Artificial Intelligence-based intrusion detection system for V2V communication in vehicular adhoc networks

  • Abizar Khalil
  • , Haleem Farman
  • , Moustafa M. Nasralla
  • , Bilal Jan
  • , Jamil Ahmad

Research output: Contribution to journalArticlepeer-review

21 Citations (Scopus)

Abstract

Vehicular Adhoc Networks (VANETs) enable vehicle-infrastructure communication, enhancing Intelligent Transportation Systems (ITS). Vehicles interconnect wirelessly to share information. Still, this communication is vulnerable to various attacks, particularly in Vehicle-to-Vehicle (V2V) scenarios. This study proposes an Artificial Intelligence-based Intrusion Detection System (IDS) in an edge-envisioned environment, combining edge computing and deep learning. The approach uses the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for edge node selection to perform packet forwarding and employs a Bidirectional Generative Adversarial Network (BiGAN) for intrusion detection. This poses a challenge since regular traffic samples are typically more prevalent than anomalous traffic, and the dataset is unstructured and highly imbalanced. Our BiGAN-based model overcomes synchronization challenges between generator and discriminator networks. Training iterations increase independently until cross-entropy loss conditions are met. The trained encoder-discriminator network is a single-class classifier, distinguishing normal and abnormal data. Experimental results demonstrate superior performance on the NSL-KDD dataset compared to similar methods.

Original languageEnglish
Article number102616
JournalAin Shams Engineering Journal
Volume15
Issue number4
DOIs
Publication statusPublished - Apr 2024
Externally publishedYes

Keywords

  • BiGAN
  • Edge node
  • Intrusion detection
  • NSL-KDD
  • Privacy

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Artificial Intelligence-based intrusion detection system for V2V communication in vehicular adhoc networks'. Together they form a unique fingerprint.

Cite this