Skip to main content

Distributed Collaborative Anomaly Detection for Trusted Digital Twin Vehicular Edge Networks

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12938))

Abstract

The vehicular networks are vulnerable to cyber security attacks due to the vehicles’ large attack surface. Anomaly detection is an effective means to deal with this kind of attack. Due to the vehicle’s limited computation resources, the vehicular edge network (VEN) has been proposed provide additional computing power while meeting the demand of low latency. However, the time-space limitation of edge computing prevents the vehicle data from being fully utilized. To solve this problem, a digital twin vehicular edge networks (DITVEN) is proposed. The distributed trust evaluation is established based on the trust chain transitivity and aggregation for edge computing units and digital twins to ensure the credibility of digital twins. The local reachability density and outlier factor are introduced for the time awareness anomaly detection. The curl and divergence based elements are utilized to achieve the space awareness anomaly detection. The mutual trust evaluation and anomaly detection is implemented for performance analysis, which indicates that the proposed scheme is suitable for digital twin vehicular applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, K., Zhu, Y., Maharjan, S., Zhang, Y.: Edge intelligence and blockchain empowered 5G beyond for the industrial internet of things. IEEE Network 33(5), 12–19 (2019)

    Article  Google Scholar 

  2. Kang, J., Lin, D., Bertino, E., Tonguz, O.: From autonomous vehicles to vehicular clouds: challenges of management, security and dependability. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1730–1741. IEEE (2019)

    Google Scholar 

  3. Ríos, J., Mas, F., Oliva, M., Hernandez-Matias, J.: Framework to support the aircraft digital counterpart concept with an industrial design view. Int. J. Agile Syst. Manag. 9, 212–231 (2016)

    Article  Google Scholar 

  4. Rassõlkin, A., Vaimann, T., Kallaste, A., Kuts, V.: Digital twin for propulsion drive of autonomous electric vehicle. In: 2019 IEEE 60th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON), pp. 1–4 (2019)

    Google Scholar 

  5. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks, pp. 255–265 (2000)

    Google Scholar 

  6. Wang, Y., Ming Chia, D.W., Ha, Y.: Vulnerability of deep learning model based anomaly detection in vehicle network. In: 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 293–296. IEEE (2020)

    Google Scholar 

  7. Bose, B., Dutta, J., Ghosh, S., Pramanick, P., Roy, S.: D&RSense: detection of driving patterns and road anomalies. In: 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), pp. 1–7. IEEE (2018)

    Google Scholar 

  8. Sassi, M.S.H., Fourati, L.C.: Investigation on deep learning methods for privacy and security challenges of cognitive IoV. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 714–720. IEEE (2020)

    Google Scholar 

  9. Reddy, V.B., Negi, A., Venkataraman, S., Venkataraman, V.R.: A similarity based trust model to mitigate badmouthing attacks in internet of things (IoT). In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 278–282 (2019)

    Google Scholar 

  10. Choi, H., Lee, G.M., Rhee, W.: Hierarchical trust chain framework for IoT services. In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), pp. 710–712 (2019)

    Google Scholar 

  11. Sun, W., Lei, S., Wang, L., Liu, Z., Zhang, Y.: Adaptive federated learning and digital twin for industrial internet of things. IEEE Trans. Industr. Inform. 17(8), 5605–5614 (2020)

    Article  Google Scholar 

Download references

Acknowledgment

This work is funded by the National Key R&D Program of China (2020AAA0107800), National Natural Science Foundation of China (62072184). This work is partially supported by the Project of Science and Technology Commitment of Shanghai (19511103602, 20511106002).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hong Liu or Yan Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Zhang, S., Liu, H., Zhang, Y. (2021). Distributed Collaborative Anomaly Detection for Trusted Digital Twin Vehicular Edge Networks. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86130-8_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86129-2

  • Online ISBN: 978-3-030-86130-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics