Non-Intrusive Security Assessment Methods for Future Autonomous Transportation IoV

被引:0
|
作者
Fang, Kai [1 ,2 ]
Wang, Tingting [2 ]
Tong, Lianghuai [3 ]
Fang, Xiaofen [2 ]
Pan, Yuanyuan [2 ]
Wang, Wei [4 ,5 ]
Li, Jianqing [2 ]
机构
[1] Zhejiang Agr & Forestry Univ, Sch Math & Comp Sci, Hangzhou 311300, Peoples R China
[2] Macau Univ Sci & Technol, Sch Comp Sci & Engn, Macau 999078, Peoples R China
[3] Quzhou Acad Metrol & Qual Inspect, Quzhou 324000, Peoples R China
[4] Shenzhen MSU BIT Univ, Dept Engn, Shenzhen 518172, Peoples R China
[5] Beijing Inst Technol, Sch Med Technol, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Vehicles; secutity assessment; fingerprint; regression model; efficiency enhancement; DECISION TREE; INTERNET; FINGERPRINT; PARAMETERS; THINGS; ATTACK; 5G;
D O I
10.1109/TASE.2023.3316224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Internet of Vehicles (IoV) has always been a concern. The constantly changing IoV data under varying traffic conditions made it unsuitable for the IoV to adopt traditional anti-attack techniques. In the absence of protections, attackers can use in-car communication as a target to compromise the safety of passengers, hence the instancy to detect the security state of the IoV. However, currently available solutions require modifications to the original hardware of the IoV and are therefore very limited in applicability. In this paper, we propose a security assessment method for IoV based on Microcontroller Unit (MCU) chip temperature, called SAMCT. Specifically, we first record the MCU chip temperatures of IoV device in different security states and analyze the relationship between them. Second, the fingerprint dataset is built using the temperature residuals. Third, to forecast the security standing of IoV devices, an integration regression model based on Self-Encoders is suggested. Lastly, in order to facilitate the effectiveness of the SAMCT, a Cloud-Edge-End framework is designed with the technology of model adaptive partitioning. Results from the experiments, which were carried out on the Raspberry Pi 4B and Stm32 hardware platforms, demonstrate that the Mean Squared Error (MSE) of the SAMCT is only 0.00104 and that the execution efficiency improvement under the Cloud-Edge-End framework is significant. Note to Practitioners-This paper was inspired by security concerns in Internet of Vehicles communication systems. The core of this work is to provide a novel security assessment method for IoV devices based on MCU temperature, which can detect the security status of IoV devices in real-time without modifying the original hardware. To this end, the different skills from scheme design to detection and validation are explained. One crucial part of this work is to regard the MCU temperature of the IoV device as a security reference and fully integrate the critical techniques in deep learning. In addition, the proposed scheme is universal and can be applied to various scenarios such as the autonomous driving and the industrial internet of things.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [1] A Study on Early & Non-Intrusive Security Assessment for Container Images
    Ul Haque, Mubin
    Babar, Muhammad Ali
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 640 - 647
  • [2] AN ASSESSMENT OF NON-INTRUSIVE PROBABILISTIC METHODS FOR TURBOMACHINERY PROBLEMS
    Shankaran, Sriram
    Barr, Brian
    Mallina, Ramakrishna
    Avancha, Ravikanth
    Stein, Alex
    PROCEEDINGS OF THE ASME TURBO EXPO 2010: TURBOMACHINERY: AXIAL FLOW FAN AND COMPRESSOR AERODYNAMICS DESIGN METHODS, AND CFD MODELING FOR TURBOMACHINERY, VOL 7, PTS A-C, 2010, : 797 - 806
  • [3] NON-INTRUSIVE SPEECH INTELLIGIBILITY ASSESSMENT
    Sharma, Dushyant
    Naylor, Patrick A.
    Brookes, Mike
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [4] Situation Assessment for Non-Intrusive Recommendation
    Akermi, Imen
    Faiz, Rim
    2018 12TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2018,
  • [5] Thresholding methods in non-intrusive load monitoring
    Daniel Precioso
    David Gómez-Ullate
    The Journal of Supercomputing, 2023, 79 : 14039 - 14062
  • [6] Strength assessment of Al-Humic and Al-Kaolin aggregates by intrusive and non-intrusive methods
    Moruzzi, Rodrigo B.
    da Silva, Pedro Grava
    Sharifi, Soroosh
    Campos, Luiza C.
    Gregory, John
    SEPARATION AND PURIFICATION TECHNOLOGY, 2019, 217 : 265 - 273
  • [7] Thresholding methods in non-intrusive load monitoring
    Precioso, Daniel
    Gomez-Ullate, David
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14039 - 14062
  • [8] Non-intrusive speech quality assessment: A survey
    Shen, Kailai
    Yan, Diqun
    Hu, Jing
    Ye, Zhe
    NEUROCOMPUTING, 2024, 580
  • [9] Clasification of Non-intrusive Condition Assessment Methods for T&D Switchgear
    Uzelac, N.
    Pater, R.
    Heinrich, C.
    2016 INTERNATIONAL CONFERENCE ON CONDITION MONITORING AND DIAGNOSIS (CMD), 2016, : 332 - 336
  • [10] Assessment of non-intrusive motor efficiency estimators
    Agamloh, E
    Wallace, A
    von Jouanne, A
    Anderson, KJ
    Rooks, JA
    CONFERENCE RECORD OF THE 2004 ANNUAL PULP AND PAPER INDUSTRY TECHNICAL CONFERENCE, 2004, : 64 - 69