Abstract
Information security of Internet of Vehicles (IoV) has attracted much attention in recent years. In view of security vulnerabilities existed in automobiles, many countries launch guidelines and cybersecurity standards concerning IoV security and plenty of new techniques have been applied to combat threats. In this paper, a variety of attacks on IoV are summarized and classified, then artificial intelligence and game theory based security countermeasures for IoV are highlighted, and their protection mechanisms are illustrated. Finally, a few application cases of artificial intelligence and game theory based security strategies for IoV is analyzed, aiming to provide helpful reference for the development of IoV security techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Millman R (2018) Connected cars report: 125 million vehicles by 2022, 5G coming. In: Internet of business. https://internetofbusiness.com/worldwide-connected-car-market-to-top-125-million-by-2022/
Analysis of status development of internet of vehicles in China in 2018 (2018) In: RFID world. http://news.rfidworld.com.cn/2018_09/6746f0f84b2cd8cd.html
Takefuji Y (2018) Connected vehicle security vulnerabilities. IEEE Technol Soc Mag 37(1):15–18
Tanaka M, Takahashi J, Oshima Y (2017) Cyber-attack countermeasures for cars. NTT Technical Rev 15(5):1–5
Sun YC, Wu L, Wu SZ, Li SP, Zhang T, Zhang L, Xu JF, Xiong YP, Cui XG (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72:283–295
Lee GM Artificial intelligence (AI) for development series: report on AI and IoT in security aspects. ITU. 10
Causevic D How machine learning can enhance cybersecurity for autonomous cars. Total. https://www.toptal.com/insights/innovation/how-machine-learning-can-enhance-cybersecurity-for-autonomous-cars
Loukas G, Vuong T, Heartfield R, Sakellari G, Yoon Y, Gan D (2018) Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Spec Sect Secur Anal Intell Cyber Phys Syst 6:3491–3508
Carlos A, Catania FB (2012) An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection. Expert Syst Appl 39(2):1822–1829
Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):1–17
Vuong TP, Loukas G, Gan D (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. IEEE Int Work Inf Forensics Secur 1–6
Liang XQ, Yan Z (2019) A survey on game theoretical methods in Human-Machine networks. Futur Gener Comput Syst 92:674–693
Buchegger S, Alpcan T (2008) Security games for vehicular networks. In: Proceedings of the 46th annual allerton conference on communication, control and computing, pp 244–251
Alpcan T, Basar T (2011).Network security: a decision and game-theoretic approach. Cambridge University Press
Chen L, Leneutre J (2009) A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans Inf Forensics Secur 4(2):165–178
Ismail Z, Leneutre J, Bateman D, Chen L (2014) A game theoretical analysis of data confidentiality attacks on smart-grid AMI. IEEE J Sel Areas Commun 32(7):1486–1499
Liu Y, Comaniciu C, Man H (2006) A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: ACM international conference proceeding series
Nguyen KC, Alpcan T, Basar T (2009) Security games with incomplete information. In: IEEE international conference on communications
Zhang Y, Tan XB (2011) Perception method of internet security based on Markov game theory model. J Softw 22(3):495–508
Hu H (2011) Strategy model of internet security based on Markov game theory. J Xi’an Jiaotong University 45(4):18–24
Fu Y (2009) Study on strategy selection of attacks and defenses of internet. J Beijing Univ Posts Telecommun 32(1):35–39
Zhu Q, Tembine H, Basar T (2010) Network security configurations: a nonzero-sum stochastic game approach. In: American control conference
Nguyen KC, Alpcan T, Basar T (2009) Stochastic games for security in networks with interdependent nodes. In: International conference on game theory for networks
Nguyen KC, Alpcan T, Basar T (2010) Security games with decision and observation errors. In: American control conference
Jiang W (2009) Security evaluation and optimal active defense based on game theory model. Chin J Comput 32(4):817–827
Sagduyu YE, Berry R, Ephremides A (2009) MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In: International conference on game theory for networks
Zhu Q, Fung C, Boutaba R, Basar T (2012) GUIDEX: a game-theoretic incentive-based mechanism for intrusion detection network. IEEE J Sel Areas Commun 30(11):2220–2230
Amin S, Schwartz GA, Sastry SS (2013) Security of interdependent and identical networked control system’s. Automatica 49(1):186–192
Maharjan S, Zhu Q, Zhag Y, Gjessing S, Basar T (2012) Dependable demand response management in the smart grid: a Stackelberg game approach. IEEE Trans Smart Grid 61(8):3693–3704
Manshaei M, Zhu Q, Alpcan T, Basar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):1–39
Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In: Proceedings of the 43rd Hawaii international conference on system sciences
Liang X, Xiao Y (2013) Game theory for network security. IEEE Commun Surv Tutor 5(1):472–486
Kang MJ, Kang JW (2016) A novel intrusion detection method using deep neural network for in-vehicle network security. Proc IEEE VTC Fall 1–5
Raya M, Manshaei MH, Felegyhazi M, Hubaux JP (2008) Revocation games in ephemeral networks. In: Proceedings of ACM conference on computer and communications security (CCS)
Acknowledgements
This work is supported by the National Key Research and Development Program of China (Grant No.: 2018YFB0803605), the National Natural Science Foundation of China (Grant No.: 61897069), and the Foundation Strengthening Program for Key Basic Research of China (Grant No.: 2017-JCJQ-ZD-043). Guoai Xu, Chengze Li and Zhimin Wu are the corresponding authors.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, Z., Zhang, M., Xu, H., Xu, G., Li, C., Wu, Z. (2020). Artificial Intelligence and Game Theory Based Security Strategies and Application Cases for Internet of Vehicles. In: Liang, Q., Wang, W., Liu, X., Na, Z., Jia, M., Zhang, B. (eds) Communications, Signal Processing, and Systems. CSPS 2019. Lecture Notes in Electrical Engineering, vol 571. Springer, Singapore. https://doi.org/10.1007/978-981-13-9409-6_38
Download citation
DOI: https://doi.org/10.1007/978-981-13-9409-6_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9408-9
Online ISBN: 978-981-13-9409-6
eBook Packages: EngineeringEngineering (R0)