Skip to main content
Log in

Deep Learning Approach for Encryption Techniques in Vehicular Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless communication technology is advancing at a breakneck speed these days. The notion of the network of vehicles on net, which is a very enticing internet of things application, includes a linked car as a crucial component. The technology underpinning this programme includes all words used to define the Web of everything, the internet of all things, artificial intelligence, machine learning. Automobiles are connected to the intelligent transportation systems via intercommunications between sensors and intelligent equipment within and off the surroundings. Because the WSN handles the majority of communication, security is a critical issue. Security is a major problem with WSNs although most of the communication takes place over wireless media, increasing the probability of assaults substantially. Systems for intrusion detection, communication safety and prevention measures should be implemented, as a result, research into intrusion detection and prevention methodologies has estimated primacy in the field of study. We can classify user activities under two categories employing intrusion detection and prevention systems: conventional suspicious behaviors and activities. There is a need to analyze deep learning for wireless communications in order to create effective intrusion detection and prevention systems. The objective of this research is to propose Intrusion prevention algorithms and strategies of systems based on deep packet inspection and deep learning. A deep learning model has been described based on a convolutional Neural Network classifier in this paper. Intrusion detection and intrusion prevention are two elements of the proposed scheme. A massive number of labelled-data can be found in the proposed approach to learn and classify helpful characteristics. A convolutional neural network is used in this work to prevent intrusion into wireless sensor networks. A WSN-DS dataset is used, the recommended system's efficacy is evaluated and tested, and dataset experiments are carried out. The research analysis revealed that the developed approach has a 97% accuracy rate and outperforms the existing method tremendously. In today's smart cities, the research proposal will be useful as in encryptions techniques for Intrusion control In Vehicular Networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2a
Fig. 2b
Fig. 3
Fig. 4a
Fig. 4b
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Li, G., Boukhatem, L., & Martin, S. (2015). An intersection-based QoS routing in vehicular ad hoc networks. Mobile Networks and Applications, 20(2), 268–284.

    Article  Google Scholar 

  2. Sarkar, S.K., Basavaraju, T.G, Puttamadappa, C. (2013). Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, 2nd ed.;CRC Press: Boca Raton, FL, USA, ISBN 978–1–4665–1446–1

  3. Limouchi, E., & Mahgoub, I. (2020). Smart fuzzy logic-based density and distribution adaptive scheme for efficient data dissemination in vehicular Ad Hoc networks. Electronics, 9, 1297.

    Article  Google Scholar 

  4. Leila, M.P, Teck, C.L, Chee S.L, Chun Yong, C. (2018) A Convolutional Neural Network for Network Intrusion Detection System. In: Proceedings of the APAN – Research Workshop ISBN 978–4–9905448–8–1.

  5. Yuchen Liu., Shengli Liu and Xing Zhao. Intrusion Detection Algorithm Based on Convolutional Neural Network. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China.

  6. Sheraz., N1, and Yasir, S. (2018). Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks. KSII Transactions on Internet and Information Systems. 12(10).

  7. Chawla, Ashima, Lee, Brian, & Jacob, Sheila Paul. (2018). Host based Intrusion detection system with combined CNN/RNN model athlone institute of technology, Ireland. Network Anomaly Detection with Deep Learning., 978(1), 5386–1501.

    Google Scholar 

  8. Khan, Farrukh Aslam, Gumaei, Abdu, Derhab, Abdelouahid, & Hussain, Amir. (2019). TSDL: a two-stage deep learning model for efficient network intrusion detection. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2899721

    Article  Google Scholar 

  9. Navaporn, C., Vasaka, V. (2011). Intrusion Detection by Deep Learning with Tensor Flow. In: International Conference on Advanced Communications Technology (ICACT), ISBN 979–11–88428–02–1.

  10. Chuan, L. Y., Yuefei, Z., Jinlong, F., & Xinz He, H. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Translations., 5, 2169–3536.

    Google Scholar 

  11. Wen, H.L., Hsiao, C.L., Ping, W., Bao, H.W., Jeng, Y.T. (2018). Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats. In: Proceedings of IEEE International Conference on Applied System Innovation, IEEE ICASI 2018- Meen, Prior & Lam (Eds).

  12. Vijaykumar, R., et al. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access. https://doi.org/10.1109/ACCESS

    Article  Google Scholar 

  13. Monika, R et al. (2019). Deep Learning Models for Cyber Security in IoT Networks. IEEE. 978–1–7281–0554- 3/19/$31.00©2019.

  14. Abder, R. L., et al. (2019). A multi constrained qos compliant routing scheme for highway based vehicular networks Hindawi 2020. Wireless Communications and Mobile Computing., 2019, 18.

    Google Scholar 

  15. Kyung, A. S. (2013). Reconstruction of a secure authentication scheme for vehicular Ad Hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications., 12(11), 5386.

    Article  Google Scholar 

  16. Gao, H., Zhuang, L et al. (2018). Densely Connected Convolutional Networks. arXiv: 1608.06993v5 [cs.CV].

  17. Vinod, N., Geoffrey E. Hinton. (2010). Rectified Linear Units Improve Restricted Boltzmann Machines. In: Proceedings of the 27th International Conference on Machine Learning, Haifa, Israel.

  18. Aakash, A.A., Sourabh, B.R et al. (2019). A comparative analysis and discussion of email spam classification methods using machine learning techniques. Applied Machine Learning for Smart Data Analysis. 185, CRC Press.

  19. Bitam, S., Mellouk, A., & Fowler, S. (2015). MQBV: Multicast quality of service swarm bee routing for vehicular ad hoc networks. Wireless Communications and Mobile Computing, 15(9), 1391–1404.

    Article  Google Scholar 

  20. Iman, A., Bassam, A. K., & Mousa, A. A. (2016). WSN-DS: a dataset for intrusion detection systems in WSNs Hindawi publishing corporation. Journal of Sensors., 2016, 1.

    Google Scholar 

  21. Umashankar, G., Jayaram, P. (2017). A study on black hole attack in wireless sensor networks. International Journal of Advance Computing Technique and Applications (IJACTA). 5(1).

  22. Arvind, D., Amita, N et al. (2015). Gray and black hole attack identification using control packets in MANETs. In: Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015), Procedia Computer Science. 54 83-91

  23. Patan, Nipa, & Patel, Rajan. (2017). A mechanism for prevention of flooding based DDoS attack. International Journal of Computational Intelligence Research., 13(1), 101–111.

    Google Scholar 

  24. Yan, G., Rawat, D. B., & Bista, B. B. (2012). Provisioning vehicular ad hoc networks with quality of service. International Journal of Space-Based and Situated Computing, 2(2), 104–111.

    Article  Google Scholar 

  25. Gu, J. (2019). Introduction to the special section on machine learning-based internet of vehicles: theory, methodology, and applications. IEEE Transactions on Vehicular Technology., 68(5), 4105.

    Article  Google Scholar 

  26. Chen, M. (2019). Artificial neural networks based machine learning for wireless networks: a tutorial. https://arxiv.org/abs/1710.02913

  27. Hussain, R., Lee, J., & Zeadally, S. (2020). Trust in VANET: a survey of current solutions and future research opportunities. IEEE Transactions on Intelligent Transportation Systems., 22(5), 1–19.

    Google Scholar 

  28. Liu, J., Huang, S., Xu, H., Li, D., Zhong, N., & Liu, H. (2021). Cooperation promotion from the perspective of behavioral economics: an incentive mechanism based on loss aversion in vehicular Ad-Hoc networks. Electronics, 10, 225.

    Article  Google Scholar 

  29. Wan, J., Zhang, D., Zhao, S., Yang, L., & Lloret, J. (2014). Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions. IEEE Communications Magazine, 52(8), 106–113.

    Article  Google Scholar 

  30. Gandotra, P., Kumar Jha, R., & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. Journal of Network and Computer Applications, 78, 9–29.

    Article  Google Scholar 

  31. Aliyu, A., Abdullah, A. H., Kaiwartya, O., Cao, Y., Lloret, J., Aslam, N., & Joda, U. (2018). Towards video streaming in IoT environments: Vehicular communication perspective. Computer Communications, 118, 93–119.

    Article  Google Scholar 

  32. Alouache, L., Nguyeny, N., Aliouatz, M., Chelouah, R. (2018). Toward a hybrid SDN architecture for V2V communication in IoV environment. In: 2018 fifth international conference on software defined systems (SDS), (pp. 23–26), Barcelona, Spain, https://doi.org/10.1109/sds.2018.8370428.

  33. Oche, M., Tambuwal, A. B., Chemebe, C., Noor, R. M., & Distefano, S. (2020). VANETs QoS-based routing protocols based on multi-constrained ability to support ITS infotainment services. Wireless Networks, 26(3), 1685–1715.

    Article  Google Scholar 

  34. Sherazi, H. H. R., Khan, Z. A., Iqbal, R., Rizwan, S., Imran, M. A., & Awan, K. (2019). A heterogeneous IoV architecture for data forwarding in vehicle to infrastructure communication. https://doi.org/10.1155/2019/3101276

    Article  Google Scholar 

  35. Shi, W., Zhou, H., Li, J., Xu, W., Zhang, N., & Shen, X. S. N. (2018). Drone assisted vehicular networks :architecture, challenges and opportunities. IEEE Network, 99, 1–8. https://doi.org/10.1109/mnet.2017.1700206

    Article  Google Scholar 

  36. Storck, C. R., & Duarte Figueiredo, F. (2019). V2X ecosystem providing internet of vehicles special issue recent advances in software defined internet of vehicles (SDIoV). Sensors., 19(3), 1–20.

    Article  Google Scholar 

  37. Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., & Ji, Y. (2018). Spatial intelligence towards trustworthy vehicular IoT. IEEE Communications Magazine, 56(10), 22–27. https://doi.org/10.1109/mcom.2018.1800089

    Article  Google Scholar 

  38. Dey, K. C., Rayamajhi, A., Chowdhury, M., Bhavsar, P., & Martin, J. (2016). Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–performance evaluation. Transp Res Part C: Emerg Technol, 68, 168–184.

    Article  Google Scholar 

  39. Awang, A., Husain, K., Kamel, N., & Aissa, S. (2017). Routing in vehicular ad-hoc networks: a survey on single- and cross-layer design techniques, and perspectives. IEEE Access, 5, 9497–9517.

    Article  Google Scholar 

  40. Naik G., Choudhury B., Park J. (2019). IEEE 802.11bd & 5G NR V2X: evolution of radio access technologies for V2X communications. CoRR https://arxiv.org/abs/1903.08391

  41. Islam, S., Khalifa, O. O., Hashim, A. H. A., Hasan, M. K., Razzaque, M. A., & Pandey, B. (2020). Design and evaluation of a multihoming-based mobility management scheme to support inter technology handoff in PNEMO. Wireless Personal Communications, 114(2), 1133–1153.

    Article  Google Scholar 

  42. Alzahrani, F. A. (2020). On modeling optimizations and enhancing routing protocols for wireless multihop networks. IEEE Access, 8, 68953–68973.

    Article  Google Scholar 

  43. Prakash, K., Philip, P.C, Paulus, R., Kumar.A. (2020). A packet fluctuation-based OLSR and efficient parameters-based OLSR routing protocols for urban vehicular ad hoc networks. In: Recent Trends in Communication and Intelligent Systems, (pp. 79–87), Springer, Berlin, Germany.

  44. Chekkouri, A. S., Ezzouhairi, A., & Pierre, S. (2015). Connected vehicles in an intelligent transport system. Vehicular communications and networks (pp. 193–221). Woodhead Publishing.

    Chapter  Google Scholar 

  45. Haziza, N., Kassab, M., Knopp, R., Härri, J., Kaltenberger, F., Agostini, P., & Aniss, H. (2013). Multi-technology vehicular cooperative system based on Software Defined Radio (SDR). International workshop on communication technologies for vehicles (pp. 84–95). Springer.

    Chapter  Google Scholar 

  46. Ghazvini, A., Abdullah, S. N. H. S., Kamrul Hasan, M., & Bin Kasim, D. Z. A. (2020). Crime spatiotemporal prediction with fused objective function in time delay neural network. IEEE Access., 8, 115167–115183.

    Article  Google Scholar 

  47. Sadiq, A. S., Khan, S., Ghafoor, K. Z., Guizani, M., & Mirjalili, S. (2018). Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information. Computer Networks, 137, 147–159.

    Article  Google Scholar 

  48. Sadiq, A. S., Bakar, K. A., Ghafoor, K. Z., & Lloret, J. (2013). Intelligent vertical handover for heterogeneous wireless network. Proceedings of the world congress on engineering and computer science., 2, 774–779.

    Google Scholar 

  49. Al-Hader, M., Rodzi, A., Sharif, A.R., Ahmad, N. (2009). Smart city components architecture. In: 2009 International Conference On Computational Intelligence, Modelling And Simulation. (pp 93–97), IEEE

  50. Kumar, A., Prakash, J., Dutt, V. (2014). Understanding human driving behavior through computational cognitive modeling. In: International conference on internet of vehicles. (pp 56–65), Springer

  51. Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (SIOT)–when social networks meet the internet of things: concept, architecture and network characterization. Computer Networks, 56(16), 3594–3608.

    Article  Google Scholar 

  52. Mehdi, K., et al. (2013). Performance modeling of safety messages broadcast in vehicular Ad Hoc networks. IEEE Transactions On Intelligent Transportation Systems., 14(1), 380–387.

    Article  Google Scholar 

  53. Ghadhban, H. Q., & Muniyandi, R. C. (2016). Improved Kalman filter based LAR in vehicular ad hoc network. International Review on Modelling and Simulations (IREMOS), 9(5), 361–366.

    Article  Google Scholar 

  54. Barba, C.T, Mateos, M.A, Soto, P.R, Mezher, A.M, Igartua, M.A. (2012). Smart city for VANETs using warning messages, traffic statistics and intelligent traffic lights. In: 2012 IEEE intelligent vehicles symposium. (pp 902–907), IEEE

  55. Kanter, T, Rahmani, R, Li, Y, Xiao, B. (2014). Vehicular network enabling large-scale and real-time immersive participation. In: International conference on internet of vehicles. (pp 66–75), Springer

  56. Balen, J. (2015). Spatio temporal distributed background data storage and management system in VANETs. In: Proceeding of the 3rd GI/ITG KuVS Fachgespräch inter-vehicle communication (FG-IVC 2015), (13(3), pp 22–25) Ulm, Germany. https://bib.irb.hr/datoteka/787684.Balen-spatio-temp.pdf

  57. Förster, D, Bosch, R. (2015). Discussing different levels of privacy protection in vehicular ad-hoc networks. In: Proceeding of the 3rd GI/ITG KuVS Fachge spräch inter-vehicle communication (FG-IVC 2015), (13(3), pp 29–31) Ulm, Germany.

  58. Eckhoff, D and Sommer, C. (2012). A multi-channel IEEE 1609.4 and 802.11 pedca model for the veins framework. In: Proceedings of 5th ACM/ICST International Conference on Simulation Tools and Techniques for Communications, Networks and Systems: 5th ACM/ICST International Workshop on OMNeT++, OMNeT.

  59. Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., & Ji, Y. (2018). Spatial intelligence towards trust worthy vehicular IoT. IEEE Communications Magazine, 56(10), 22–27. https://doi.org/10.1109/mcom.2018.1800089

    Article  Google Scholar 

  60. Eiza, M. H., Owens, T., Ni, Q., & Shi, Q. (2015). Situation-aware QoS routing algorithm for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(12), 5520–5535.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Choudhary.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choudhary, D., Pahuja, R. Deep Learning Approach for Encryption Techniques in Vehicular Networks. Wireless Pers Commun 125, 1–27 (2022). https://doi.org/10.1007/s11277-022-09538-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09538-9

Keywords

Navigation