2021
DOI: 10.1007/s12243-021-00871-x
|View full text |Cite
|
Sign up to set email alerts
|

Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing

Abstract: Detecting passive attacks is always considered difficult in vehicular networks. Passive attackers can eavesdrop on the wireless medium to collect beacons. These beacons can be exploited to track the positions of vehicles not only to violate their location privacy but also for criminal purposes. In this paper, we propose a novel federated learning-based scheme for detecting passive mobile attackers in 5G Vehicular Edge Computing. We first identify a set of strategies that can be used by attackers to efficiently… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 37 publications
0
10
0
Order By: Relevance
“…The training process occurs on the individual vehicles, ensuring that sensitive information remains on the device and is not exposed to external parties. This decentralized approach enhances data privacy and addresses concerns about sharing personal driving data [21][22]. Once the local training is complete, the updated model parameters are securely aggregated without revealing the specific data from each vehicle.…”
Section: Federated Learning In Safety Systemsmentioning
confidence: 99%
“…The training process occurs on the individual vehicles, ensuring that sensitive information remains on the device and is not exposed to external parties. This decentralized approach enhances data privacy and addresses concerns about sharing personal driving data [21][22]. Once the local training is complete, the updated model parameters are securely aggregated without revealing the specific data from each vehicle.…”
Section: Federated Learning In Safety Systemsmentioning
confidence: 99%
“…3) Detection Mechanism: In addition to using encryption algorithms, privacy is also protected by designing defense mechanisms including attack detection and data leakage detection. In [189], a FL-based architecture for detecting passive attackers who eavesdrop on vehicles' information is proposed. Besides, the author first simulates passive attackers through synthetic data and position-feature extraction method, and consequently uses a semi-supervised method to self-label data in FL vehicles to obtain precise detection results in a short amount of time.…”
Section: High Information Sensitivitymentioning
confidence: 99%
“…The training process occurs on the individual vehicles, ensuring that sensitive information remains on the device and is not exposed to external parties. This decentralized approach enhances data privacy and addresses concerns about sharing personal driving data [21,22]. Once the local training is complete, the updated model parameters are securely aggregated without revealing the speci c data from each vehicle.…”
Section: Federated Learning In Safety Systemsmentioning
confidence: 99%