2018 IEEE 87th Vehicular Technology Conference (VTC Spring) 2018
DOI: 10.1109/vtcspring.2018.8417863
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Vehicle-to-Infrastructure Communications

Abstract: This paper presents a neural network-based anomaly detection system for vehicular communications. The proposed system is able to detect in-vehicle data tampering in order to avoid the transmission of bogus or harmful information. We investigate the use of Long Short-term Memory (LSTM) and Multilayer Perceptron (MLP) neural networks to build two prediction models. For each model, an efficient architecture is designed based on appropriate hardware requirements. Then, a comparative performance analysis is provide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Enhance the running performance to a real-time level. We observe that many studies [11,84,96] in the smart vehicle domain discussed the running performance of DLAD methods. This is because the response time is critical to avoid devastating accidents in smart cars.…”
Section: Improving Deep Anomaly Detection Methodsmentioning
confidence: 89%
See 2 more Smart Citations
“…Enhance the running performance to a real-time level. We observe that many studies [11,84,96] in the smart vehicle domain discussed the running performance of DLAD methods. This is because the response time is critical to avoid devastating accidents in smart cars.…”
Section: Improving Deep Anomaly Detection Methodsmentioning
confidence: 89%
“…Characteristics of DLAD methods in ITSs. Most studies in ITS aim to detect attacks on the CAN bus [47,84,94,116], which is responsible for the communication between devices (e.g., airbags) and Electronic Control Units (ECUs) [19]. Khanapuri 6.…”
Section: Dlad Methods In Itssmentioning
confidence: 99%
See 1 more Smart Citation
“…The main challenge of designing a distributed attack detection method is monitoring cyber-physical systems without adequate information. Most cyber-physical systems lack various cyber security mechanisms, such as message authentication, which results in numerous challenges for detecting data injection attacks [20]. The absence of worldwide encryption, mainly on systems engaging in dated technologies, makes it exciting to secure in contradiction of eavesdropping attacks.…”
Section: Introductionmentioning
confidence: 99%