Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks

被引:0
|
作者
D. S. Bhupal Naik [1 ]
Venkatesulu Dondeti [1 ]
机构
[1] Vignan’s Foundation for Science,Computer Science and Engineering
[2] Technology and Research,undefined
关键词
VANETs; Trust; Security; Federated learning; Privacy; V2V; Attack; Trust management; Internal threats; Intelligent vehicular networks;
D O I
10.1007/s12083-024-01835-3
中图分类号
学科分类号
摘要
Vehicular Ad-hoc Networks (VANETs) are increasingly vulnerable to internal threats, such as Sybil attacks and insider malicious behaviors, which exploit the network from within. Existing security measures often fail to detect these sophisticated threats, leaving the network exposed to significant risks. This paper presents a novel trust-based secure Federated Learning (FL) framework specifically designed to address these internal threats. The proposed framework introduces several technical innovations such as a real-time behavioral consistency monitoring system that detects anomalies in node behavior over time, a trust score decay mechanism to prevent long-term exploitation by malicious nodes and a decentralized trust validation process that ensures robustness against Sybil attacks. By incorporating these trust evaluations, the federated learning model selectively aggregates learning updates, prioritizing those deemed reliable, thereby enhancing the overall robustness of the detection model. Extensive experimental simulations were conducted on various datasets, and four types of attacks were analyzed. The results demonstrate significant improvements in detection rates of internal attacks with minimal impact on network performance. The precision and accuracy of the proposed model are improved by 98.5% and 98.8%, respectively. The network throughput and attack detection rates improved significantly for internal threats over the existing models.
引用
下载
收藏
相关论文
共 50 条
  • [1] Trust-based Model for Securing Vehicular Networks Against RSU Attacks
    Alnasser, Aljawharah
    Sun, Hongjian
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [2] Trust-based Knowledge Sharing Among Federated Learning Servers in Vehicular Edge Computing
    Mazloomi, Fateme
    Heydari, Shahram Shah
    El-Khatib, Khalil
    PROCEEDINGS OF THE INT'L ACM SYMPOSIUM ON DESIGN AND ANALYSIS OF INTELLIGENT VEHICULAR NETWORKS AND APPLICATIONS, DIVANET 2023, 2023, : 9 - 15
  • [3] A Context-Aware Trust-Based Information Dissemination Framework for Vehicular Networks
    Rostamzadeh, Karim
    Nicanfar, Hasen
    Torabi, Narjes
    Gopalakrishnan, Sathish
    Leung, Victor C. M.
    IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (02): : 121 - 132
  • [4] Secure Federated Learning in Quantum Autonomous Vehicular Networks
    Xu, Qichao
    Zhao, Lifeng
    Su, Zhou
    Fang, Dongfeng
    Li, Ruidong
    IEEE NETWORK, 2023, 37 (06): : 240 - 247
  • [5] Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET
    Khan, Adnan Shahid
    Balan, Kuhanraj
    Javed, Yasir
    Tarmizi, Seleviawati
    Abdullah, Johari
    SENSORS, 2019, 19 (22)
  • [6] Trust-based federated learning for network anomaly detection
    Chen, Naiyue
    Jin, Yi
    Li, Yinglong
    Cai, Luxin
    WEB INTELLIGENCE, 2021, 19 (04) : 317 - 327
  • [7] Machine learning based trust management framework for vehicular networks
    El-Sayed, Hesham
    Ignatious, Henry Alexander
    Kulkarni, Parag
    Bouktif, Salah
    VEHICULAR COMMUNICATIONS, 2020, 25
  • [8] A Trust-Based Secure Hybrid Framework for Routing in WSN
    Saini, Komal
    Ahlawat, Priyanka
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 585 - 591
  • [9] Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik
    Seo, Sunho
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (06) : 1066 - 1069
  • [10] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6