Skip to main content
Top
Published in: The Journal of Supercomputing 7/2021

04-01-2021

SS-ITS: secure scalable intelligent transportation systems

Authors: Asma Belhadi, Youcef Djenouri, Gautam Srivastava, Jerry Chun-Wei Lin

Published in: The Journal of Supercomputing | Issue 7/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper introduces a secure and scalable intelligent transportation and human behavior system to accurately discover knowledge from urban traffic data. The data are secured using blockchain learning technology, where the scalability is ensured by a threaded GPU. In addition, different optimizations are provided to efficiently process data on the GPU. A reinforcement deep learning algorithm is also established to merge local knowledge discovered on each site into global knowledge. To demonstrate the applicability of the proposed framework, intensive experiments have been carried out on well-known intelligent transportation and human behavior data. Our results show that our proposed framework outperforms the baseline solutions for the outlier detection use case.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Alsrehin NO, Klaib AF, Magableh A (2019) Intelligent rransportation and control systems using data mining and machine learning techniques: a comprehensive study. IEEE Access 7:49830–49857CrossRef Alsrehin NO, Klaib AF, Magableh A (2019) Intelligent rransportation and control systems using data mining and machine learning techniques: a comprehensive study. IEEE Access 7:49830–49857CrossRef
3.
go back to reference Atluri G, Karpatne A, Kumar V (2018) Spatio-temporal data mining: a survey of problems and methods. ACM Comput Surveys 51(4):1–41CrossRef Atluri G, Karpatne A, Kumar V (2018) Spatio-temporal data mining: a survey of problems and methods. ACM Comput Surveys 51(4):1–41CrossRef
4.
go back to reference Belhadi A, Djenouri Y, Lin JCW (2019)Comparative study on trajectory outlier detection algorithms. In: IEEEE international conference on data mining workshops, pp. 415–423 Belhadi A, Djenouri Y, Lin JCW (2019)Comparative study on trajectory outlier detection algorithms. In: IEEEE international conference on data mining workshops, pp. 415–423
5.
go back to reference Bhowmick K, Narvekar M (2018) Trajectory outlier detection for traffic events: a survey. In: Bhalla S, Bhateja V, Chandavale A, Hiwale A, Satapathy S (eds) Intelligent computing and information and communication. Advances in intelligent systems and computing, vol 673. Springer, Singapore. https://doi.org/10.1007/978-981-10-7245-1_5CrossRef Bhowmick K, Narvekar M (2018) Trajectory outlier detection for traffic events: a survey. In: Bhalla S, Bhateja V, Chandavale A, Hiwale A, Satapathy S (eds) Intelligent computing and information and communication. Advances in intelligent systems and computing, vol 673. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-10-7245-1_​5CrossRef
6.
go back to reference Breunig MM, Kriegel HP, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. ACM SIGMOD Record 29:93–104CrossRef Breunig MM, Kriegel HP, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. ACM SIGMOD Record 29:93–104CrossRef
8.
go back to reference Chandola V, Banerjee A, Kumar V (2010) Anomaly detection for discrete sequences: A survey. IEEE Trans Knowl Data Eng 24(5):823–839CrossRef Chandola V, Banerjee A, Kumar V (2010) Anomaly detection for discrete sequences: A survey. IEEE Trans Knowl Data Eng 24(5):823–839CrossRef
9.
go back to reference Chen Q, Srivastava G, Parizi RM, Aloqaily M, Al Ridhawi I (2020) An incentive-aware blockchain-based solution for internet of fake media things. Inf Process Manag 57:102370CrossRef Chen Q, Srivastava G, Parizi RM, Aloqaily M, Al Ridhawi I (2020) An incentive-aware blockchain-based solution for internet of fake media things. Inf Process Manag 57:102370CrossRef
10.
go back to reference Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y (2019) Blockchain and deep reinforcement learning empowered intelligent 5g beyond. IEEE Netw 33(3):10–17CrossRef Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y (2019) Blockchain and deep reinforcement learning empowered intelligent 5g beyond. IEEE Netw 33(3):10–17CrossRef
11.
go back to reference Dai Y, Xu D, Zhang K, Maharjan S, Zhang Y (2020) Deep reinforcement learning and permissioned blockchain for content caching in vehicular edge computing and networks. IEEE Trans Veh Technol 69(4):4312–4324CrossRef Dai Y, Xu D, Zhang K, Maharjan S, Zhang Y (2020) Deep reinforcement learning and permissioned blockchain for content caching in vehicular edge computing and networks. IEEE Trans Veh Technol 69(4):4312–4324CrossRef
12.
go back to reference Djenouri Youcef AZ, Chiarandini M (2018)Outlier detection in urban traffic flow distributions. In: IEEE international conference on data mining, pp. 935–940 Djenouri Youcef AZ, Chiarandini M (2018)Outlier detection in urban traffic flow distributions. In: IEEE international conference on data mining, pp. 935–940
13.
go back to reference Djenouri Y, Belhadi A, Fournier-Viger P, Fujita H (2018) Mining diversified association rules in big datasets: A cluster/GPU/genetic approach. Inf Sci 459:117–134MathSciNetCrossRef Djenouri Y, Belhadi A, Fournier-Viger P, Fujita H (2018) Mining diversified association rules in big datasets: A cluster/GPU/genetic approach. Inf Sci 459:117–134MathSciNetCrossRef
14.
go back to reference Djenouri Y, Belhadi A, Lin JCW, Djenouri D, Cano A (2019) A survey on urban traffic anomalies detection algorithms. IEEE Access 7:12192–12205CrossRef Djenouri Y, Belhadi A, Lin JCW, Djenouri D, Cano A (2019) A survey on urban traffic anomalies detection algorithms. IEEE Access 7:12192–12205CrossRef
15.
go back to reference Djenouri Y, Bendjoudi A, Habbas Z, Mehdi M, Djenouri D (2017) Reducing thread divergence in gpu-based bees swarm optimization applied to association rule mining. Concurr Comput Pract Exp 29(9):e3836CrossRef Djenouri Y, Bendjoudi A, Habbas Z, Mehdi M, Djenouri D (2017) Reducing thread divergence in gpu-based bees swarm optimization applied to association rule mining. Concurr Comput Pract Exp 29(9):e3836CrossRef
16.
go back to reference Djenouri Y, Bendjoudi A, Mehdi M, Nouali-Taboudjemat N, Habbas Z (2015) Gpu-based bees swarm optimization for association rules mining. J Supercomput 71(4):1318–1344CrossRef Djenouri Y, Bendjoudi A, Mehdi M, Nouali-Taboudjemat N, Habbas Z (2015) Gpu-based bees swarm optimization for association rules mining. J Supercomput 71(4):1318–1344CrossRef
17.
go back to reference Djenouri Y, Djenouri D, Belhadi A, Cano A (2018) Exploiting GPU and cluster parallelism in single scan frequent itemset mining. Inf Sci 496:363–377CrossRef Djenouri Y, Djenouri D, Belhadi A, Cano A (2018) Exploiting GPU and cluster parallelism in single scan frequent itemset mining. Inf Sci 496:363–377CrossRef
19.
go back to reference Djenouri Y, Zimek A (2018) Outlier detection in urban traffic data. In: International Conference on Web Intelligence, Mining and Semantics, p. 3 Djenouri Y, Zimek A (2018) Outlier detection in urban traffic data. In: International Conference on Web Intelligence, Mining and Semantics, p. 3
20.
go back to reference Doshi K, Yilmaz Y (2020) Fast unsupervised anomaly detection in traffic videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 624–625 Doshi K, Yilmaz Y (2020) Fast unsupervised anomaly detection in traffic videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 624–625
22.
go back to reference Feng Z, Zhu Y (2016) A survey on trajectory data mining: Techniques and applications. IEEE Access 4:2056–2067CrossRef Feng Z, Zhu Y (2016) A survey on trajectory data mining: Techniques and applications. IEEE Access 4:2056–2067CrossRef
23.
go back to reference Feremans L, Vercruyssen V, Cule B, Meert W (2019) Goethals B Pattern-based anomaly detection in mixed-type time series. In: Joint European conference on machine learning and knowledge discovery in databases, pp. 240–256 Feremans L, Vercruyssen V, Cule B, Meert W (2019) Goethals B Pattern-based anomaly detection in mixed-type time series. In: Joint European conference on machine learning and knowledge discovery in databases, pp. 240–256
24.
go back to reference Gupta M, Gao J, Aggarwal CC, Han J (2014) Outlier detection for temporal data: A survey. IEEE Trans Knowl Data Eng 26(9):2250–2267CrossRef Gupta M, Gao J, Aggarwal CC, Han J (2014) Outlier detection for temporal data: A survey. IEEE Trans Knowl Data Eng 26(9):2250–2267CrossRef
25.
go back to reference Kong X, Song X, Xia F, Guo H, Wang J, Tolba A (2018) Lotad: Long-term traffic anomaly detection based on crowdsourced bus trajectory data. World Wide Web 21(3):825–847CrossRef Kong X, Song X, Xia F, Guo H, Wang J, Tolba A (2018) Lotad: Long-term traffic anomaly detection based on crowdsourced bus trajectory data. World Wide Web 21(3):825–847CrossRef
26.
go back to reference Li, X. Jiang, P., Chen, T., Luo, X., Wen, Q. (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853CrossRef Li, X. Jiang, P., Chen, T., Luo, X., Wen, Q. (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853CrossRef
27.
go back to reference Li W, Song H, Zeng F (2018) Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet Things J 5(2):716–723CrossRef Li W, Song H, Zeng F (2018) Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE Internet Things J 5(2):716–723CrossRef
28.
go back to reference Liu CH, Lin Q, Wen S (2018) Blockchain-enabled data collection and sharing for industrial iot with deep reinforcement learning. IEEE Trans Ind Inf 15(6):3516–3526CrossRef Liu CH, Lin Q, Wen S (2018) Blockchain-enabled data collection and sharing for industrial iot with deep reinforcement learning. IEEE Trans Ind Inf 15(6):3516–3526CrossRef
29.
go back to reference Liu M, Yu FR, Teng Y, Leung VC, Song M (2019) Performance optimization for blockchain-enabled industrial internet of things (iiot) systems: A deep reinforcement learning approach. IEEE Trans Ind Inf 15(6):3559–3570CrossRef Liu M, Yu FR, Teng Y, Leung VC, Song M (2019) Performance optimization for blockchain-enabled industrial internet of things (iiot) systems: A deep reinforcement learning approach. IEEE Trans Ind Inf 15(6):3559–3570CrossRef
32.
go back to reference Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311CrossRef Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311CrossRef
33.
go back to reference Luo J, Chen Q, Richard Yu F, Tang L (2020) Blockchain-enabled software-defined industrial internet of things with deep reinforcement learning. IEEE Internet Things J 7(6):5466–5480CrossRef Luo J, Chen Q, Richard Yu F, Tang L (2020) Blockchain-enabled software-defined industrial internet of things with deep reinforcement learning. IEEE Internet Things J 7(6):5466–5480CrossRef
34.
go back to reference Meng F, Yuan G, Lv S, Wang Z, Xia S (2019) An overview on trajectory outlier detection. Artif Intell Rev 52(4):2437–2456CrossRef Meng F, Yuan G, Lv S, Wang Z, Xia S (2019) An overview on trajectory outlier detection. Artif Intell Rev 52(4):2437–2456CrossRef
35.
go back to reference Na GS, Kim D, Yu H (2018)Dilof: Effective and memory efficient local outlier detection in data streams. In: ACM International conference on knowledge discovery & data mining, pp. 1993–2002 Na GS, Kim D, Yu H (2018)Dilof: Effective and memory efficient local outlier detection in data streams. In: ACM International conference on knowledge discovery & data mining, pp. 1993–2002
36.
go back to reference Nesa N, Ghosh T, Banerjee I (2018) Non-parametric sequence-based learning approach for outlier detection in iot. Future Gener Comput Syst 82:412–421CrossRef Nesa N, Ghosh T, Banerjee I (2018) Non-parametric sequence-based learning approach for outlier detection in iot. Future Gener Comput Syst 82:412–421CrossRef
37.
go back to reference Połap D, Srivastava G, Jolfaei A, Parizi RM (2020)Blockchain technology and neural networks for the internet of medical things. In: IEEE conference on computer communications workshops, pp. 508–513 Połap D, Srivastava G, Jolfaei A, Parizi RM (2020)Blockchain technology and neural networks for the internet of medical things. In: IEEE conference on computer communications workshops, pp. 508–513
38.
go back to reference Qiu C, Yu FR, Yao H, Jiang C, Xu F, Zhao C (2018) Blockchain-based software-defined industrial internet of things: A dueling deep q-learning approach. IEEE Internet Things J 6(3):4627–4639CrossRef Qiu C, Yu FR, Yao H, Jiang C, Xu F, Zhao C (2018) Blockchain-based software-defined industrial internet of things: A dueling deep q-learning approach. IEEE Internet Things J 6(3):4627–4639CrossRef
41.
go back to reference Roberge V, Tarbouchi M, Labonté G (2018) Fast genetic algorithm path planner for fixed-wing military UAV Using GPU. IEEE Trans Aerosp Electron Syst 54(5):2105–2117CrossRef Roberge V, Tarbouchi M, Labonté G (2018) Fast genetic algorithm path planner for fixed-wing military UAV Using GPU. IEEE Trans Aerosp Electron Syst 54(5):2105–2117CrossRef
42.
go back to reference Schubert E, Zimek A, Kriegel HP (2014) Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min Knowl Discov 28(1):190–237MathSciNetCrossRef Schubert E, Zimek A, Kriegel HP (2014) Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min Knowl Discov 28(1):190–237MathSciNetCrossRef
43.
go back to reference Sezer OB, Gudelek MU, Ozbayoglu AM (2020) Financial time series forecasting with deep learning: A systematic literature review: 2005–2019. Appl Soft Comput 90:106181CrossRef Sezer OB, Gudelek MU, Ozbayoglu AM (2020) Financial time series forecasting with deep learning: A systematic literature review: 2005–2019. Appl Soft Comput 90:106181CrossRef
44.
go back to reference Singh K, Upadhyaya S (2012) Outlier detection: applications and techniques. Int J Comput Sci Issues 9(1):307 Singh K, Upadhyaya S (2012) Outlier detection: applications and techniques. Int J Comput Sci Issues 9(1):307
45.
go back to reference Vercruyssen V, Meert W, Davis J (2020) Transfer learning for anomaly detection through localized and unsupervised instance selection. In: AAAI conference on artificial intelligence, pp. 6054–6061 Vercruyssen V, Meert W, Davis J (2020) Transfer learning for anomaly detection through localized and unsupervised instance selection. In: AAAI conference on artificial intelligence, pp. 6054–6061
46.
go back to reference Wang F, Li M, Mei Y, Li W (2020) Time series data mining: A case study with big data analytics approach. IEEE Access 8:14322–14328CrossRef Wang F, Li M, Mei Y, Li W (2020) Time series data mining: A case study with big data analytics approach. IEEE Access 8:14322–14328CrossRef
48.
go back to reference Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutor 22:1432–1465CrossRef Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutor 22:1432–1465CrossRef
49.
go back to reference Yu T, Wang X, Shami A (2017) Recursive principal component analysis-based data outlier detection and sensor data aggregation in iot systems. IEEE Internet Things J 4(6):2207–2216CrossRef Yu T, Wang X, Shami A (2017) Recursive principal component analysis-based data outlier detection and sensor data aggregation in iot systems. IEEE Internet Things J 4(6):2207–2216CrossRef
50.
go back to reference Yu Z, Yoon JS, Venkatesh P, Park J, Yu J, Park HS (2018)Humbi 1.0: Human multiview behavioral imaging dataset. arXiv preprint arXiv:1812.00281 Yu Z, Yoon JS, Venkatesh P, Park J, Yu J, Park HS (2018)Humbi 1.0: Human multiview behavioral imaging dataset. arXiv preprint arXiv:​1812.​00281
51.
go back to reference Zhang C, Song D, Chen Y, Feng X, Lumezanu C, Cheng W, Ni J, Zong B, Chen H, Chawla NV (2019) A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In: The International Conference on Artificial Intelligence vol. 33, pp. 1409–1416 Zhang C, Song D, Chen Y, Feng X, Lumezanu C, Cheng W, Ni J, Zong B, Chen H, Chawla NV (2019) A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In: The International Conference on Artificial Intelligence vol. 33, pp. 1409–1416
52.
go back to reference Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern Part C (Applications and Reviews) 38(5):649–659CrossRef Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern Part C (Applications and Reviews) 38(5):649–659CrossRef
53.
go back to reference Zheng Y (2015) Trajectory data mining: an overview. ACM Trans Intell Syst Technol 6(3):29CrossRef Zheng Y (2015) Trajectory data mining: an overview. ACM Trans Intell Syst Technol 6(3):29CrossRef
54.
go back to reference Zheng Y, Capra L, Wolfson O, Yang H (2014) Urban computing: concepts, methodologies, and applications. ACM Trans Intell Syst Technol 5(3):38 Zheng Y, Capra L, Wolfson O, Yang H (2014) Urban computing: concepts, methodologies, and applications. ACM Trans Intell Syst Technol 5(3):38
55.
go back to reference Zhou G, Bo R, Chien L, Zhang X, Yang S, Su D (2018) GPU-accelerated algorithm for online probabilistic power flow. IEEE Trans Power Syst 33(1):1132–1135CrossRef Zhou G, Bo R, Chien L, Zhang X, Yang S, Su D (2018) GPU-accelerated algorithm for online probabilistic power flow. IEEE Trans Power Syst 33(1):1132–1135CrossRef
Metadata
Title
SS-ITS: secure scalable intelligent transportation systems
Authors
Asma Belhadi
Youcef Djenouri
Gautam Srivastava
Jerry Chun-Wei Lin
Publication date
04-01-2021
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 7/2021
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03582-7

Other articles of this Issue 7/2021

The Journal of Supercomputing 7/2021 Go to the issue

Premium Partner