Recent Advances in Machine-Learning Driven Intrusion Detection in Transportation: Survey

被引:37
|
作者
Bangui, Hind [1 ]
Buhnova, Barbora [1 ]
机构
[1] Masaryk Univ, Fac Informat, Brno 60200, Czech Republic
关键词
Machine learning; VANET; UAV; Intrusion Detection Systems; Trust; Security; AD HOC NETWORKS; DATA ANALYTICS; BIG DATA; SECURITY; SYSTEM; CHALLENGES; INTERNET; MODEL;
D O I
10.1016/j.procs.2021.04.014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rapid developments in Intelligent Transportation Systems (ITSs) have emerged as a new research field for building sustainable smart cities. VANET (vehicular ad hoc network) is one of the emergent transportation technologies that has a great impact on ensuring mainly traffic management and road safety in urban areas by efficiently using data sharing among vehicles. To further increase the security and safety of passengers and drivers, ITSs are continually striving to make the fusion of emergent network technologies to provide more reliable and efficient services. Relating VANET to UAV (unmanned aerial vehicle) is an example of this fusion, where UAVs act as an assistant to vehicles aiming to extend the network connectivity while efficiently avoiding obstacles (e.g., Buildings) and providing high data delivery ratios. However, VANET and UAV are still critical security subjects that must be addressed. Advanced Machine Learning (e.g., Deep Learning) techniques have recently been used to protect VANET and UAV communications against various cyber attacks that deteriorate the integrity, confidentiality, and availability of vehicular data. Thus, in this paper, we focus on reviewing related work on machine learning techniques for intrusion detection systems in VANET- and UAV-aided networks. We also highlight the main open research challenges in literature and provide hints for improving security in ITSs. (C) 2021 The Authors. Published by Elsevier B.V.
引用
收藏
页码:877 / 886
页数:10
相关论文
共 50 条
  • [1] A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy
    Momand, Asadullah
    Jan, Sana Ullah
    Ramzan, Naeem
    [J]. JOURNAL OF SENSORS, 2023, 2023
  • [2] A Survey on Recent Advances in Machine Learning Based Sleep Apnea Detection Systems
    Ramachandran, Anita
    Karuppiah, Anupama
    [J]. HEALTHCARE, 2021, 9 (07)
  • [3] Machine Learning Combining with Visualization for Intrusion Detection: A Survey
    Yu, Yang
    Long, Jun
    Liu, Fang
    Cai, Zhiping
    [J]. MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, (MDAI 2016), 2016, 9880 : 239 - 249
  • [4] Recent advances in the application of machine-learning algorithms to predict adsorption energies
    Cao, Liang
    [J]. TRENDS IN CHEMISTRY, 2022, 4 (04): : 347 - 360
  • [5] Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions
    Kumar, Gulshan
    Alqahtani, Hamed
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 134 (01): : 89 - 119
  • [6] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh, Geeta
    Khare, Neelu
    [J]. International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669
  • [7] Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
    Liu, Hongyu
    Lang, Bo
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [8] Robust Network Intrusion Detection System Based on Machine-Learning With Early Classification
    Kim, Taehoon
    Pak, Wooguil
    [J]. IEEE ACCESS, 2022, 10 : 10754 - 10767
  • [9] A Survey on Intrusion Detection System Using Machine Learning Algorithms
    Gulghane, Shital
    Shingate, Vishal
    Bondgulwar, Shivani
    Awari, Gaurav
    Sagar, Parth
    [J]. INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 670 - 675
  • [10] An overview of recent advances in intrusion detection
    Marhusin, Mohd Fadzli
    Cornforth, David
    Larkin, Henry
    [J]. 2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 432 - 437