Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things

Author:

Razaque Abdul1,Bektemyssova Gulnara2,Yoo Joon1ORCID,Alotaibi Aziz3ORCID,Ali Mohsin2ORCID,Amsaad Fathi4ORCID,Amanzholova Saule5,Alshammari Majid6ORCID

Affiliation:

1. School of Computing, Gachon University, Seongnam-si 13120, Republic of Korea

2. Department of Computer Engineering, International Information Technology University, Almaty 050000, Kazakhstan

3. Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia

4. Computer Science Department, Wright State University, Fairborn, OH 45435, USA

5. Department of Cybersecurity, International Information Technology University, Almaty 050000, Kazakhstan

6. Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia

Abstract

Deep learning algorithms have a wide range of applications, including cancer diagnosis, face and speech recognition, object recognition, etc. It is critical to protect these models since any changes to them can result in serious losses in a variety of ways. This article proposes the consortium blockchain-enabled conventional neural network (CBCNN), a four-layered paradigm for detecting malicious vehicles. Layer-1 is a convolutional neural network-enabled Internet-of-Things (IoT) model for the vehicle; Layer-2 is a spatial pyramid polling layer for the vehicle; Layer-3 is a fully connected layer for the vehicle; and Layer-4 is a consortium blockchain for the vehicle. The first three layers accurately identify the vehicles, while the final layer prevents any malicious attempts. The primary goal of the four-layered paradigm is to successfully identify malicious vehicles and mitigate the potential risks they pose using multi-label classification. Furthermore, the proposed CBCNN approach is employed to ensure tamper-proof protection against a parameter manipulation attack. The consortium blockchain employs a proof-of-luck mechanism, allowing vehicles to save energy while delivering accurate information about the vehicle’s nature to the “vehicle management system.” C++ coding is employed to implement the approach, and the ns-3.34 platform is used for simulation. The ns3-ai module is specifically utilized to detect anomalies in the Internet of Vehicles (IoVs). Finally, a comparative analysis is conducted between the proposed CBCNN approach and state-of-the-art methods. The results confirm that the proposed CBCNN approach outperforms competing methods in terms of malicious label detection, average accuracy, loss ratio, and cost reduction.

Funder

Korean government

Deanship of Scientific Research

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3