Reference : Edge Computing enabled Intrusion Detection for C-V2X Networks using Federated Learning
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
Edge Computing enabled Intrusion Detection for C-V2X Networks using Federated Learning
Selamnia, Aymene []
Brik, Bouziane []
Senouci, Sidi-Mohammed []
Boualouache, Abdelwahab mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
The 2022 IEEE Global Communications Conference (GLOBECOM)
The 2022 IEEE Global Communications Conference (GLOBECOM)
4-8 December 2022
[en] C-V2X ; Intrusion detection system ; Edge computing ; Federated deep learning
[en] Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption.
Researchers ; Professionals ; Students ; General public ; Others
FnR ; FNR14891397 > Thomas Engel > 5G-INSIGHT > Intelligent Orchestrated Security And Privacy-aware Slicing For 5g And Beyond Vehicular Networks > 01/04/2021 > 31/03/2024 > 2020

File(s) associated to this reference

Fulltext file(s):

Open access
Edge_computing_enabled_low_latency_intrusion_detection_system_using_federated_learning__-1.pdfPublisher postprint338.7 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.