Results 1-20 of 21.
((uid:50035497))

Bookmark and Share    
Full Text
Peer Reviewed
See detailAssessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed
Fotouhi, Mahdi UL; Buscemi, Alessio UL; Boualouache, Abdelwahab UL et al

in Fotouhi, Mahdi; Buscemi, Alessio; Boualouache, Abdelwahab (Eds.) et al 2023 IEEE Vehicular Networking Conference (VNC), Istanbul 26-28 April 2023 (2023, July)

Time Sensitive Network (TSN) standards are gaining traction in the scientific community and automotive Original Equipment Manufacturers (OEMs) due their promise of deterministic Ethernet networking. Among ... [more ▼]

Time Sensitive Network (TSN) standards are gaining traction in the scientific community and automotive Original Equipment Manufacturers (OEMs) due their promise of deterministic Ethernet networking. Among these standards, Generalized Precision Time Protocol (gPTP) - IEEE 802.1AS - allows network devices to be synchronized with a precision far higher than other synchronization standards, such as Network Time Protocol (NTP). gPTP is a profile of Precision Time Protocol (PTP) which, due to its robustness to delay variations, has been designated for automotive applications. Nonetheless, gPTP was designed without security controls, which makes it vulnerable to a number of attacks. This work reveals a critical vulnerability caused by a common implementation practice that opens the door to spoofing attacks on gPTP. To assess the impact of this vulnerability, we built two real gPTP-capable testbeds. Our results show high risks of this vulnerability destabilizing the system functionality. [less ▲]

Detailed reference viewed: 150 (21 UL)
Full Text
Peer Reviewed
See detailA Lightweight 5G-V2X Intra-slice Intrusion Detection System Using Knowledge Distillation
Hossain, Shajjad; Boualouache, Abdelwahab UL; Brik, Bouziane et al

in A Lightweight 5G-V2X Intra-slice Intrusion Detection System Using Knowledge Distillation (2023, May)

As the automotive industry grows, modern vehicles will be connected to 5G networks, creating a new Vehicular-to-Everything (V2X) ecosystem. Network Slicing (NS) supports this 5G-V2X ecosystem by enabling ... [more ▼]

As the automotive industry grows, modern vehicles will be connected to 5G networks, creating a new Vehicular-to-Everything (V2X) ecosystem. Network Slicing (NS) supports this 5G-V2X ecosystem by enabling network operators to flexibly provide dedicated logical networks addressing use case specific-requirements on top of a shared physical infrastructure. Despite its benefits, NS is highly vulnerable to privacy and security threats, which can put Connected and Automated Vehicles (CAVs) in dangerous situations. Deep Learning-based Intrusion Detection Systems (DL-based IDSs) have been proposed as the first defense line to detect and report these attacks. However, current DL-based IDSs are processing and memory-consuming, increasing security costs and jeopardizing 5G-V2X acceptance. To this end, this paper proposes a lightweight intrusion detection scheme for 5G-V2X sliced networks. Our scheme leverages DL and Knowledge Distillation (KD) for training in the cloud and offloading knowledge to slice-tailored lightweight DL models running on CAVs. Our results show that our scheme provides an optimal trade-off between detection accuracy and security overhead. Specifically, it can reduce security overhead in computation and memory complexity to more than 50% while keeping almost the same performance as heavy DL-based IDSs. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailOn-Demand Security Framework for 5GB Vehicular Networks
Boualouache, Abdelwahab UL; Brik, Bouziane; Senouci, Sidi-Mohammed et al

in IEEE Internet of Things Magazine (2023)

Building accurate Machine Learning (ML) attack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating ... [more ▼]

Building accurate Machine Learning (ML) attack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model's security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trusted interactions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an efficient consensus algorithm with an intelligent incentive mechanism to select the best FL workers that deliver highly accurate local ML models. Our experiments demonstrate that the framework achieves higher accuracy on a well-known vehicular dataset with a lower blockchain consensus time than related solutions. Specifically, our framework enhances the accuracy by 14% and decreases the consensus time, at least by 50%, compared to related works. Finally, this article discusses the framework's key challenges and potential solutions. [less ▲]

Detailed reference viewed: 98 (8 UL)
Full Text
Peer Reviewed
See detailA Survey on Privacy-preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems
Adavoudi Jolfaei, Amirhossein UL; Boualouache, Abdelwahab UL; Rupp, Andy UL et al

in IEEE Transactions on Intelligent Transportation Systems (2023)

As part of Intelligent Transportation Systems (ITS), Electronic toll collection (ETC) is a type of toll collection system (TCS) which is getting more and more popular as it can not only help to finance ... [more ▼]

As part of Intelligent Transportation Systems (ITS), Electronic toll collection (ETC) is a type of toll collection system (TCS) which is getting more and more popular as it can not only help to finance the government's road infrastructure but also it can play a crucial role in pollution reduction and congestion management. As most of the traditional ETC schemes (ETCS) require identifying their users, they enable location tracking. This violates user privacy and poses challenges regarding the compliance of such systems with privacy regulations such as the EU General Data Protection Regulation (GDPR). So far, several privacy-preserving ETC schemes have been proposed. To the best of our knowledge, this is the first survey that systematically reviews and compares various characteristics of these schemes, including components, technologies, security properties, privacy properties, and attacks on ETCS. This survey first categorizes the ETCS based on two technologies, GNSS and DSRC. Then under these categories, the schemes are classified based on whether they provide formal proof of security and support security analysis. We also demonstrate which schemes specifically are/are not resistant to collusion and physical attacks. Then, based on these classifications, several limitations and shortcomings in privacy-preserving ETCS are revealed. Finally, we identify several directions for future research. [less ▲]

Full Text
Peer Reviewed
See detailA Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Boualouache, Abdelwahab UL; Engel, Thomas UL

in IEEE Communications Surveys and Tutorials (2022)

Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable ... [more ▼]

Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable Low Latency Communications (URLLC) to CAVs. However, while communication performance has been enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers have become more strategic. Public Key Infrastructure (PKI) proposed by standardization bodies cannot solely defend against these attacks. Thus, in complementary of that, sophisticated systems should be designed to detect such attacks and attackers. Machine Learning (ML) has recently emerged as a key enabler to secure future roads. Various V2X Misbehavior Detection Systems (MDSs) have adopted this paradigm. However, analyzing these systems is a research gap, and developing effective ML-based MDSs is still an open issue. To this end, this paper comprehensively surveys and classifies ML-based MDSs as well as discusses and analyses them from security and ML perspectives. It also provides some learned lessons and recommendations for guiding the development, validation, and deployment of ML-based MDSs. Finally, this paper highlighted open research and standardization issues with some future directions. [less ▲]

Detailed reference viewed: 29 (17 UL)
Full Text
Peer Reviewed
See detailEdge Computing-enabled Intrusion Detection for C-V2X Networks using Federated Learning
Selamnia, Aymene; Brik, Bouziane; Senouci, Sidi-Mohammed et al

in The 2022 IEEE Global Communications Conference (GLOBECOM) (2022, December)

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML ... [more ▼]

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption. [less ▲]

Detailed reference viewed: 34 (1 UL)
Full Text
Peer Reviewed
See detailEdge Computing enabled Intrusion Detection for C-V2X Networks using Federated Learning
Selamnia, Aymene; Brik, Bouziane; Senouci, Sidi-Mohammed et al

in The 2022 IEEE Global Communications Conference (GLOBECOM) (2022, December)

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML ... [more ▼]

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption. [less ▲]

Detailed reference viewed: 43 (3 UL)
Full Text
Peer Reviewed
See detailDRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks
Djaidja, Taki Eddine Toufik; Brik, Bouziane; Boualouache, Abdelwahab UL et al

in DRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks (2022, December)

Unlike previous mobile networks, 5G and beyond (B5G) networks are expected to be the key enabler of various vertical industries such as eHealth, intelligent transportation, and Industrial IoT verticals ... [more ▼]

Unlike previous mobile networks, 5G and beyond (B5G) networks are expected to be the key enabler of various vertical industries such as eHealth, intelligent transportation, and Industrial IoT verticals. To support that, B5G networks enable to sharing of common physical resources (radio, computation, network) among different tenants, thanks to network slicing concept and network softwarization technologies, including Software Defined Networking (SDN) and Network Function Virtualization (NFV). Therefore, new research challenges related to B5G networks have emerged, such as resources management and orchestration, service chaining, security, and QoS management. However, there is a lack of a realistic platform enabling researchers to design and validate their solutions effectively, since B5G networks are still in their early stages. In this paper, we first discuss the different methods for deploying realistic B5G platforms for the V2X vertical, including the key B5G technologies. Then, we describe DRIVE-B5G, a novel platform that serves as an end-to-end test-bed to emulate a vehicular network environment, allowing researchers to provide proof of concept, validate, and evaluate their research approaches. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailDRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks
Djaidja, Taki Eddine Toufik; Brik, Bouziane; Boualouache, Abdelwahab UL et al

in DRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks (2022, December)

Unlike previous mobile networks, 5G and beyond (B5G) networks are expected to be the key enabler of various vertical industries such as eHealth, intelligent transportation, and Industrial IoT verticals ... [more ▼]

Unlike previous mobile networks, 5G and beyond (B5G) networks are expected to be the key enabler of various vertical industries such as eHealth, intelligent transportation, and Industrial IoT verticals. To support that, B5G networks enable to sharing of common physical resources (radio, computation, network) among different tenants, thanks to network slicing concept and network softwarization technologies, including Software Defined Networking (SDN) and Network Function Virtualization (NFV). Therefore, new research challenges related to B5G networks have emerged, such as resources management and orchestration, service chaining, security, and QoS management. However, there is a lack of a realistic platform enabling researchers to design and validate their solutions effectively, since B5G networks are still in their early stages. In this paper, we first discuss the different methods for deploying realistic B5G platforms for the V2X vertical, including the key B5G technologies. Then, we describe DRIVE-B5G, a novel platform that serves as an end-to-end test-bed to emulate a vehicular network environment, allowing researchers to provide proof of concept, validate, and evaluate their research approaches. [less ▲]

Detailed reference viewed: 31 (4 UL)
Full Text
Peer Reviewed
See detail5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities
Boualouache, Abdelwahab UL; Brik, Bouziane; Tang, Qiang et al

in IEEE Internet of Things Journal (2022)

5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G ... [more ▼]

5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use–cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities. [less ▲]

Detailed reference viewed: 83 (15 UL)
Full Text
Peer Reviewed
See detailFederated Learning-based Inter-slice Attack Detection for 5G-V2X Sliced Networks
Boualouache, Abdelwahab UL; Engel, Thomas UL

in Boualouache, Abdelwahab; Engel, Thomas (Eds.) 2022 IEEE 96th Vehicular Technology Conference: (VTC2022-Fall) (2022, September)

As a leading enabler of 5G, Network Slicing (NS) aims at creating multiple virtual networks on the same shared and programmable physical infrastructure. Integrated with 5G-Vehicle-to-Everything (V2X ... [more ▼]

As a leading enabler of 5G, Network Slicing (NS) aims at creating multiple virtual networks on the same shared and programmable physical infrastructure. Integrated with 5G-Vehicle-to-Everything (V2X) technology, NS enables various isolated 5G-V2X networks with different requirements such as autonomous driving and platooning. This combination has generated new attack surfaces against Connected and Automated Vehicles (CAVs), leading them to road hazards and putting users' lives in danger. More specifically, such attacks can either intra-slice targeting the internal service within each V2X Network Slice (V2X-NS) or inter-slice targeting the cross V2X-NSs and breaking the isolation between them. However, detecting such attacks is challenging, especially inter-slice V2X attacks where security mechanisms should maintain privacy preservation and NS isolation. To this end, this paper addresses detecting inter-slice V2X attacks. To do so, we leverage both Virtual Security as a Service (VSaS) concept and Deep learning (DL) together with Federated learning (FL) to deploy a set of DL-empowered security Virtual Network Functions (sVNFs) over V2X-NSs. Our privacy preservation scheme is hierarchical and supports FL-based collaborative learning. It also integrates a game-theory-based mechanism to motivate FL clients (CAVs) to provide high-quality DL local models. We train, validate, and test our scheme using a publicly available dataset. The results show our scheme's accuracy and efficiency in detecting inter-slice V2X attacks. [less ▲]

Detailed reference viewed: 47 (3 UL)
Full Text
Peer Reviewed
See detailDeep Learning-based Intra-slice Attack Detection for 5G-V2X Sliced Networks
Boualouache, Abdelwahab UL; Djaidja, Taki Eddine Toufik; Senouci, Sidi-Mohammed et al

in 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) (2022, August 25)

Connected and Automated Vehicles (CAVs) represent one of the main verticals of 5G to provide road safety, road traffic efficiency, and user convenience. As a key enabler of 5G, Network Slicing (NS) aims ... [more ▼]

Connected and Automated Vehicles (CAVs) represent one of the main verticals of 5G to provide road safety, road traffic efficiency, and user convenience. As a key enabler of 5G, Network Slicing (NS) aims to create Vehicle-to-Everything (V2X) network slices with different network requirements on a shared and programmable physical infrastructure. However, NS has generated new network threats that might target CAVs leading to road hazards. More specifically, such attacks may target either the inner functioning of each V2X-NS (intra-slice) or break the NS isolation. In this paper, we aim to deal with the raised question of how to detect intra-slice V2X attacks. To do so, we leverage both Virtual Security as a Service (VSaS) concept and deep learning (DL) to deploy a set of DL-empowered security Virtual Network Functions (sVNFs) within V2X-NSs. These sVNFs are in charge of detecting such attacks, thanks to a DL model that we also build in this work. The proposed DL model is trained, validated, and tested using a publicly available dataset. The results show the efficiency and accuracy of our scheme to detect intra-slice V2X attacks. [less ▲]

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailFederated Learning-based Scheme for Detecting Passive Mobile Attackers in 5G Vehicular Edge Computing
Boualouache, Abdelwahab UL; Engel, Thomas UL

in Annals of Telecommunications (2021)

Detecting passive attacks is always considered difficult in vehicular networks. Passive attackers can eavesdrop on the wireless medium to collect beacons. These beacons can be exploited to track the ... [more ▼]

Detecting passive attacks is always considered difficult in vehicular networks. Passive attackers can eavesdrop on the wireless medium to collect beacons. These beacons can be exploited to track the positions of vehicles not only to violate their location privacy but also for criminal purposes. In this paper, we propose a novel federated learning-based scheme for detecting passive mobile attackers in 5G Vehicular Edge Computing. We first identify a set of strategies that can be used by attackers to efficiently track vehicles without being visually detected. We then build an efficient Machine Learning (ML) model to detect tracking attacks based only on the receiving beacons. Our scheme enables Federated Learning (FL) at the edge to ensure collaborative learning while preserving the privacy of vehicles. Moreover, FL clients use a semi-supervised learning approach to ensure accurate self-labeling. Our experiments demonstrate the effectiveness of our proposed scheme to detect passive mobile attackers quickly and with high accuracy. Indeed, only 20 received beacons are required to achieve 95\% accuracy. This accuracy can be achieved within 60 FL rounds using 5 FL clients in each FL round. The obtained results are also validated through simulations. [less ▲]

Detailed reference viewed: 82 (14 UL)
Full Text
Peer Reviewed
See detailIntelligent Misbehavior Detection System for Detecting False Position Attacks in Vehicular Networks
Hawlader, Faisal UL; Boualouache, Abdelwahab UL; Faye, Sébastien UL et al

in Hawlader, Faisal; Boualouache, Abdelwahab; Faye, Sébastien (Eds.) et al The 2021 IEEE International Conference on Communications (the 4th Workshop on 5G and Beyond Wireless Security) (2021, June)

Position falsification attacks are one of the most dangerous internal attacks in vehicular networks. Several Machine Learning-based Misbehavior Detection Systems (ML-based MDSs) have recently been proposed ... [more ▼]

Position falsification attacks are one of the most dangerous internal attacks in vehicular networks. Several Machine Learning-based Misbehavior Detection Systems (ML-based MDSs) have recently been proposed to detect these attacks and mitigate their impact. However, existing ML-based MDSs require numerous features, which increases the computational time needed to detect attacks. In this context, this paper introduces a novel ML-based MDS for the early detection of position falsification attacks. Based only on received positions, our system provides real-time and accurate predictions. Our system is intensively trained and tested using a publicly available data set, while its validation is done by simulation. Six conventional classification algorithms are applied to estimate and construct the best model based on supervised learning. The results show that the proposed system can detect position falsification attacks with almost 100% accuracy. [less ▲]

Detailed reference viewed: 262 (92 UL)
Full Text
Peer Reviewed
See detailConsortium Blockchain for Cooperative Location Privacy Preservation in 5G-enabled Vehicular Fog Computing
Boualouache, Abdelwahab UL; Sedjelmaci, Hichem; Engel, Thomas UL

in IEEE Transactions on Vehicular Technology (2021)

Privacy is a key requirement for connected vehicles. Cooperation between vehicles is mandatory for achieving location privacy preservation. However, non-cooperative vehicles can be a big issue to achieve ... [more ▼]

Privacy is a key requirement for connected vehicles. Cooperation between vehicles is mandatory for achieving location privacy preservation. However, non-cooperative vehicles can be a big issue to achieve this objective. To this end, we propose a novel monetary incentive scheme for cooperative location privacy preservation in 5G-enabled Vehicular Fog Computing. This scheme leverages a consortium blockchain-enabled fog layer and smart contracts to ensure a trusted and secure cooperative Pseudonym Changing Processes (PCPs). We also propose optimized smart contracts to reduce the monetary costs of vehicles while providing more location privacy preservation. Moreover, a resilient and lightweight Utility-based Delegated Byzantine Fault Tolerance (U-DBFT) consensus protocol is proposed to ensure fast and reliable block mining and validation. The performance analysis shows that our scheme has effective incentive techniques to stimulate non-cooperative vehicles and provides optimal monetary cost management and secure, private, fast validation of blocks. [less ▲]

Detailed reference viewed: 68 (7 UL)
Full Text
Peer Reviewed
See detailSoftware-Defined Location Privacy Protection for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Qiang, Tang et al

in Boualouache, Abdelwahab; Soua, Ridha; Qiang, Tang (Eds.) et al Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (2021)

While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose ... [more ▼]

While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs). However, ETSI has recently published a technical report which highlights the absence of standardized and efficient PCSs [1]. This alarming situation mandates an innovative shift in the way that the privacy of end-users is protected during their journey. Software Defined Networking (SDN) is emerging as a key 5G enabler to manage the network in a dynamic manner. SDN-enabled wireless networks are opening up new programmable and highly-flexible privacy-aware solutions. We exploit this paradigm to propose an innovative software-defined location privacy architecture for vehicular networks. The proposed architecture is context-aware, programmable, extensible, and able to encompass all existing and future pseudonym-changing strategies. To demonstrate the merit of our architecture, we consider a case study that involves four pseudonym-changing strategies, which we deploy over our architecture and compare with their static implementations. We also detail how the SDN controller dynamically switches between the strategies according to the context. [less ▲]

Detailed reference viewed: 127 (36 UL)
Full Text
Peer Reviewed
See detailA Trusted Hybrid Learning Approach to Secure Edge Computing
Sedjelmaci, Hichem; Senouci, Sidi Mohammed; Ansari, Nirwan et al

in IEEE Consumer Electronics Magazine (2021)

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks ... [more ▼]

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rate. Moreover, to further decrease the number of false detections, a cyber security mechanism based on a Stackelberg game is used by the hybrid learning security engine (activated at each edge server) to assess the detection decisions provided by the neighboring security engines. [less ▲]

Detailed reference viewed: 48 (2 UL)
Full Text
Peer Reviewed
See detailToward an SDN-based Data Collection Scheme for Vehicular Fog Computing
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in IEEE International Conference on Communications ICC'2020 (2020, June 07)

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during ... [more ▼]

With the integration of fog networks and vehicular networks, Vehicular Fog Computing (VFC) is a promising paradigm to efficiently collect data for improving safety, mobility, and driver experience during journeys. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a fully-programmable, self-configurable, and context-aware data collection scheme for VFC. This scheme leverages a stochastic model to dynamically estimate the number of fog stations to be deployed. Our simulation results demonstrate that our proposed scheme provides lower latency and higher resiliency compared to classical data collection schemes. [less ▲]

Detailed reference viewed: 205 (47 UL)
Full Text
Peer Reviewed
See detailSDN-based Misbehavior Detection System for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (2020, May)

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing ... [more ▼]

Vehicular networks are vulnerable to a variety of internal attacks. Misbehavior Detection Systems (MDS) are preferred over the cryptography solutions to detect such attacks. However, the existing misbehavior detection systems are static and do not adapt to the context of vehicles. To this end, we exploit the Software-Defined Networking (SDN) paradigm to propose a context-aware MDS. Based on the context, our proposed system can tune security parameters to provide accurate detection with low false positives. Our system is Sybil attack-resistant and compliant with vehicular privacy standards. The simulation results show that, under different contexts, our system provides a high detection ratio and low false positives compared to a static MDS. [less ▲]

Detailed reference viewed: 216 (27 UL)
Full Text
Peer Reviewed
See detailVPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲]

Detailed reference viewed: 231 (49 UL)