Optimized Convolutional Neural Network Based Privacy Based Collaborative Intrusion Detection System for Vehicular Ad Hoc Network

International Journal of Electrical and Electronics Engineering
© 2023 by SSRG - IJEEE Journal
Volume 10 Issue 2
Year of Publication : 2023
Authors : M. Azath, Vaishali Singh
pdf
How to Cite?

M. Azath, Vaishali Singh, "Optimized Convolutional Neural Network Based Privacy Based Collaborative Intrusion Detection System for Vehicular Ad Hoc Network," SSRG International Journal of Electrical and Electronics Engineering, vol. 10,  no. 2, pp. 143-156, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I2P114

Abstract:

The Vehicular Adhoc Network (VANET) secures the communication of vehicles during information generation and transfer. Even though the lack of trust and privacy in this network questions the reliability of information exchange, to overcome this problem, we are designing a blockchain-based VANET framework to establish secure information exchange via blockchain technology and offer improved scalability, confidentiality, and privacy. This study uses an Improved K-Harmonics Mean Clustering (IKHMC) model for cluster formation in VANET. After that, a novel Hybrid Capuchin-based Rat Swarm Optimization (HCRSO) algorithm is used to select the cluster heads, which primarily aims to provide efficient energy utilization, throughput and delay minimization. We use the blockchain as a reliable and highly secure technology, and trust-based collaborative intrusion detection in the VANET model is performed using an optimized (Seagull Optimization) Convolutional Neural Network (CNN). Finally, the three intrusion classes, namely Distributed Daniel of Service (DDoS), Blackmailing and Sybil attacks with non-intrusion class, are classified. The blockchain-based collaborative intrusion detection model solves security issues and motivates (rewarding) vehicles to collaborate, and avoids repetitive detection processes. The experimental results show that the proposed methodology is efficient to be applied in resource-constrained vehicles and also shows bigger improvements in terms of malicious node detection, overhead, end-to-end delay, and energy utilization.

Keywords:

Blockchain, Security, Convolutional Neural Network, Ad-hoc, Vector routing protocol.

References:

[1] Mustafa Maad Hamdi et al., “A Review of Applications, Characteristics and Challenges in Vehicular Ad Hoc Networks (VANETs),” International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1-7, 2020. Crossref, https://doi.org/10.1109/HORA49412.2020.9152928
[2] Zheng Chen et al., “An Adaptive on-Demand Multipath Routing Protocol with QoS Support for High-Speed MANET,” IEEE Access, vol. 8, pp. 44760-44773, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2978582
[3] Ahmed Muhi Shantaf, Sefer Kurnaz, and Alaa Hamid Mohammed et al., “Performance Evaluation of Three Mobile Ad-Hoc Network Routing Protocols in Different Environments,” International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1-6, 2020. Crossref, https://doi.org/10.1109/HORA49412.2020.9152845
[4] R. Santhana Krishnan et al., “Modified Zone Based Intrusion Detection System for Security Enhancement in Mobile Ad Hoc Networks,” Wireless Networks, vol. 26, no. 2, pp.1275-1289, 2020. Crossref, https://doi.org/10.1007/s11276-019- 02151-y
[5] Chao Lin et al., “BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 12, pp.7408-7420, 2020. Crossref, https://doi.org/10.1109/TITS.2020.3002096
[6] Sarah Iqbal et al., “Blockchain-Based Reputation Management for Task Offloading in Micro-Level Vehicular Fog Network,” IEEE Access, vol. 8, pp. 52968-52980, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2979248
[7] Bin Cao et al., “A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain,” IEEE Network, vol. 34, no. 5, pp.78-83. 2020. Crossref, https://doi.org/10.1109/MNET.011.1900536
[8] Zhuo Ma et al., “An Efficient Decentralized Key Management Mechanism for VANET with Blockchain,” IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp.5836-5849, 2020. Crossref, https://doi.org/10.1109/TVT.2020.2972923
[9] Hui Li et al., “FADB: A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain,” IEEE Access, vol. 8, pp. 85190-85203, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2992203
[10] Shirshak Raja Maskey et al., “ALICIA: Applied Intelligence in Blockchain Based VANET: Accident Validation as a Case Study,” Information Processing & Management, vol. 58, no. 3, pp.102508, 2021. Crossref, https://doi.org/10.1016/j.ipm.2021.102508
[11] Sowmya Kudva et al., “Towards Secure and Practical Consensus for Blockchain Based VANET,” Information Sciences, vol. 545, pp. 170-187, 2021. Crossref, https://doi.org/10.1016/j.ins.2020.07.060
[12] Jianfeng Ma et al., “Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain,” IEEE Internet of Things Journal, vol. 8, no. 13, pp.10873-10883, 2021. Crossref, https://doi.org/10.1109/JIOT.2021.3050802
[13] Su Buda et al., “Empowering Blockchain in Vehicular Environments with Decentralized Edges,” IEEE Access, vol. 8, pp. 202032-202041, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3036399
[14] Shi-Jinn Horng, Cheng-Chung Lu, and Wanlei Zhou, “An Identity-Based and Revocable Data-Sharing Scheme in VANETs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp.15933-15946, 2020. Crossref, https://doi.org/10.1109/TVT.2020.3037804
[15] Geetanjali Rathee et al., “Trusted Computation Using ABM and PBM decision models for ITS,” IEEE Access, vol. 8, pp. 195788-195798, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3033883
[16] Yaroslav Meshcheryakov et al., “On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications with Constrained Devices,” IEEE Access, vol. 9, pp. 80559-80570, 2021. Crossref, https://doi.org/10.1109/ACCESS.2021.3085405
[17] Hasan Thabit Rashid, and Israa Hadi Ali, "Traffic Violations Detection Review based on Intelligent Surveillance Systems," International Journal of Computer and Organization Trends, vol. 11, no. 4, pp. 1-9, 2021. Crossref, https://doi.org/10.14445/22492593/IJCOT-V11I4P301
[18] Nitha C. Velayudhan, A. Anitha, and Mukesh Madanan, “Sybil Attack Detection and Secure Data Transmission in VANET Using CMEHA-DNN and MD5-ECC,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 1297–1309, 2023. Crossref, https://doi.org/10.1007/s12652-021-03379-3
[19] Malik Braik, Alaa Sheta, and Heba Al-Hiary, “A Novel Meta-Heuristic Search Algorithm for Solving Optimization Problems: Capuchin Search Algorithm,” Neural Computing and Applications, vol. 33, no. 7, pp.2515-2547. Crossref, https://doi.org/10.1007/s00521-020-05145-6
[20] Gaurav Dhiman et al., “A Novel Algorithm for Global Optimization: Rat Swarm Optimizer,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 8, pp.8457-8482. Crossref, https://doi.org/10.1007/s12652-020- 02580-0
[21] Xia Feng, and Jin Tang, “Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in Vanets,” Mobile Information Systems, 2017. Crossref, https://doi.org/10.1155/2017/4682538
[22] Zhaojun Lu et al., “A Blockchain-Based Privacy-Preserving Authentication Scheme for Vanets,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 27, no. 12, pp.2792-2801, 2019. Crossref, https://doi.org/10.1109/TVLSI.2019.2929420
[23] R Vinayakumar, K P Soman, and Prabaharan Poornachandran “Applying Convolutional Neural Network for Network Intrusion Detection,” International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1222-1228, 2017. Crossref, https://doi.org/10.1109/ICACCI.2017.8126009
[24] Kulkarni Sagar S., and Kahate Sandip A., "Review of a Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Dis-Contiguous System Call Patterns," SSRG International Journal of Computer Science and Engineering , vol. 2, No. 6, pp. 9-12, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I6P109
[25] Xiu Kan et al., “A Novel IoT Network Intrusion Detection Approach Based on Adaptive Particle Swarm Optimization Convolutional Neural Network,” Information Sciences, vol. 568, no. 5, pp.147-162, 2021. Crossref, https://doi.org/10.1016/j.ins.2021.03.060
[26] S.Navya Sai, and K.Kishoreraju, "Improved Privacy Preserving Decision Tree Approach for Network Intrusion Detection,” International Journal of Computer & Organization Trends, vol. 6, no. 1, pp. 55-60, 2016. Crossref, https://doi.org/10.10.14445/22492593/IJCOT-V30P301
[27] Basant Subba, Santosh Biswas, and Sushanta Karmakar, "A Game Theory Based Multi Layered Intrusion Detection Framework for VANET," Future Generation Computer Systems, vol. 82, pp. 12-28, 2018. Crossref, https://doi.org/10.1016/j.future.2017.12.008
[28] Sunil M. Sangve, Reena Bhati, and Vidhya N. Gavali, “Intrusion Detection System for Detecting Rogue Nodes in Vehicular Ad-Hoc Network,” International Conference on Data Management, Analytics and Innovation (ICDMAI), pp. 127-131, 2017. Crossref, https://doi.org/10.1109/ICDMAI.2017.8073497
[29] Shivam Kumar Chauhan, Abhishek Sharma, and Avinash Kaur, "Animal Intrusion Detection and Prevention System," International Journal of Computer and Organization Trends, vol. 11, no. 2, pp. 25-28, 2021. Crossref, https://doi.org/10.14445/22492593/IJCOT-V11I2P308
[30] Hind Bangui, and Barbora Buhnova, "Recent Advances in Machine-Learning Driven Intrusion Detection in Transportation: Survey, " Procedia Computer Science, vol. 184, pp. 877-886, 2021. Crossref, https://doi.org/10.1016/j.procs.2021.04.014
[31] Wenjuan Li et al., “Challenge-Based Collaborative Intrusion Detection in Software-Defined Networking: An Evaluation,” Digital Communications and Networks, vol. 7, no. 2, pp. 257-263, 2021. Crossref, https://doi.org/10.1016/j.dcan.2020.09.003
[32] Mohammad Dawood Momand, Vikas Thada, and Utpal Shrivastava, "Intrusion Detection System in IoT Network," SSRG International Journal of Computer Science and Engineering , vol. 7, no. 4, pp. 11-15, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I4P104
[33] Meysam Azizian, Soumaya Cherkaoui, and Abdelhakim Senhaji Hafid, “DCEV: A Distributed Cluster Formation for VANET Based on End-to-End Realtive Mobility,” International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 287-291, 2016. Crossref, https://doi.org/10.1109/IWCMC.2016.7577072
[34] Gaurav Dhiman, and Vijaya Kumar, “Seagull Optimization Algorithm: Theory and Its Applications for Large-Scale Industrial Engineering Problems,” Knowledge-Based Systems, vol. 165, pp.169-196, 2019. Crossref, https://doi.org/10.1016/j.knosys.2018.11.024