2023
DOI: 10.1177/03611981231159118
|View full text |Cite
|
Sign up to set email alerts
|

Secure Intrusion Detection by Differentially Private Federated Learning for Inter-Vehicle Networks

Abstract: Along with providing several benefits, the unprecedented growth of connected and automated vehicles brings worries about damaging cyber attacks. Network-based intrusion detection systems (IDSs) using deep learning methods can effectively mitigate the threats by promptly detecting malicious behaviors. However, the centralized learning mode may cause data leverage. Federated learning has emerged as a new distributed machine learning training paradigm to preserve data privacy by allowing clients to train and vali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…By contrast, refs. [53,55,61] employed the VeReMi dataset for their experimental analysis. The publicly accessible VeReMi dataset was explicitly developed for analyzing mechanisms to detect misbehavior in VANETs.…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…By contrast, refs. [53,55,61] employed the VeReMi dataset for their experimental analysis. The publicly accessible VeReMi dataset was explicitly developed for analyzing mechanisms to detect misbehavior in VANETs.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…• Attacks detected: Within the domain of FL-based IDSs for IoV, numerous research papers have put forth methodologies to identify a diverse range of cyber threats. DoS attacks [47,52,[57][58][59][60]63] and constant attacks [53,55,61] are the most frequently discussed types of attacks in the literature. In addition, some authors emphasized specific attacks, such as the Sybil assault [56] and the black hole attack [54].…”
Section: Analysis and Discussionmentioning
confidence: 99%