Abstract
Wireless communication technology is advancing at a breakneck speed these days. The notion of the network of vehicles on net, which is a very enticing internet of things application, includes a linked car as a crucial component. The technology underpinning this programme includes all words used to define the Web of everything, the internet of all things, artificial intelligence, machine learning. Automobiles are connected to the intelligent transportation systems via intercommunications between sensors and intelligent equipment within and off the surroundings. Because the WSN handles the majority of communication, security is a critical issue. Security is a major problem with WSNs although most of the communication takes place over wireless media, increasing the probability of assaults substantially. Systems for intrusion detection, communication safety and prevention measures should be implemented, as a result, research into intrusion detection and prevention methodologies has estimated primacy in the field of study. We can classify user activities under two categories employing intrusion detection and prevention systems: conventional suspicious behaviors and activities. There is a need to analyze deep learning for wireless communications in order to create effective intrusion detection and prevention systems. The objective of this research is to propose Intrusion prevention algorithms and strategies of systems based on deep packet inspection and deep learning. A deep learning model has been described based on a convolutional Neural Network classifier in this paper. Intrusion detection and intrusion prevention are two elements of the proposed scheme. A massive number of labelled-data can be found in the proposed approach to learn and classify helpful characteristics. A convolutional neural network is used in this work to prevent intrusion into wireless sensor networks. A WSN-DS dataset is used, the recommended system's efficacy is evaluated and tested, and dataset experiments are carried out. The research analysis revealed that the developed approach has a 97% accuracy rate and outperforms the existing method tremendously. In today's smart cities, the research proposal will be useful as in encryptions techniques for Intrusion control In Vehicular Networks.








Similar content being viewed by others
References
Li, G., Boukhatem, L., & Martin, S. (2015). An intersection-based QoS routing in vehicular ad hoc networks. Mobile Networks and Applications, 20(2), 268–284.
Sarkar, S.K., Basavaraju, T.G, Puttamadappa, C. (2013). Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, 2nd ed.;CRC Press: Boca Raton, FL, USA, ISBN 978–1–4665–1446–1
Limouchi, E., & Mahgoub, I. (2020). Smart fuzzy logic-based density and distribution adaptive scheme for efficient data dissemination in vehicular Ad Hoc networks. Electronics, 9, 1297.
Leila, M.P, Teck, C.L, Chee S.L, Chun Yong, C. (2018) A Convolutional Neural Network for Network Intrusion Detection System. In: Proceedings of the APAN – Research Workshop ISBN 978–4–9905448–8–1.
Yuchen Liu., Shengli Liu and Xing Zhao. Intrusion Detection Algorithm Based on Convolutional Neural Network. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China.
Sheraz., N1, and Yasir, S. (2018). Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks. KSII Transactions on Internet and Information Systems. 12(10).
Chawla, Ashima, Lee, Brian, & Jacob, Sheila Paul. (2018). Host based Intrusion detection system with combined CNN/RNN model athlone institute of technology, Ireland. Network Anomaly Detection with Deep Learning., 978(1), 5386–1501.
Khan, Farrukh Aslam, Gumaei, Abdu, Derhab, Abdelouahid, & Hussain, Amir. (2019). TSDL: a two-stage deep learning model for efficient network intrusion detection. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2899721
Navaporn, C., Vasaka, V. (2011). Intrusion Detection by Deep Learning with Tensor Flow. In: International Conference on Advanced Communications Technology (ICACT), ISBN 979–11–88428–02–1.
Chuan, L. Y., Yuefei, Z., Jinlong, F., & Xinz He, H. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Translations., 5, 2169–3536.
Wen, H.L., Hsiao, C.L., Ping, W., Bao, H.W., Jeng, Y.T. (2018). Using Convolutional Neural Networks to Network Intrusion Detection for Cyber Threats. In: Proceedings of IEEE International Conference on Applied System Innovation, IEEE ICASI 2018- Meen, Prior & Lam (Eds).
Vijaykumar, R., et al. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access. https://doi.org/10.1109/ACCESS
Monika, R et al. (2019). Deep Learning Models for Cyber Security in IoT Networks. IEEE. 978–1–7281–0554- 3/19/$31.00©2019.
Abder, R. L., et al. (2019). A multi constrained qos compliant routing scheme for highway based vehicular networks Hindawi 2020. Wireless Communications and Mobile Computing., 2019, 18.
Kyung, A. S. (2013). Reconstruction of a secure authentication scheme for vehicular Ad Hoc networks using a binary authentication tree. IEEE Transactions on Wireless Communications., 12(11), 5386.
Gao, H., Zhuang, L et al. (2018). Densely Connected Convolutional Networks. arXiv: 1608.06993v5 [cs.CV].
Vinod, N., Geoffrey E. Hinton. (2010). Rectified Linear Units Improve Restricted Boltzmann Machines. In: Proceedings of the 27th International Conference on Machine Learning, Haifa, Israel.
Aakash, A.A., Sourabh, B.R et al. (2019). A comparative analysis and discussion of email spam classification methods using machine learning techniques. Applied Machine Learning for Smart Data Analysis. 185, CRC Press.
Bitam, S., Mellouk, A., & Fowler, S. (2015). MQBV: Multicast quality of service swarm bee routing for vehicular ad hoc networks. Wireless Communications and Mobile Computing, 15(9), 1391–1404.
Iman, A., Bassam, A. K., & Mousa, A. A. (2016). WSN-DS: a dataset for intrusion detection systems in WSNs Hindawi publishing corporation. Journal of Sensors., 2016, 1.
Umashankar, G., Jayaram, P. (2017). A study on black hole attack in wireless sensor networks. International Journal of Advance Computing Technique and Applications (IJACTA). 5(1).
Arvind, D., Amita, N et al. (2015). Gray and black hole attack identification using control packets in MANETs. In: Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015), Procedia Computer Science. 54 83-91
Patan, Nipa, & Patel, Rajan. (2017). A mechanism for prevention of flooding based DDoS attack. International Journal of Computational Intelligence Research., 13(1), 101–111.
Yan, G., Rawat, D. B., & Bista, B. B. (2012). Provisioning vehicular ad hoc networks with quality of service. International Journal of Space-Based and Situated Computing, 2(2), 104–111.
Gu, J. (2019). Introduction to the special section on machine learning-based internet of vehicles: theory, methodology, and applications. IEEE Transactions on Vehicular Technology., 68(5), 4105.
Chen, M. (2019). Artificial neural networks based machine learning for wireless networks: a tutorial. https://arxiv.org/abs/1710.02913
Hussain, R., Lee, J., & Zeadally, S. (2020). Trust in VANET: a survey of current solutions and future research opportunities. IEEE Transactions on Intelligent Transportation Systems., 22(5), 1–19.
Liu, J., Huang, S., Xu, H., Li, D., Zhong, N., & Liu, H. (2021). Cooperation promotion from the perspective of behavioral economics: an incentive mechanism based on loss aversion in vehicular Ad-Hoc networks. Electronics, 10, 225.
Wan, J., Zhang, D., Zhao, S., Yang, L., & Lloret, J. (2014). Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions. IEEE Communications Magazine, 52(8), 106–113.
Gandotra, P., Kumar Jha, R., & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. Journal of Network and Computer Applications, 78, 9–29.
Aliyu, A., Abdullah, A. H., Kaiwartya, O., Cao, Y., Lloret, J., Aslam, N., & Joda, U. (2018). Towards video streaming in IoT environments: Vehicular communication perspective. Computer Communications, 118, 93–119.
Alouache, L., Nguyeny, N., Aliouatz, M., Chelouah, R. (2018). Toward a hybrid SDN architecture for V2V communication in IoV environment. In: 2018 fifth international conference on software defined systems (SDS), (pp. 23–26), Barcelona, Spain, https://doi.org/10.1109/sds.2018.8370428.
Oche, M., Tambuwal, A. B., Chemebe, C., Noor, R. M., & Distefano, S. (2020). VANETs QoS-based routing protocols based on multi-constrained ability to support ITS infotainment services. Wireless Networks, 26(3), 1685–1715.
Sherazi, H. H. R., Khan, Z. A., Iqbal, R., Rizwan, S., Imran, M. A., & Awan, K. (2019). A heterogeneous IoV architecture for data forwarding in vehicle to infrastructure communication. https://doi.org/10.1155/2019/3101276
Shi, W., Zhou, H., Li, J., Xu, W., Zhang, N., & Shen, X. S. N. (2018). Drone assisted vehicular networks :architecture, challenges and opportunities. IEEE Network, 99, 1–8. https://doi.org/10.1109/mnet.2017.1700206
Storck, C. R., & Duarte Figueiredo, F. (2019). V2X ecosystem providing internet of vehicles special issue recent advances in software defined internet of vehicles (SDIoV). Sensors., 19(3), 1–20.
Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., & Ji, Y. (2018). Spatial intelligence towards trustworthy vehicular IoT. IEEE Communications Magazine, 56(10), 22–27. https://doi.org/10.1109/mcom.2018.1800089
Dey, K. C., Rayamajhi, A., Chowdhury, M., Bhavsar, P., & Martin, J. (2016). Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–performance evaluation. Transp Res Part C: Emerg Technol, 68, 168–184.
Awang, A., Husain, K., Kamel, N., & Aissa, S. (2017). Routing in vehicular ad-hoc networks: a survey on single- and cross-layer design techniques, and perspectives. IEEE Access, 5, 9497–9517.
Naik G., Choudhury B., Park J. (2019). IEEE 802.11bd & 5G NR V2X: evolution of radio access technologies for V2X communications. CoRR https://arxiv.org/abs/1903.08391
Islam, S., Khalifa, O. O., Hashim, A. H. A., Hasan, M. K., Razzaque, M. A., & Pandey, B. (2020). Design and evaluation of a multihoming-based mobility management scheme to support inter technology handoff in PNEMO. Wireless Personal Communications, 114(2), 1133–1153.
Alzahrani, F. A. (2020). On modeling optimizations and enhancing routing protocols for wireless multihop networks. IEEE Access, 8, 68953–68973.
Prakash, K., Philip, P.C, Paulus, R., Kumar.A. (2020). A packet fluctuation-based OLSR and efficient parameters-based OLSR routing protocols for urban vehicular ad hoc networks. In: Recent Trends in Communication and Intelligent Systems, (pp. 79–87), Springer, Berlin, Germany.
Chekkouri, A. S., Ezzouhairi, A., & Pierre, S. (2015). Connected vehicles in an intelligent transport system. Vehicular communications and networks (pp. 193–221). Woodhead Publishing.
Haziza, N., Kassab, M., Knopp, R., Härri, J., Kaltenberger, F., Agostini, P., & Aniss, H. (2013). Multi-technology vehicular cooperative system based on Software Defined Radio (SDR). International workshop on communication technologies for vehicles (pp. 84–95). Springer.
Ghazvini, A., Abdullah, S. N. H. S., Kamrul Hasan, M., & Bin Kasim, D. Z. A. (2020). Crime spatiotemporal prediction with fused objective function in time delay neural network. IEEE Access., 8, 115167–115183.
Sadiq, A. S., Khan, S., Ghafoor, K. Z., Guizani, M., & Mirjalili, S. (2018). Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information. Computer Networks, 137, 147–159.
Sadiq, A. S., Bakar, K. A., Ghafoor, K. Z., & Lloret, J. (2013). Intelligent vertical handover for heterogeneous wireless network. Proceedings of the world congress on engineering and computer science., 2, 774–779.
Al-Hader, M., Rodzi, A., Sharif, A.R., Ahmad, N. (2009). Smart city components architecture. In: 2009 International Conference On Computational Intelligence, Modelling And Simulation. (pp 93–97), IEEE
Kumar, A., Prakash, J., Dutt, V. (2014). Understanding human driving behavior through computational cognitive modeling. In: International conference on internet of vehicles. (pp 56–65), Springer
Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (SIOT)–when social networks meet the internet of things: concept, architecture and network characterization. Computer Networks, 56(16), 3594–3608.
Mehdi, K., et al. (2013). Performance modeling of safety messages broadcast in vehicular Ad Hoc networks. IEEE Transactions On Intelligent Transportation Systems., 14(1), 380–387.
Ghadhban, H. Q., & Muniyandi, R. C. (2016). Improved Kalman filter based LAR in vehicular ad hoc network. International Review on Modelling and Simulations (IREMOS), 9(5), 361–366.
Barba, C.T, Mateos, M.A, Soto, P.R, Mezher, A.M, Igartua, M.A. (2012). Smart city for VANETs using warning messages, traffic statistics and intelligent traffic lights. In: 2012 IEEE intelligent vehicles symposium. (pp 902–907), IEEE
Kanter, T, Rahmani, R, Li, Y, Xiao, B. (2014). Vehicular network enabling large-scale and real-time immersive participation. In: International conference on internet of vehicles. (pp 66–75), Springer
Balen, J. (2015). Spatio temporal distributed background data storage and management system in VANETs. In: Proceeding of the 3rd GI/ITG KuVS Fachgespräch inter-vehicle communication (FG-IVC 2015), (13(3), pp 22–25) Ulm, Germany. https://bib.irb.hr/datoteka/787684.Balen-spatio-temp.pdf
Förster, D, Bosch, R. (2015). Discussing different levels of privacy protection in vehicular ad-hoc networks. In: Proceeding of the 3rd GI/ITG KuVS Fachge spräch inter-vehicle communication (FG-IVC 2015), (13(3), pp 29–31) Ulm, Germany.
Eckhoff, D and Sommer, C. (2012). A multi-channel IEEE 1609.4 and 802.11 pedca model for the veins framework. In: Proceedings of 5th ACM/ICST International Conference on Simulation Tools and Techniques for Communications, Networks and Systems: 5th ACM/ICST International Workshop on OMNeT++, OMNeT.
Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., & Ji, Y. (2018). Spatial intelligence towards trust worthy vehicular IoT. IEEE Communications Magazine, 56(10), 22–27. https://doi.org/10.1109/mcom.2018.1800089
Eiza, M. H., Owens, T., Ni, Q., & Shi, Q. (2015). Situation-aware QoS routing algorithm for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(12), 5520–5535.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Choudhary, D., Pahuja, R. Deep Learning Approach for Encryption Techniques in Vehicular Networks. Wireless Pers Commun 125, 1–27 (2022). https://doi.org/10.1007/s11277-022-09538-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09538-9