97 research outputs found
A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable Low Latency Communications (URLLC) to CAVs. However, while communication performance has been enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers have become more strategic. Public Key Infrastructure (PKI) proposed by standardization bodies cannot solely defend against these attacks. Thus, in complementary of that, sophisticated systems should be designed to detect such attacks and attackers. Machine Learning (ML) has recently emerged as a key enabler to secure future roads. Various V2X Misbehavior Detection Systems (MDSs) have adopted this paradigm. However, analyzing these systems is a research gap, and developing effective ML-based MDSs is still an open issue. To this end, this paper comprehensively surveys and classifies ML-based MDSs as well as discusses and analyses them from security and ML perspectives. It also provides some learned lessons and recommendations for guiding the development, validation, and deployment of ML-based MDSs. Finally, this paper highlighted open research and standardization issues with some future directions
Recommended from our members
Mitigate denial of service attacks in mobile ad-hoc networks
Wireless networks are proven to be more acceptable by users compared with wired networks for many reasons, namely the ease of setup, reduction in running cost, and ease of use in different situations such as disasters recovery. A Mobile ad-hoc network (MANET) is as an example of wireless networks. MANET consists of a group of hosts called nodes which can communicate freely via wireless links. MANET is a dynamic topology, self-configured, non-fixed infrastructure, and does not have any central administration that controls all nodes among the network. Every device, used in day-to-day living, is assumed to be a network device, and it is managed using Internet Protocols (IP). Information on every electronic device is collected using infrared sensors, voice or video sensors, Radio-Frequency Identification (RFID), etc. The new wireless networks and communications paradigm known as Internet of Things (IoT) is introduced which refers to the range of multiple interconnected devices which communicate and exchange data between one another. MANET becomes prone to many attacks mainly due to its specifications and challenges such as limited bandwidth, nodes mobility and limited energy. This research study focuses specifically on detecting Denial of Service attack (DoS) in MANET. The main purpose of DoS attack is to deprive legitimate users from using their authenticated services such as network resources. Thus, the network performance would degrade and exhaust the network resources such as computing power and bandwidth considerably which lead the network to be deteriorated. Therefore, this research aims to detect DoS attacks in both Single MANET (SM) and Multi MANETs (MM). A novel Monitoring, Detection, and Rehabilitation (MrDR) method is proposed in order to detect DoS attack in MANET. The proposed method is incorporating trust concept between nodes. Trust value is calculated in each node to decide whether the node is trusted or not. To address the problem when two or more MANETs merge to become one big MANET, the novel technique of Merging Using MrDR (MUMrDR) is also applied to detect DoS attack. As the mobility of nodes in MANET, the chance of MANETs merge or partition occurs. Both centralised and decentralised trust concepts are used to deal with IP address conflict and the merging process is completed by applying the MUMrDR method to detect DoS attacks in MM. The simulation results validate the effectiveness in the proposed method to detect different DoS attacks in both SM and MM
Evolutionary Computation
This book presents several recent advances on Evolutionary Computation, specially evolution-based optimization methods and hybrid algorithms for several applications, from optimization and learning to pattern recognition and bioinformatics. This book also presents new algorithms based on several analogies and metafores, where one of them is based on philosophy, specifically on the philosophy of praxis and dialectics. In this book it is also presented interesting applications on bioinformatics, specially the use of particle swarms to discover gene expression patterns in DNA microarrays. Therefore, this book features representative work on the field of evolutionary computation and applied sciences. The intended audience is graduate, undergraduate, researchers, and anyone who wishes to become familiar with the latest research work on this field
Nerd Ecology: Defending the Earth with Unpopular Culture
This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Drawing on a wide range of examples from literature, comics, film, television and digital media, Nerd Ecology is the first substantial ecocritical study of nerd culture’s engagement with environmental issues. Exploring such works as Star Trek, Tolkien’s Lord of the Rings, The Matrix, Joss Whedon’s Buffy the Vampire Slayer and Firefly, the fiction of Thomas Pynchon, The Hunger Games, and superhero comics such as Green Lantern and X-Men, Anthony Lioi maps out the development of nerd culture and its intersections with the most fundamental ecocritical themes. In this way Lioi finds in the narratives of unpopular culture - narratives in which marginalised individuals and communities unite to save the planet - the building blocks of a new environmental politics in tune with the concerns of contemporary ecocritical theory and practice
The Translocal Event and the Polyrhythmic Diagram
This thesis identifies and analyses the key creative protocols in translocal performance practice, and ends with suggestions for new forms of transversal live and mediated
performance practice, informed by theory. It argues that ontologies of emergence in dynamic systems nourish contemporary practice in the digital arts. Feedback
in self-organised, recursive systems and organisms elicit change, and change transforms. The arguments trace concepts from chaos and complexity theory to virtual multiplicity, relationality, intuition and individuation (in the work of Bergson, Deleuze, Guattari, Simondon, Massumi, and other process theorists). It then examines the intersection of methodologies in philosophy, science and art and the
radical contingencies implicit in the technicity of real-time, collaborative composition. Simultaneous forces or tendencies such as perception/memory, content/
expression and instinct/intellect produce composites (experience, meaning, and intuition- respectively) that affect the sensation of interplay. The translocal
event is itself a diagram - an interstice between the forces of the local and the global, between the tendencies of the individual and the collective. The translocal is
a point of reference for exploring the distribution of affect, parameters of control and emergent aesthetics. Translocal interplay, enabled by digital technologies and network protocols, is ontogenetic and autopoietic; diagrammatic and synaesthetic; intuitive and transductive. KeyWorx is a software application developed for realtime, distributed, multimodal media processing. As a technological tool created by artists, KeyWorx supports this intuitive type of creative experience: a real-time, translocal “jamming” that transduces the lived experience of a “biogram,” a synaesthetic hinge-dimension. The emerging aesthetics are processual – intuitive, diagrammatic and transversal
Forging Wargamers
How do we establish or improve wargaming education, including sponsors, participants, and future designers? The question stems from the uncomfortable truth that the wargaming discipline has no foundational pipeline, no established pathway from novice to master. Consequently, the wargaming community stands at a dangerous precipice at the convergence of a stagnant labor force and a patchwork system of passing institutional war-gaming knowledge. Unsurprisingly, this can lead to ill-informed sponsors, poorly scoped wargames, an unreliable standard of wargaming expertise, and worst of all, risks the decline of wargaming as an educational and analytical tool. This fundamental challenge is a recurring theme throughout this volume and each author offers their own perspective and series of recommendations
- …