Skip to main content

A Many-Objective Anomaly Detection Model for Vehicle Network Based on Federated Learning and Differential Privacy Protection

  • Conference paper
  • First Online:
Exploration of Novel Intelligent Optimization Algorithms (ISICA 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1590))

Included in the following conference series:

  • 561 Accesses

Abstract

With the rapid development of Internet of things, vehicle network has become the focus of smart city construction. However, due to the lack of encryption and authentication mechanism, the vehicle network is vulnerable to malicious attacks and intrusion, which poses a threat to the driver’s life safety and data privacy. To solve this problem, this paper proposes a method combining federal learning and differential privacy protection to protect the privacy of drivers. A many-objective anomaly detection model based on Federated learning is constructed. The model optimizes the accuracy, loss, privacy protection degree and communication cost in the federated training model at the same time. The model can obtain better accuracy and privacy protection with less loss and communication cost. The model is solved by many-objective evolutionary algorithm, and some solutions are selected as training parameters, and satisfactory results are obtained. The effectiveness of the proposed method is verified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Olufowobi, H., Young, C., Zambreno, J., Bloom, G.: Specification-based automotive intrusion detection using controller area network (CAN) timing. IEEE Trans. Veh. Technol. 69(2), 1484–1494 (2020)

    Article  Google Scholar 

  2. Wei, F., Zeadally, S., Vijayakumar, P., Kumar, N., He, D.: An intelligent terminal based privacy-preserving multi-modal implicit authentication protocol for internet of connected vehicles. IEEE Trans. Intell. Transp. Syst. 22(7), 3939–3951 (2021)

    Article  Google Scholar 

  3. Sirohi, D., Kumar, N., Rana, P.: Convolutional neural networks for 5G-enabled intelligent transportation system: a systematic review. Comput. Commun. 153, 459–498 (2020)

    Article  Google Scholar 

  4. Javed, A.R., Rehman, S.U., Khan, M.U., Alazab, M., Thippa, R.: CANintelliIDS: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans. Netw. Sci. Eng. 8(2), 1456–1466 (2021)

    Google Scholar 

  5. Murvay, P., Groza, B.: Security shortcomings and countermeasures for the SAE J1939 commercial vehicle bus protocol. IEEE Trans. Veh. Technol. 67(5), 4325–4339 (2018)

    Article  Google Scholar 

  6. Müter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 1110–1115 (2011)

    Google Scholar 

  7. Kang, J., Tang, T.: Intrusion detection system using deep neural network for in-vehicle net-work security, Plos One, 11(6), e0155781 (2016)

    Google Scholar 

  8. Alshammari, A., Zohdy, M., Debnath, D., et al.: Classification approach for intrusion detection in vehicle systems. Wirel. Eng. Technol. 9(4), 79–94 (2018)

    Article  Google Scholar 

  9. Sargolzaei, A., Crane, C., Abbaspour, A., Noei, S.: A machine learning approach for fault detection in vehicular cyber-physical systems. In: 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 636–640. IEEE, Anaheim (2016)

    Google Scholar 

  10. Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 3th IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130–139. IEEE, Montreal (2016)

    Google Scholar 

  11. Zhang, Z., Cao, Y., Cui, Z., Zhang, W., Chen, J.: A Many-objective optimization based intelligent intrusion detection algorithm for enhancing security of vehicular networks in 6G. IEEE Trans. Veh. Technol. 70(6), 5234–5243 (2021)

    Article  Google Scholar 

  12. Hassan, M., Rehmani, M., Chen, J.: Deal: Differentially private auction for blockchain-based microgrids energy trading. IEEE Trans. Serv. Comput. 13(2), 263–275 (2020)

    Google Scholar 

  13. Liu, W., Wang, Z., Liu, X., Zeng, N.: A survey of deep neural network architectures and their applications. Neurocomputing 234(19), 11–26 (2017)

    Google Scholar 

  14. Liu, Q., Xu, X., Zhang, X., Dou, W.: Federated learning based method for intelligent computing with privacy preserving in edge computing. Comput. Integr. Manufact. Syst. 27(9), 2604–2610 (2021)

    Google Scholar 

  15. Mansoor, A., Hadis, K., Muhammad, T.: Integration of blockchain and federated learning for Internet of Things: recent advances and future challenges. Comput. Secur. 108, 102355 (2021)

    Google Scholar 

  16. Yang, Q., Liu, Y., Chen, T., et al.: Federated machine learning. ACM Trans. Intell. Syst. Technol. 10(2), 1–19 (2019)

    Article  Google Scholar 

  17. Shokri, R., Shmatikov, V.: Privacy preserving deep learning. In: 22th ACM SIGSAC Conference on Computer and Communications Security, pp. 1310–1321. ACM, New York (2015)

    Google Scholar 

  18. Fan, T., Cui, Z.: Adaptive differential privacy preserving based on multi-objective optimization in deep neural networks. Concurr. Comput. Pract. Exper. 33(20), e6367 (2021)

    Google Scholar 

  19. Zou, J., Liu, J., Zheng, J., Yang, S.: A many-objective algorithm based on staged coordination selection. Swarm Evol. Comput. 60, 100737 (2021)

    Google Scholar 

  20. Zhao, H., Zhang, C.: An online-learning-based evolutionary many-objective algorithm. Inf. Sci. 509, 1–21 (2020)

    Article  MathSciNet  Google Scholar 

  21. Dhiman, G., Soni, M., Pandey, H., Slowik, A., Kaur, H.: A novel hybrid hypervolume indicator and reference vector adaptation strategies based evolutionary algorithm for many-objective optimization. Eng. Comput. 37(4), 3017–3035 (2021)

    Article  Google Scholar 

  22. Cai, X., Zhang, J., et al.: A many-objective multistage optimization-based fuzzy decision-making model for coal production prediction. IEEE Trans. Fuzzy Syst. 29(12), 3665–3675 (2021)

    Article  Google Scholar 

  23. Cui, Z., Zhang, J., et al.: Hybrid many-objective particle swarm optimization algorithm for green coal production problem. Inf. Sci. 158, 256–271 (2020)

    Article  MathSciNet  Google Scholar 

  24. Deb, K., Jain, H.: An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: Solving problems with box constraints. IEEE Trans. Evol. Comput. 18(4), 577–601 (2014)

    Article  Google Scholar 

  25. Yang, S., Li, M., Liu, X., Zheng, J.: A grid-based evolutionary algorithm for many-objective optimization. IEEE Trans. Evol. Comput. 17(5), 721–736 (2013)

    Article  Google Scholar 

  26. Zhang, X.Y., Tian, Y., Jin, Y.C.: A knee point-driven evolutionary algorithm for many-objective optimization. IEEE Trans. Evol. Comput. 19(6), 761–776 (2015)

    Article  Google Scholar 

  27. Xiang, Y., Zhou, Y., Li, M., Chen, Z.: A vector angle-based evolutionary algorithm for unconstrained many-objective optimization. IEEE Trans. Evol. Comput. 21(1), 131–152 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by Key R&D program of Shanxi Province (International Cooperation) under Grant No. 201903D421048, Project of Shanxi Province under Grant No. 2021Y696.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhihua Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, T., Zhang, Z., Lan, Y., Cui, Z. (2022). A Many-Objective Anomaly Detection Model for Vehicle Network Based on Federated Learning and Differential Privacy Protection. In: Li, K., Liu, Y., Wang, W. (eds) Exploration of Novel Intelligent Optimization Algorithms. ISICA 2021. Communications in Computer and Information Science, vol 1590. Springer, Singapore. https://doi.org/10.1007/978-981-19-4109-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-4109-2_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-4108-5

  • Online ISBN: 978-981-19-4109-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics