Skip to main content
Log in

A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the rapid development of Internet of Vehicles (IoV) technology, Intelligent Connected Vehicles (ICVs) have richer vehicle information functions and applications. In recent years, as ICVs have become more complex and intelligent, vehicle information security is facing great threats and challenges. Therefore, it is of great significance to develop efficient intrusion detection methods to protect the information security of IoV. In this paper, after analyzing the vulnerability of intra-vehicle networks (IVNs) and external vehicle networks (EVNs), we propose a lightweight intrusion detection method, which uses MobileNetv2 as the backbone, combines transfer learning (TL) techniques and the hyper-parameter optimization (HPO) method. The proposed method can detect various types of attacks, and the Accuracy, Precision, and Recall on the Car-Hacking dataset representing IVNs data are all 100 \(\mathrm{\%}\). The Accuracy, Precision, and Recall on the CICIDS2017 dataset representing EVNs data are all 99.93 \(\mathrm{\%}\). The average processing time of each packet tested is about 0.75 ms, and the model space is 23 M. Experimental results demonstrate that the proposed intrusion detection method is effective and lightweight.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

All data can be obtained by contacting the first author.

Notes

  1. The complete Car-Hacking dataset is publicly available at: https://ocslab.hksecurity.net/Datasets/CAN-intrusion-dataset

  2. The CICIDS2017 dataset is publicly available at: https://www.unb.ca/cic/datasets/ids-2017.html

  3. code for the major modules is available at: https://github.com/cailv/demo

References

  1. Ali Alheeti KM, McDonald-Maier K (2018) Intelligent intrusion detection in external communication systems for autonomous vehicles. Syst Sci Control Eng 6(1):48–56

    Article  Google Scholar 

  2. Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw 90:101842

    Article  Google Scholar 

  3. Alshammari A, Zohdy MA, Debnath D, Corser G (2018) Classification approach for intrusion detection in vehicle systems. Wirel Eng Technol 9(4):79–94

    Article  Google Scholar 

  4. Al-Jarrah OY, Maple C, Dianati M, Oxtoby D, Mouzakitis A (2019) Intrusion detection systems for intra-vehicle networks: A review. IEEE Access 7:21266–21289

    Article  Google Scholar 

  5. Ang L-M, Seng KP, Ijemaru GK, Zungeru AM (2018) Deployment of iov for smart cities: Applications, architecture, and challenges. IEEE access 7:6473–6492

    Article  Google Scholar 

  6. Ashoor AS, Gore S (2011) Importance of intrusion detection system (ids). Int J Sci Eng Res 2(1):1–4

    Google Scholar 

  7. Aswal K, Dobhal DC, Pathak H (2020) Comparative analysis of machine learning algorithms for identification of bot attack on the internet of vehicles (iov). In 2020 International Conference on Inventive Computation Technologies (ICICT), pages 312–317. IEEE

  8. Barletta VS, Caivano D, Nannavecchia A, Scalera M (2020) A kohonen som architecture for intrusion detection on in-vehicle communication networks. Appl Sci 10(15):5062

    Article  CAS  Google Scholar 

  9. Chen Z (2022) Research on internet security situation awareness prediction technology based on improved rbf neural network algorithm. J Comput Cogn Eng 1(3):103–108

    MathSciNet  Google Scholar 

  10. Cozza F, Guarino A, Isernia F, Malandrino D, Rapuano A, Schiavone R, Zaccagnino R (2020) Hybrid and lightweight detection of third party tracking: Design, implementation, and evaluation. Comput Netw 167:106993

    Article  Google Scholar 

  11. Das S, Namasudra S (2023) Lightweight and efficient privacy‐preserving mutual authentication scheme to secure internet of things‐based smart healthcare. Transactions on Emerging Telecommunications Technologies, e4716. https://doi.org/10.1002/ett.4716

  12. Faraoun KM, Boukelif A (2006) Neural networks learning improvement using the k-means clustering algorithm to detect network intrusions. INFOCOMP J Comput Sci 5(3):28–36

    Google Scholar 

  13. Fu B, Dong Y, Fu S, Mao Y, Thanh DNH (2022) Learning domain transfer for unsupervised magnetic resonance imaging restoration and edge enhancement. Int J Imaging Syst Technol 32(1):144–154

    Article  Google Scholar 

  14. Gao Y, Hongrui Wu, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–154571

    Article  Google Scholar 

  15. Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing. CAAI Transactions on Intelligence Technology. https://doi.org/10.1049/cit2.12093

  16. He H, Huang G, Zhang B, Zheng Z (2022). Research on DoS traffic detection model based on random forest and multilayer perceptron. Security and Communication Networks. https://doi.org/10.11552/2022/2076987

  17. Howard A G, Zhu M, Chen B, Kalenichenko D, Wang W, Weyand T, Adam H (2017) Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861. https://doi.org/10.4855/arXiv.1704.04861

  18. Injadat M, Moubayed A, Nassif AB, Shami A (2020) Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans Netw Serv Manag 18(2):1803–1816

    Article  Google Scholar 

  19. Kapoor A, Kumar P, Mishra R (2022) High gain modified vivaldi vehicular antenna for iov communications in 5g network. Heliyon 8(5):e09336

    Article  PubMed  PubMed Central  Google Scholar 

  20. Khamparia A, Bharati S, Podder P, Gupta D, Khanna A, Phung TK, Thanh DNH (2021) Diagnosis of breast cancer based on modern mammography using hybrid transfer learning. Multidim Syst Signal Process 32:747–765

    Article  Google Scholar 

  21. Lee H, Jeong SH, Kim HK (2017) Otids: A novel intrusion detection system for in-vehicle network by using remote frame. In 2017 15th Annual Conference on Privacy, Security and Trust (PST), pages 57–5709. IEEE

  22. Leonardo MM, Carvalho TJ, Rezende E, Zucchi R, Faria FA (2018) Deep feature-based classifiers for fruit fly identification (diptera: Tephritidae). In 2018 31st SIBGRAPI conference on graphics, patterns and images (SIBGRAPI), pages 41–47. IEEE

  23. Liang H, Jagielski M, Zheng B, Lin C-W, Kang E, Shiraishi S, Nita-Rotaru C, Zhu Q (2018) Network and system level security in connected vehicle applications. In 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 1–7. IEEE

  24. Liu J, Zhang S, Sun W, Shi Y (2017) In-vehicle network attacks and countermeasures: Challenges and future directions. IEEE Netw 31(5):50–58

    Article  CAS  Google Scholar 

  25. Lokman SF, Othman AT, Abu Bakar MH, Razuwan R (2018) Stacked sparse autoencodersbased outlier discovery for in-vehicle controller area network (can). Int J Eng Technol 7(4.33):375–380

    Google Scholar 

  26. Luo A (2022) Intrusion detection system for internet of vehicles based on ensemble learning and cnn. In Journal of Physics: Conference Series, volume 2414, page 012014. IOP Publishing

  27. Lu S-Y, Wang S-H, Zhang Y-D (2020) A classification method for brain mri via mobilenet and feedforward network with random weights. Pattern Recogn Lett 140:252–260

    Article  ADS  Google Scholar 

  28. Mehedi ST, Anwar A, Rahman Z, Ahmed K (2021) Deep transfer learning based intrusion detection system for electric vehicular networks. Sensors 21(14):4736

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  29. Min E, Long J, Liu Q, Cui J, Cai Z, Ma J (2018) Su-ids: A semi-supervised and unsupervised framework for network intrusion detection. In Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III 4 (pp. 322–334). Springer 

  30. Namasudra S, Devi D, Choudhary S, Patan R, Kallam S (2018) Security, privacy, trust, and anonymity. In Advances of DNA computing in cryptography (pp. 138–150). Chapman and Hall/CRC

  31. Olufowobi H, Ezeobi U, Muhati E, Robinson G, Young C, Zambreno J, Bloom G (2019) Anomaly detection approach using adaptive cumulative sum algorithm for controller area network. In Proceedings of the ACM Workshop on Automotive Cybersecurity (pp. 25–30). https://doi.org/10.1145/3309171.3309178

  32. Olufowobi H, Young C, Zambreno J, Bloom G (2019) Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing. IEEE Trans Veh Technol 69(2):1484–1494

    Article  Google Scholar 

  33. Petrov D, Hospedales TM (2019) Measuring the transferability of adversarial examples. arXiv preprint arXiv:1907.06291. https://doi.org/10.48550/arXiv.1907.06291

  34. Rosay A, Carlier F, Leroux P (2020) Feed-forward neural network for Network Intrusion Detection. In 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring) (pp. 1-6). IEEE

  35. Sandler M, Howard A, Zhu M, Zhmoginov A, Chen LC (2018) Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 4510-4520). https://doi.org/10.48550/arXiv.1801.04381

  36. Schmidt DA, Khan MS (2020) Bennett BT (2020) Spline-based intrusion detection for vanet utilizing knot flow classification. Internet Technol Lett 3(3):e155

    Article  Google Scholar 

  37. Seo, E., Song, H. M., & Kim, H. K. (2018, August). GIDS: GAN based intrusion detection system for in-vehicle network. In 2018 16th Annual Conference on Privacy, Security and Trust (PST) (pp. 1-6). IEEE

  38. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108–116

    Google Scholar 

  39. Shen J, Robertson N (2021) Bbas: Towards large scale effective ensemble adversarial attacks against deep neural network learning. Inf Sci 569:469–478

    Article  Google Scholar 

  40. Siddiqi MA, Pak W (2022) Tier-based optimization for synthesized network intrusion detection system. IEEE Access 10:108530–108544

    Article  Google Scholar 

  41. Song HM, Woo J, Kim HK (2020) In-vehicle network intrusion detection using deep convolutional neural network. Veh Commun 21:100198

    Google Scholar 

  42. Tai TT, Thanh DNH, Hung NQ (2022) A dish recognition framework using transfer learning. IEEE Access 10:7793–7799

    Article  Google Scholar 

  43. Tripathy MR, Ranjan P, Kumar A, Kumar S (2015) A compact dual band antenna for iov applications. In Internet of Vehicles-Safe and Intelligent Mobility: Second International Conference, IOV 2015, Chengdu, China, December 19–21, 2015, Proceedings 2, pages 315–323. Springer

  44. Verma R, Kumari A, Anand A, Yadavalli, VSS (2022) Revisiting shift cipher technique for amplified data security. J Cogn Eng Decis Mak 2(2). https://doi.org/10.47852/bonviewJCCE2202261

  45. Wang L, Qian X, Zhang Y, Shen J, Cao X (2019) Enhancing sketch-based image retrieval by cnn semantic re-ranking. IEEE Trans Cybernet 50(7):3330–3342

    Article  Google Scholar 

  46. Wang Q, Qian Y, Lu Z, Shoukry Y, Qu G (2018) A delay based plug-in-monitor for intrusion detection in controller area network. In 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pages 86–91. IEEE

  47. Wani A, Khaliq R (2021) Sdn-based intrusion detection system for iot using deep learning classifier (idsiot-sdl). CAAI Trans Intell Technol 6(3):281–290

    Article  Google Scholar 

  48. Yang Li, Moubayed A, Shami A, Heidari P, Boukhtouta A, Larabi A, Brunner R, Preda S, Migault D (2021) Multi-perspective content delivery networks security framework using optimized unsupervised anomaly detection. IEEE Trans Netw Serv Manage 19(1):686–705

    Article  Google Scholar 

  49. Yang Li, Moubayed A, Shami A (2021) Mth-ids: a multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J 9(1):616–632

    Article  Google Scholar 

  50. Yang Li, Shami A (2020) On hyperparameter optimization of machine learning algorithms: Theory and practice. Neurocomputing 415:295–316

    Article  Google Scholar 

  51. Yang L,  Shami A (2022) A transfer learning and optimized CNN based intrusion detection system for Internet of Vehicles. In ICC 2022-IEEE International Conference on Communications (pp. 2774-2779). IEEE. https://doi.org/10.48550/arXiv.2201.11812

  52. Yang L (2018) Comprehensive visibility indicator algorithm for adaptable speed limit control in intelligent transportation systems. PhD thesis, University of Guelph

  53. Yao Y, Su L, Lu Z, Liu B (2019) Stdeepgraph: Spatial-temporal deep learning on communication graphs for long-term network attack detection. In 2019 18th IEEE International Conference on Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pages 120–127. IEEE

  54. Yuan H, Cheng J, Yanrui Wu, Zeng Z (2022) Low-res mobilenet: An efficient lightweight network for low-resolution image classification in resource-constrained scenarios. Multimedia Tools Appl 81(27):38513–38530

    Article  Google Scholar 

  55. Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37

    Article  Google Scholar 

  56. Zhou C, Guo D, Li J, Rong A, Liang S, Lin X (2021) Optimization of car-sharing scheduling based on genetic combined with simulated annealing strategy. In 2021 3rd International Academic Exchange Conference on Science and Technology Innovation (IAECST), pages 383–386. IEEE

Download references

Funding

This work was supported in part by the Jilin Scientific and Technological Development Program under Grant (20200401132GX and 20210101166JC).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Mi Zou or Yanhua Liang.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix 1

Appendix 1

Table 6 List of Abbreviations

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Y., Qin, G., Zou, M. et al. A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization. Multimed Tools Appl 83, 22347–22369 (2024). https://doi.org/10.1007/s11042-023-15771-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15771-6

Keywords

Navigation