47 research outputs found

    Security of 5G-V2X: Technologies, Standardization and Research Directions

    Full text link
    Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, but it fails to handle the demands of high throughput, ultra-high reliability, and ultra-low latency alongside its security mechanisms. To counter this, 5G-V2X is considered as an integral solution, which not only resolves the issues related to LTE-V2X but also provides a function-based network setup. Several reports have been given for the security of 5G, but none of them primarily focuses on the security of 5G-V2X. This article provides a detailed overview of 5G-V2X with a security-based comparison to LTE-V2X. A novel Security Reflex Function (SRF)-based architecture is proposed and several research challenges are presented related to the security of 5G-V2X. Furthermore, the article lays out requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary for 5G-V2X.Comment: 9 pages, 6 figures, Preprin

    Federated Reinforcement Learning-Supported IDS for IoT-steered Healthcare Systems

    Get PDF
    Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to numerous kinds of intrusions. With the growth of cyber intruders, the risks on crucial applications monitored by networked systems have also grown. Effective and vigorous Intrusion Detection Systems (IDSs) for protecting shared information continues to be an essential task to keep private data safe especially in the healthcare sphere. Constructing an IDS that detects and returns information efficiently and with the highest accuracy is a challenging task. Machine Learning (ML) techniques have been effectively adopted in IDSs to detect network intruders. Reinforcement learning is considered as one of the main developments in ML. IDS mainly performs a higher accuracy rate, detection rate as well as a higher performance of a classification (ROC curve). According to these and to tackle the security issues, a Federated Reinforcement Learning-based Intrusion Detection System (FRL-IDS) in the Internet of Things (IoT) networks for healthcare infrastructures has been proposed. The proposed model has been evaluated and compared to a similar model (i.e. SVM system). The proposed model shows superiority over the SVM-steered IDS with accuracy and detection rates of ≈ 0.985 and ≈ 96.5%, respectively. This proposed infrastructure will not only aid in intrusion detection of large health care systems but also other wireless decentralized networks found across multiple real-world applications

    On the Feasibility of Split Learning, Transfer Learning and Federated Learning for Preserving Security in ITS Systems

    Get PDF
    Due to the absence of distinct boundaries, wireless networks are vulnerable to a variety of intrusions. As the number of intruders has increased, the risks on critical infrastructures monitored by networked systems have also increased. Protecting shared information using effective and robust Intrusion Detection Systems (IDSs) remains a critical issue, especially with the growing implementation of vehicular networks. Building an IDS that detects threats efficiently with maximum accuracy and detection is a challenging undertaking. Machine Learning (ML) mechanisms have been successfully adopted in IDSs to detect a variety of network intruders. Split learning is considered one of the main developments in creating efficient ML approaches. In utilizing the Split Learning approach, an IDS is successful in performing at higher accuracy, and detection rate as well as a higher classification performance (Precision, Recall). In this work, a Split Learning-based IDS (SplitLearn) for Intelligent Transportation System (ITS) infrastructures has been proposed to address the potential security concerns. The proposed model has been evaluated and compared against other models (i.e., Federated Learning (FedLearn) and Transfer Learning (TransLearn)-based solutions). With the highest accuracy and detection rates, the proposed model (SplitLearn) outperforms FedLearn and TransLearn by 2 to 5 % respectively. We also see a decrease in power consumption when utilizing SplitLearn versus FedLearn

    An energy scaled and expanded vector-based forwarding scheme for industrial underwater acoustic sensor networks with sink mobility

    Get PDF
    Industrial Underwater Acoustic Sensor Networks (IUASNs) come with intrinsic challenges like long propagation delay, small bandwidth, large energy consumption, three-dimensional deployment, and high deployment and battery replacement cost. Any routing strategy proposed for IUASN must take into account these constraints. The vector based forwarding schemes in literature forward data packets to sink using holding time and location information of the sender, forwarder, and sink nodes. Holding time suppresses data broadcasts; however, it fails to keep energy and delay fairness in the network. To achieve this, we propose an Energy Scaled and Expanded Vector-Based Forwarding (ESEVBF) scheme. ESEVBF uses the residual energy of the node to scale and vector pipeline distance ratio to expand the holding time. Resulting scaled and expanded holding time of all forwarding nodes has a significant difference to avoid multiple forwarding, which reduces energy consumption and energy balancing in the network. If a node has a minimum holding time among its neighbors, it shrinks the holding time and quickly forwards the data packets upstream. The performance of ESEVBF is analyzed through in network scenario with and without node mobility to ensure its effectiveness. Simulation results show that ESEVBF has low energy consumption, reduces forwarded data copies, and less end-to-end delay

    Wireless Powering Internet of Things with UAVs: Challenges and Opportunities

    Full text link
    Unmanned aerial vehicles (UAVs) have the potential to overcome the deployment constraint of Internet of Things (IoT) in remote or rural area. Wirelessly powered communications (WPC) can address the battery limitation of IoT devices through transferring wireless power to IoT devices. The integration of UAVs and WPC, namely UAV-enabled Wireless Powering IoT (Ue-WPIoT) can greatly extend the IoT applications from cities to remote or rural areas. In this article, we present a state-of-the-art overview of Ue-WPIoT by first illustrating the working flow of Ue-WPIoT and discussing the challenges. We then introduce the enabling technologies in realizing Ue-WPIoT. Simulation results validate the effectiveness of the enabling technologies in Ue-WPIoT. We finally outline the future directions and open issues.Comment: 7 pages, 4 figure

    Synthesizing an Agent-Based Heterogeneous Population Model for Epidemic Surveillance

    Get PDF
    In this paper we propose a probabilistic approach to synthesize an agent-based heterogeneous population interaction model to study the spatio-temporal dynamics of an air-born epidemic, such as influenza, in a metropolitan area. The methodology is generic in nature and can generate a baseline population for cities for which detailed population summary tables are not available. The joint probabilities of population demographics are estimated using the International Public Use Microsimulation Data (IPUMS) sample data set. Agents, are assigned various activities based on several characteristics. The agent-based model for the city of Lahore, Pakistan is synthesized and a rule based disease spread model of influenza is simulated. The simulation results are visualized to analyze the spatio-temporal dynamics of the epidemic. The results show that the proposed model can be used by officials and medical experts to simulate an outbreak
    corecore