.34 |
Number of maximum multi-labels | 18,000 |
Transmission Range | 45 m |
Initial energy of the IoT device attached with vehicle | 4 J |
Size of vehicular network | 1200 1200 m2 |
pause time | 10 s |
Simulation time | 50 min |
Data frame | 256 bytes |
Data Packet size | 512 bytes |
MAC protocol | BN-MAC |
Tested algorithm | CBCNN |
Mobility Model | Manhattan mobility model |
Contending methods | SCNN, PPCDA and MCLGS |
Mobility | 0.1–15 m/s |
HARD Disk free space | 500 MB |
RAM | 2048 MB |
Operating system | Windows 10 |
Processor | Intel(R) Core 2 Duo |
Methods | Malicious Label Detection (Max: 4500 Labels) | Malicious Label Detection (Max: 9000 Labels) | Average Accuracy (Max: 9000 Labels) | Average Accuracy (Max: 18,000 Labels) | Loss Ratio (Max: 9000 Labels) | Loss Ratio (Max: 18,000 Labels) |
---|---|---|---|---|---|---|
MCLGS | 115 | 222 | 93.78% | 93.38% | 4.69% | 6.52% |
SCNN | 128 | 258 | 95.19% | 94.41% | 3.49% | 6.32% |
PPCDA | 146 | 284 | 96.36% | 95.96% | 1.89% | 4.04% |
Proposed CBCNN | 200 | 370 | 99.84% | 99.39% | 0.32% | 0.68% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Razaque, A.; Bektemyssova, G.; Yoo, J.; Alotaibi, A.; Ali, M.; Amsaad, F.; Amanzholova, S.; Alshammari, M. Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors 2023, 23, 6554. https://doi.org/10.3390/s23146554
Razaque A, Bektemyssova G, Yoo J, Alotaibi A, Ali M, Amsaad F, Amanzholova S, Alshammari M. Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors. 2023; 23(14):6554. https://doi.org/10.3390/s23146554
Chicago/Turabian StyleRazaque, Abdul, Gulnara Bektemyssova, Joon Yoo, Aziz Alotaibi, Mohsin Ali, Fathi Amsaad, Saule Amanzholova, and Majid Alshammari. 2023. "Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things" Sensors 23, no. 14: 6554. https://doi.org/10.3390/s23146554
APA StyleRazaque, A., Bektemyssova, G., Yoo, J., Alotaibi, A., Ali, M., Amsaad, F., Amanzholova, S., & Alshammari, M. (2023). Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors, 23(14), 6554. https://doi.org/10.3390/s23146554