Skip to main content

Artificial Intelligence and Game Theory Based Security Strategies and Application Cases for Internet of Vehicles

  • Conference paper
  • First Online:
Communications, Signal Processing, and Systems (CSPS 2019)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 571))

  • 126 Accesses

Abstract

Information security of Internet of Vehicles (IoV) has attracted much attention in recent years. In view of security vulnerabilities existed in automobiles, many countries launch guidelines and cybersecurity standards concerning IoV security and plenty of new techniques have been applied to combat threats. In this paper, a variety of attacks on IoV are summarized and classified, then artificial intelligence and game theory based security countermeasures for IoV are highlighted, and their protection mechanisms are illustrated. Finally, a few application cases of artificial intelligence and game theory based security strategies for IoV is analyzed, aiming to provide helpful reference for the development of IoV security techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 629.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 799.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 799.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Millman R (2018) Connected cars report: 125 million vehicles by 2022, 5G coming. In: Internet of business. https://internetofbusiness.com/worldwide-connected-car-market-to-top-125-million-by-2022/

  2. Analysis of status development of internet of vehicles in China in 2018 (2018) In: RFID world. http://news.rfidworld.com.cn/2018_09/6746f0f84b2cd8cd.html

  3. Takefuji Y (2018) Connected vehicle security vulnerabilities. IEEE Technol Soc Mag 37(1):15–18

    Article  Google Scholar 

  4. Tanaka M, Takahashi J, Oshima Y (2017) Cyber-attack countermeasures for cars. NTT Technical Rev 15(5):1–5

    Google Scholar 

  5. Sun YC, Wu L, Wu SZ, Li SP, Zhang T, Zhang L, Xu JF, Xiong YP, Cui XG (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72:283–295

    Article  Google Scholar 

  6. Lee GM Artificial intelligence (AI) for development series: report on AI and IoT in security aspects. ITU. 10

    Google Scholar 

  7. Causevic D How machine learning can enhance cybersecurity for autonomous cars. Total. https://www.toptal.com/insights/innovation/how-machine-learning-can-enhance-cybersecurity-for-autonomous-cars

  8. Loukas G, Vuong T, Heartfield R, Sakellari G, Yoon Y, Gan D (2018) Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Spec Sect Secur Anal Intell Cyber Phys Syst 6:3491–3508

    Google Scholar 

  9. Carlos A, Catania FB (2012) An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection. Expert Syst Appl 39(2):1822–1829

    Article  Google Scholar 

  10. Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):1–17

    Google Scholar 

  11. Vuong TP, Loukas G, Gan D (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. IEEE Int Work Inf Forensics Secur 1–6

    Google Scholar 

  12. Liang XQ, Yan Z (2019) A survey on game theoretical methods in Human-Machine networks. Futur Gener Comput Syst 92:674–693

    Article  Google Scholar 

  13. Buchegger S, Alpcan T (2008) Security games for vehicular networks. In: Proceedings of the 46th annual allerton conference on communication, control and computing, pp 244–251

    Google Scholar 

  14. Alpcan T, Basar T (2011).Network security: a decision and game-theoretic approach. Cambridge University Press

    Google Scholar 

  15. Chen L, Leneutre J (2009) A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans Inf Forensics Secur 4(2):165–178

    Article  Google Scholar 

  16. Ismail Z, Leneutre J, Bateman D, Chen L (2014) A game theoretical analysis of data confidentiality attacks on smart-grid AMI. IEEE J Sel Areas Commun 32(7):1486–1499

    Article  Google Scholar 

  17. Liu Y, Comaniciu C, Man H (2006) A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: ACM international conference proceeding series

    Google Scholar 

  18. Nguyen KC, Alpcan T, Basar T (2009) Security games with incomplete information. In: IEEE international conference on communications

    Google Scholar 

  19. Zhang Y, Tan XB (2011) Perception method of internet security based on Markov game theory model. J Softw 22(3):495–508

    Article  Google Scholar 

  20. Hu H (2011) Strategy model of internet security based on Markov game theory. J Xi’an Jiaotong University 45(4):18–24

    Google Scholar 

  21. Fu Y (2009) Study on strategy selection of attacks and defenses of internet. J Beijing Univ Posts Telecommun 32(1):35–39

    Google Scholar 

  22. Zhu Q, Tembine H, Basar T (2010) Network security configurations: a nonzero-sum stochastic game approach. In: American control conference

    Google Scholar 

  23. Nguyen KC, Alpcan T, Basar T (2009) Stochastic games for security in networks with interdependent nodes. In: International conference on game theory for networks

    Google Scholar 

  24. Nguyen KC, Alpcan T, Basar T (2010) Security games with decision and observation errors. In: American control conference

    Google Scholar 

  25. Jiang W (2009) Security evaluation and optimal active defense based on game theory model. Chin J Comput 32(4):817–827

    Article  Google Scholar 

  26. Sagduyu YE, Berry R, Ephremides A (2009) MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In: International conference on game theory for networks

    Google Scholar 

  27. Zhu Q, Fung C, Boutaba R, Basar T (2012) GUIDEX: a game-theoretic incentive-based mechanism for intrusion detection network. IEEE J Sel Areas Commun 30(11):2220–2230

    Article  Google Scholar 

  28. Amin S, Schwartz GA, Sastry SS (2013) Security of interdependent and identical networked control system’s. Automatica 49(1):186–192

    Article  MathSciNet  Google Scholar 

  29. Maharjan S, Zhu Q, Zhag Y, Gjessing S, Basar T (2012) Dependable demand response management in the smart grid: a Stackelberg game approach. IEEE Trans Smart Grid 61(8):3693–3704

    Google Scholar 

  30. Manshaei M, Zhu Q, Alpcan T, Basar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):1–39

    Article  Google Scholar 

  31. Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In: Proceedings of the 43rd Hawaii international conference on system sciences

    Google Scholar 

  32. Liang X, Xiao Y (2013) Game theory for network security. IEEE Commun Surv Tutor 5(1):472–486

    Article  Google Scholar 

  33. Kang MJ, Kang JW (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. Proc IEEE VTC Fall 1–5

    Google Scholar 

  34. Raya M, Manshaei MH, Felegyhazi M, Hubaux JP (2008) Revocation games in ephemeral networks. In: Proceedings of ACM conference on computer and communications security (CCS)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Key Research and Development Program of China (Grant No.: 2018YFB0803605), the National Natural Science Foundation of China (Grant No.: 61897069), and the Foundation Strengthening Program for Key Basic Research of China (Grant No.: 2017-JCJQ-ZD-043). Guoai Xu, Chengze Li and Zhimin Wu are the corresponding authors.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Guoai Xu , Chengze Li or Zhimin Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Z., Zhang, M., Xu, H., Xu, G., Li, C., Wu, Z. (2020). Artificial Intelligence and Game Theory Based Security Strategies and Application Cases for Internet of Vehicles. In: Liang, Q., Wang, W., Liu, X., Na, Z., Jia, M., Zhang, B. (eds) Communications, Signal Processing, and Systems. CSPS 2019. Lecture Notes in Electrical Engineering, vol 571. Springer, Singapore. https://doi.org/10.1007/978-981-13-9409-6_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-9409-6_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-9408-9

  • Online ISBN: 978-981-13-9409-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics