Information fusion-based cybersecurity threat detection for intelligent transportation system

Conference paper


Chowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, A., Ali, K. and Galletta, A. 2023. Information fusion-based cybersecurity threat detection for intelligent transportation system. CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 Bangalore, India IEEE. pp. 96-103 https://doi.org/10.1109/CCGridW59191.2023.00029
TypeConference paper
TitleInformation fusion-based cybersecurity threat detection for intelligent transportation system
AuthorsChowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, A., Ali, K. and Galletta, A.
Abstract

Intelligent Transportation Systems (ITS) are sophisticated systems that leverage various technologies to increase the safety, efficiency, and sustainability of transportation. By relying on wireless communication and data collected from diverse sensors, ITS is vulnerable to cybersecurity threats. With the increasing number of attacks on ITS worldwide, detecting and addressing cybersecurity threats has become critically important. This need will only intensify with the impending arrival of autonomous vehicles. One of the primary challenges is identifying critical ITS assets that require protection and understanding the vulnerabilities that cyber attackers can exploit. Additionally, creating a standard profile for ITS is challenging due to the dynamic traffic pattern, which exhibits changes in the movement of vehicles over time. To address these challenges, this paper proposes an information fusion-based cybersecurity threat detection method. Specifically, we employ the Kalman filter for noise reduction, Dempster-Shafer decision theory and Shannon’s entropy for assessing the probabilities of traffic conditions being normal, intruded, and uncertain. We utilised Simulation of Urban Mobility (SUMO) to simulate the Melbourne CBD map and historical traffic data from the Victorian transport authority. Our simulation results reveal that information fusion with three sensor data is more effective in detecting normal traffic conditions. On the other hand, for detecting anomalies, information fusion with two sensor data is more efficient.

KeywordsInformation fusion; Cybersecurity; Intelligent Transport Systems; Threat Detection; Transportation; Sensor fusion; Data models; Threat assessment; Entropy; Kalman filters; Computer security
Middlesex University ThemeCreativity, Culture & Enterprise
ConferenceCCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023
Page range96-103
Proceedings Title2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)
ISBN
Electronic9798350302080
Paperback9798350302097
PublisherIEEE
Place of publicationBangalore, India
Publication dates
Print01 May 2023
Online19 Jul 2023
Publication process dates
Deposited29 Mar 2023
Accepted07 Mar 2023
Output statusPublished
Accepted author manuscript
Copyright Statement

© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Digital Object Identifier (DOI)https://doi.org/10.1109/CCGridW59191.2023.00029
Web of Science identifierWOS:001037081200014
Web address (URL) of conference proceedingshttps://ieeexplore.ieee.org/xpl/conhome/10171437/proceeding
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/8q52x

  • 98
    total views
  • 27
    total downloads
  • 7
    views this month
  • 1
    downloads this month

Export as

Related outputs

Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks
Alam, A., Shah, P., Trestian, R., Ali, K. and Mapp, G. 2024. Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks. Sensors. 24 (10). https://doi.org/10.3390/s24103001
Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets
Wang, K, Wong, B, Khoshkholghi, A., Shah, P., Naha, R, Mahanti, A and Kim, J 2024. Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets. 38th International Conference on Advanced Information Networking and Applications. Kitakyushu, Japan 17 - 19 Apr 2024 Springer. pp. 263-273 https://doi.org/10.1007/978-3-031-57853-3_22
Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine
Afzal, M., Ali, K., Kasi, M., Rehman, M., Khoshkholghi, A., Haq, B. and Shah, S. 2023. Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2018-2023 https://doi.org/10.1109/TrustCom60117.2023.00277
Joint energy and spectral optimization in Heterogeneous Vehicular Network
Alam, A., Ali, K., Trestian, R., Shah, P. and Mapp, G. 2023. Joint energy and spectral optimization in Heterogeneous Vehicular Network. Computer Networks. 238. https://doi.org/10.1016/j.comnet.2023.110111
A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory
Al-Nader, I., Lasebae, A., Raheem, R. and Khoshkholghi, A. 2023. A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory. Electronics. 12 (23). https://doi.org/10.3390/electronics12234766
Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324
Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT)
Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. 2023. Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT). CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 75-80 https://doi.org/10.1109/CCGridW59191.2023.00026
Federated learning for performance prediction in multi-operator environments
Lan, X., Taghia, J., Moradi, F., Khoshkholghi, A., Listo Zec, E., Mogren, O., Mahmoodi, T. and Johnsson, A. 2023. Federated learning for performance prediction in multi-operator environments. ITU Journal on Future and Evolving Technologies. 4 (1), pp. 166-177. https://doi.org/10.52953/PFYZ9165
Challenges, applications and future of wireless sensors in Internet of Things: a review
Jamshed, M., Ali, K., Abbasi, Q., Imran, M. and Ur-Rehman, M. 2022. Challenges, applications and future of wireless sensors in Internet of Things: a review. IEEE Sensors Journal. https://doi.org/10.1109/JSEN.2022.3148128
Adaptability of automated information systems by the development sector in developing countries: a case study
Ahmed, B., Haq, B., Ali, K. and Iqbal, M. 2021. Adaptability of automated information systems by the development sector in developing countries: a case study. International Conference on Computing, Electronic and Electrical Engineering (ICE Cube). Quetta, Pakistan 26 - 27 Oct 2021 IEEE. https://doi.org/10.1109/ICECube53880.2021.9628254
xURLLC in 6G with meshed RAN
Khoshkholghi, A., Mahmoodi, T., Pal, S., Chopra, S., Tendulkar, M. and Sarka, S. 2022. xURLLC in 6G with meshed RAN. ITU Journal on Future and Evolving Technologies. 3 (3), pp. 612-622. https://doi.org/10.52953/JTPE9471
Edge intelligence for service function chain deployment in NFV-enabled networks
Khoshkholghi, A. and Mahmoodi, T. 2022. Edge intelligence for service function chain deployment in NFV-enabled networks. Computer Networks. 219. https://doi.org/10.1016/j.comnet.2022.109451
IntOpt: in-band network telemetry optimization framework to monitor network slices using P4
Bhamare, D., Kassler, A., Vestin, J., Khoshkholghi, A., Taheri, J., Mahmoodi, T., Ohlen, P. and Curescu, C. 2022. IntOpt: in-band network telemetry optimization framework to monitor network slices using P4. Computer Networks. 216. https://doi.org/10.1016/j.comnet.2022.109214
Robust continuous user authentication system using long short term memory network for healthcare
Tanveer, A., Lasebae, A., Ali, K., Alkhayyat, A., Ur-Rehman, M., Haq, B. and Naeem, B. 2021. Robust continuous user authentication system using long short term memory network for healthcare. Ur-Rehman, M. and Zoha, A. (ed.) 16th EAI International Conference on Body Area Networks. Glasgow, UK (Online) 25 - 26 Oct 2021 Cham Springer. https://doi.org/10.1007/978-3-030-95593-9_22
Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies
Ali, K., Nguyen, H., Vien, Q., Shah, P., Raza, M., Paranthaman, V., Er-Rahmadi, B., Awais, M., Islam, S. and Rodrigues, J. 2021. Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies. IEEE network. 35 (2), pp. 18-25. https://doi.org/10.1109/MNET.011.2000418
Heuristic edge server placement in Industrial Internet of Things and cellular networks
Kasi, S., Kasi, M., Ali, K., Raza, M., Afzal, H., Lasebae, A., Naeem, B., Islam, S. and Rodrigues, J. 2021. Heuristic edge server placement in Industrial Internet of Things and cellular networks. IEEE Internet of Things Journal. 8 (13), pp. 10308-10317. https://doi.org/10.1109/JIOT.2020.3041805
Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach
Kiyani, A., Lasebae, A., Ali, K., Ur-Rehman, M. and Haq, B. 2020. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access. 8, pp. 156177-156189. https://doi.org/10.1109/ACCESS.2020.3019467
Deployment of drone-based small cells for public safety communication system
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Raza, M. 2020. Deployment of drone-based small cells for public safety communication system. IEEE Systems Journal. 14 (2), pp. 2882-2891. https://doi.org/10.1109/JSYST.2019.2959668
Architecture design for disaster resilient management network using D2D technology
Ali, K. 2019. Architecture design for disaster resilient management network using D2D technology. PhD thesis Middlesex University School of Science and Technology
TAEO-A thermal aware & energy optimized routing protocol for wireless body area networks
Javed, M., Ahmed, G., Mahmood, D., Raza, M., Ali, K. and Ur-Rehman, M. 2019. TAEO-A thermal aware & energy optimized routing protocol for wireless body area networks. Sensors. 19 (15), pp. 1-14. https://doi.org/10.3390/s19153275
An Internet of Things based bed-egress alerting paradigm using wearable sensors in elderly care environment
Awais, M., Raza, M., Ali, K., Ali, Z., Irfan, M., Chughtai, O., Khan, I., Kim, S. and Ur Rehman, M. 2019. An Internet of Things based bed-egress alerting paradigm using wearable sensors in elderly care environment. Sensors. 19 (11), pp. 1-17. https://doi.org/10.3390/s19112498
Disaster management using D2D communication with power transfer and clustering techniques
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Chu, Z. 2018. Disaster management using D2D communication with power transfer and clustering techniques. IEEE Access. 6, pp. 14643-14654. https://doi.org/10.1109/ACCESS.2018.2793532
Architecture for public safety network using D2D communication
Ali, K., Nguyen, H., Shah, P., Vien, Q. and Bhuvanasundaram, N. 2016. Architecture for public safety network using D2D communication. IEEE Conference on Wireless Communications and Networking. Doha, Qatar 03 - 06 Apr 2016 IEEE. https://doi.org/10.1109/wcnc.2016.7564671
Architecture for public safety network using D2D communication
Ali, K., Nguyen, H., Shah, P., Vien, Q. and Bhuvanasundaram, N. 2016. Architecture for public safety network using D2D communication. 2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Doha, Qatar 03 - 06 Apr 2016 IEEE. pp. 206-211 https://doi.org/10.1109/WCNCW.2016.7552700
Disaster management communication networks: challenges and architecture design
Ali, K., Nguyen, H., Vien, Q. and Shah, P. 2015. Disaster management communication networks: challenges and architecture design. 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops 2015). St. Louis, Missouri, USA 23 - 27 Mar 2015 IEEE. pp. 537-542 https://doi.org/10.1109/PERCOMW.2015.7134094