Skip to main content

2024 | OriginalPaper | Buchkapitel

Securing Smart Vehicles Through Federated Learning

verfasst von : Sadaf MD Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen, Youki Kadobayashi

Erschienen in: Foundations and Practice of Security

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As cars evolve to be smarter than ever, they also become susceptible to attack. Malicious entities can attempt to override automated functions by sending a series of attack signals to the smart vehicle. It is thus imperative that we create systems to detect these attacks on the fly, so that they may be discarded. Machine learning approaches are a natural choice for detecting such attacks based on the payload information. However, machine learning models typically require a large dataset for training, in order to attain good performance. With manufacturers independently gathering this data based on their own cars, it is unlikely that all this data will be available in one place. To address this issue, we explore federated solutions that learn in a distributed manner for increased smart vehicle security. We explore challenging scenarios in which we do not assume an independent and identically distributed (IID) setting for the data, which is typical in many federated learning environments. We investigate various degrees of such heterogeneity in the attack data distribution between different manufacturers, and study the effectiveness of detection systems under them. Furthermore, with a combination of techniques including triplet-mixup based augmentation and a data exchange scheme involving synthetically generated samples, we show that we can attain strong performance in the most challenging label distribution scenarios. We perform our experiments on a publicly available dataset and on a proprietary attack dataset developed for this project.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amato, F., Coppolino, L., Mercaldo, F., Moscato, F., Nardone, R., Santone, A.: Can-bus attack detection with deep learning. IEEE Trans. Intell. Transp. Syst. 22(8), 5081–5090 (2021) Amato, F., Coppolino, L., Mercaldo, F., Moscato, F., Nardone, R., Santone, A.: Can-bus attack detection with deep learning. IEEE Trans. Intell. Transp. Syst. 22(8), 5081–5090 (2021)
2.
Zurück zum Zitat Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002) Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)
4.
Zurück zum Zitat Feng, S.Y., Gangal, V., Wei, J., Chandar, S., Vosoughi, S., Mitamura, T., Hovy, E.: A survey of data augmentation approaches for NLP. arXiv Preprint arXiv:2105.03075 (2021) Feng, S.Y., Gangal, V., Wei, J., Chandar, S., Vosoughi, S., Mitamura, T., Hovy, E.: A survey of data augmentation approaches for NLP. arXiv Preprint arXiv:​2105.​03075 (2021)
5.
Zurück zum Zitat Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)MathSciNetCrossRef Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)MathSciNetCrossRef
6.
Zurück zum Zitat Hanselmann, M., Strauss, T., Dormann, K., Ulmer, H.: Canet: an unsupervised intrusion detection system for high dimensional can bus data. IEEE Access 8, 58194–58205 (2020) Hanselmann, M., Strauss, T., Dormann, K., Ulmer, H.: Canet: an unsupervised intrusion detection system for high dimensional can bus data. IEEE Access 8, 58194–58205 (2020)
7.
Zurück zum Zitat Hossain, M.D., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: An effective in-vehicle can bus intrusion detection system using cnn deep learning approach. In: 2020 IEEE Global Communications Conference, pp. 1–6. IEEE (2020) Hossain, M.D., Inoue, H., Ochiai, H., Fall, D., Kadobayashi, Y.: An effective in-vehicle can bus intrusion detection system using cnn deep learning approach. In: 2020 IEEE Global Communications Conference, pp. 1–6. IEEE (2020)
9.
Zurück zum Zitat Karimireddy, S.P., Kale, S., Mohri, M., Reddi, S., Stich, S., Suresh, A.T.: Scaffold: stochastic controlled averaging for federated learning. In: International Conference on Machine Learning, pp. 5132–5143. PMLR (2020) Karimireddy, S.P., Kale, S., Mohri, M., Reddi, S., Stich, S., Suresh, A.T.: Scaffold: stochastic controlled averaging for federated learning. In: International Conference on Machine Learning, pp. 5132–5143. PMLR (2020)
10.
Zurück zum Zitat Li, X., Khan, L., Zamani, M., Wickramasuriya, S., Hamlen, K.W., Thuraisingham, B.: Mcom: a semi-supervised method for imbalanced tabular security data. In: Sural, S., Lu, H. (eds.) Data and Applications Security and Privacy XXXVI, pp. 48–67. Springer International Publishing, Cham (2022)CrossRef Li, X., Khan, L., Zamani, M., Wickramasuriya, S., Hamlen, K.W., Thuraisingham, B.: Mcom: a semi-supervised method for imbalanced tabular security data. In: Sural, S., Lu, H. (eds.) Data and Applications Security and Privacy XXXVI, pp. 48–67. Springer International Publishing, Cham (2022)CrossRef
11.
Zurück zum Zitat Li, Z., Shao, J., Mao, Y., Wang, J.H., Zhang, J.: Federated learning with gan-based data synthesis for non-iid clients. In: Goebel, R., Yu, H., Faltings, B., Fan, L., Xiong, Z. (eds.) Trustworthy Federated Learning, pp. 17–32. Springer International Publishing, Cham (2023)CrossRef Li, Z., Shao, J., Mao, Y., Wang, J.H., Zhang, J.: Federated learning with gan-based data synthesis for non-iid clients. In: Goebel, R., Yu, H., Faltings, B., Fan, L., Xiong, Z. (eds.) Trustworthy Federated Learning, pp. 17–32. Springer International Publishing, Cham (2023)CrossRef
12.
14.
Zurück zum Zitat Lokman, S.F., Othman, A.T., Abu-Bakar, M.H.: Intrusion detection system for automotive controller area network (can) bus system: a review. EURASIP J. Wirel. Commun. Netw. 2019, 1–17 (2019)CrossRef Lokman, S.F., Othman, A.T., Abu-Bakar, M.H.: Intrusion detection system for automotive controller area network (can) bus system: a review. EURASIP J. Wirel. Commun. Netw. 2019, 1–17 (2019)CrossRef
15.
Zurück zum Zitat Van der Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(11) (2008) Van der Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(11) (2008)
16.
Zurück zum Zitat McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.y.: Communication-efficient learning of deep networks from decentralized data. In: Singh, A., Zhu, J. (eds.) Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, PMLR (2017) McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.y.: Communication-efficient learning of deep networks from decentralized data. In: Singh, A., Zhu, J. (eds.) Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, PMLR (2017)
18.
Zurück zum Zitat Seo, E., Song, H.M., Kim, H.K.: Gids: Gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–6 (Aug 2018) Seo, E., Song, H.M., Kim, H.K.: Gids: Gan based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–6 (Aug 2018)
19.
Zurück zum Zitat Shibly, K.H., Hossain, M.D., Inoue, H., Taenaka, Y., Kadobayashi, Y.: Personalized federated learning for automotive intrusion detection systems. In: 2022 IEEE Future Networks World Forum (FNWF), pp. 544–549 (2022) Shibly, K.H., Hossain, M.D., Inoue, H., Taenaka, Y., Kadobayashi, Y.: Personalized federated learning for automotive intrusion detection systems. In: 2022 IEEE Future Networks World Forum (FNWF), pp. 544–549 (2022)
20.
Zurück zum Zitat Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Commun. 21, 100198 (2020)CrossRef Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Commun. 21, 100198 (2020)CrossRef
21.
Zurück zum Zitat Zhang, H., Zeng, K., Lin, S.: Federated graph neural network for fast anomaly detection in controller area networks. IEEE Trans. Inform. Forens. Security 18, 1566–1579 (2023) Zhang, H., Zeng, K., Lin, S.: Federated graph neural network for fast anomaly detection in controller area networks. IEEE Trans. Inform. Forens. Security 18, 1566–1579 (2023)
22.
Zurück zum Zitat Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: Mixup: beyond empirical risk minimization. arXiv Preprint arXiv:1710.09412 (2017) Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: Mixup: beyond empirical risk minimization. arXiv Preprint arXiv:​1710.​09412 (2017)
23.
Zurück zum Zitat Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-iid data. CoRR abs/1806.00582 (2018) Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-iid data. CoRR abs/1806.00582 (2018)
24.
Zurück zum Zitat Zhu, H., Xu, J., Liu, S., Jin, Y.: Federated learning on non-iid data: a survey. Neurocomputing 465, 371–390 (2021)CrossRef Zhu, H., Xu, J., Liu, S., Jin, Y.: Federated learning on non-iid data: a survey. Neurocomputing 465, 371–390 (2021)CrossRef
Metadaten
Titel
Securing Smart Vehicles Through Federated Learning
verfasst von
Sadaf MD Halim
Md Delwar Hossain
Latifur Khan
Anoop Singhal
Hiroyuki Inoue
Hideya Ochiai
Kevin W. Hamlen
Youki Kadobayashi
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57537-2_2

Premium Partner