Skip to main content

Cyber Security and Privacy of Connected and Automated Vehicles (CAVs)-Based Federated Learning: Challenges, Opportunities, and Open Issues

  • Chapter
  • First Online:
Federated Learning for IoT Applications

Abstract

Connected and automated vehicles (CAVs) are becoming a reality. Prototyping and testing of self-driving vehicle technology are becoming more popular around the world. The secure deployment of self-driving vehicles necessitates a wide range of technology, competencies, and procedures, all of which must be thoroughly checked and assessed, as road safety may be a risk. As a result, it’s critical to recognize and develop a thorough understanding of the cyber security and privacy concerns with CAVs and of the way these can be prioritized as well as addressed. This chapter investigates falsified information attacks against the RSU’s ongoing FL operation. We discovered a variety of attack tactics used by malicious CAVs to disrupt global system training in vehicular ad hoc networks (VANETs). In which, demonstrate the attacks effectively increased the convergence time and reduced the model’s accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. F. Ahmad, A. Adnane, V.N. Franqueira, A systematic approach for cyber security in vehicular networks (2016)

    Google Scholar 

  2. A. Alnasser, H. Sun, J. Jiang, Cyber security challenges and solutions for V2X communications: A survey. Comput. Netw. 151, 52–67 (2019)

    Article  Google Scholar 

  3. K. Bonawitz, H. Eichner, W. Grieskamp, D. Huba, A. Ingerman, V. Ivanov, ... , J. Roselander, Towards federated learning at scale: System design. arXiv preprint arXiv:1902.01046 (2019)

    Google Scholar 

  4. E. Bagdasaryan, O. Poursaeed, V. Shmatikov, Differential privacy has disparate impact on model accuracy. Adv. Neural Inf. Proces. Syst. 32, 15479–15488 (2019)

    Google Scholar 

  5. P. Blanchard, E.M. El Mhamdi, R. Guerraoui, J. Stainer, Machine learning with adversaries: Byzantine tolerant gradient descent, in Proceedings of the 31st International Conference on Neural Information Processing Systems (2017, December), pp. 118–128

    Google Scholar 

  6. M. Chowdhury, K.C. Wang, Distributed intelligent traffic sensor networks, in Transport Science and Technology, (Emerald Group Publishing Limited, 2006)

    Google Scholar 

  7. Z. Chai, H. Fayyaz, Z. Fayyaz, A. Anwar, Y. Zhou, N. Baracaldo, ..., Y. Cheng, Towards taming the resource and data heterogeneity in federated learning, in 2019 {USENIX} Conference on Operational Machine Learning (OpML 19) (2019), pp. 19–21

    Google Scholar 

  8. R. Canetti, U. Feige, O. Goldreich, M. Naor, Adaptively secure multi-party computation, in Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (1996, July), pp. 639–648

    Google Scholar 

  9. D. Cao, S. Chang, Z. Lin, G. Liu, D. Sun, Understanding distributed poisoning attack in federated learning, in 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS). IEEE (2019, December), pp. 233–239

    Google Scholar 

  10. R. Colbaugh, K. Glass, Moving target defense for adaptive adversaries, in 2013 IEEE International Conference on Intelligence and Security Informatics. IEEE (2013, June), pp. 50–55

    Google Scholar 

  11. Du, Zhaoyang, Celimuge Wu, Tsutomu Yoshinaga, Kok-Lim Alvin Yau, Yusheng Ji, and Jie Li. “Federated learning for vehicular internet of things: Recent advances and open issues.” IEEE Open Journal of the Computer Society 1 (2020): 45–61

    Google Scholar 

  12. Z. El-Rewini, K. Sadatsharan, D.F. Selvaraj, S.J. Plathottam, P. Ranganathan, Cybersecurity challenges in vehicular communications. Vehicular Commun. 23, 100214 (2020)

    Article  Google Scholar 

  13. K.C. Dey, A. Mishra, M. Chowdhury, Potential of intelligent transportation systems in mitigating adverse weather impacts on road mobility: A review. IEEE Trans. Intell. Transp. Syst. 16(3), 1107–1119 (2014)

    Article  Google Scholar 

  14. C. Fung, C.J. Yoon, I. Beschastnikh, Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866 (2018)

    Google Scholar 

  15. Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, X. Du, Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)

    Article  Google Scholar 

  16. D.L. Guidoni, G. Maia, F.S. Souza, L.A. Villas, A.A. Loureiro, Vehicular traffic management based on traffic engineering for vehicular ad hoc networks. IEEE Access 8, 45167–45183 (2020)

    Article  Google Scholar 

  17. M. Hao, H. Li, X. Luo, G. Xu, H. Yang, S. Liu, Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Trans. Indust. Inform. 16(10), 6532–6542 (2019)

    Article  Google Scholar 

  18. J. Hayes, O. Ohrimenko, Contamination attacks and mitigation in multi-party machine learning. arXiv preprint arXiv:1901.02402 (2019)

    Google Scholar 

  19. N. Hussain, P. Rani, Comparative Studied Based on Attack Resilient and Efficient Protocol with Intrusion Detection System Based on Deep Neural Network for Vehicular System Security. Distributed Artificial Intelligence: A Modern Approach, 217 (2020)

    Google Scholar 

  20. R. Ito, M. Tsukada, H. Matsutani, An on-device federated learning approach for cooperative anomaly detection. arXiv preprint arXiv:2002.12301 (2020)

    Google Scholar 

  21. S. Jajodia, H.C. van van Tilborg (Eds.), Encyclopedia of Cryptography and Security: A-K. Springer (2011)

    Google Scholar 

  22. Y. Jiang, S. Wang, B.J. Ko, W.H. Lee, L. Tassiulas, Model pruning enables efficient federated learning on edge devices. arXiv preprint arXiv:1909.12326 (2019)

    Google Scholar 

  23. P. Kairouz, H.B. McMahan, B. Avent, A. Bellet, M. Bennis, A.N. Bhagoji, ..., S. Zhao, Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019)

    Google Scholar 

  24. M. Kuderer, S. Gulati, W. Burgard, Learning driving styles for autonomous vehicles from demonstration, in 2015 IEEE International Conference on Robotics and Automation (ICRA). IEEE (2015, May), pp. 2641–2646

    Google Scholar 

  25. D. Li, J. Wang, Fedmd: Heterogenous federated learning via model distillation. arXiv preprint arXiv:1910.03581 (2019)

    Google Scholar 

  26. T. Li, M. Sanjabi, A. Beirami, V. Smith, Fair resource allocation in federated learning. arXiv preprint arXiv:1905.10497 (2019)

    Google Scholar 

  27. G.L. Li, J. Wu, J.H. Li, et al., Service popularity-based smart resources partitioning for fog computing-enabled industrial Internet of Things. IEEE Trans Ind Inform 14(10), 4702–4711 (2018)

    Article  Google Scholar 

  28. L.Z. Li, K. Ota, M.X. Dong, Deep learning for smart industry: Efficient manufacture inspection system with fog computing. IEEE Trans. Ind. Inform. 14(10), 4665–4673 (2018)

    Article  Google Scholar 

  29. L.Z. Li, K. Ota, M.X. Dong, DeepNFV: A light-weight framework for intelligent edge network functions virtualization. IEEE Netw., in press (2018)

    Google Scholar 

  30. T. Li, A.K. Sahu, A. Talwalkar, V. Smith, Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50–60 (2020)

    Article  Google Scholar 

  31. W.Y.B. Lim, N.C. Luong, D.T. Hoang, Y. Jiao, Y.C. Liang, Q. Yang, et al., Federated learning in mobile edge networks: A comprehensive survey. IEEE Commun. Surveys Tutorials 22(3), 2031–2063 (2020)

    Article  Google Scholar 

  32. A.K. Malhi, S. Batra, H.S. Pannu, Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur. 89, 101664 (2020)

    Article  Google Scholar 

  33. M. Jaggi, V. Smith, M. Takac, J. Terhorst, S. Krishnan, T. Hofmann, M.I. Jordan, Communication-efficient distributed dual coordinate ascent, in Advances in Neural Information Processing Systems (2014), pp. 3068–3076

    Google Scholar 

  34. V. Mothukuri, R.M. Parizi, S. Pouriyeh, Y. Huang, A. Dehghantanha, G. Srivastava, A survey on security and privacy of federated learning. Futur. Gener. Comput. Syst. 115, 619–640 (2021)

    Article  Google Scholar 

  35. F. Mo, H. Haddadi, Efficient and Private Federated Learning Using Tee, in EuroSys (2019)

    Google Scholar 

  36. H.B. McMahan, E. Moore, D. Ramage, B.A. Arcas, Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629 (2016)

    Google Scholar 

  37. B. McMahan, E. Moore, D. Ramage, S. Hampson, B.A. Arcas, Communication-efficient learning of deep networks from decentralized data, in Artificial Intelligence and Statistics. PMLR (2017, April), pp. 1273–1282

    Google Scholar 

  38. A. Nilsson, S. Smith, G. Ulm, E. Gustavsson, M. Jirstrand, A performance evaluation of federated learning algorithms, in Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning (2018, December), pp. 1–8

    Google Scholar 

  39. S. Niknam, H.S. Dhillon, J.H. Reed, Federated learning for wireless communications: Motivation, opportunities, and challenges. IEEE Commun. Mag. 58(6), 46–51 (2020)

    Article  Google Scholar 

  40. S. Orme, Addressing Issues with Defense-in-Depth, APTs, and IoT with Active Cyber Defense Cycle and Cyber Resilience (Doctoral dissertation, Utica College) (2019)

    Google Scholar 

  41. M. Obaidat, M. Khodjaeva, J. Holst, M.B. Zid, Security and privacy challenges in vehicular ad hoc networks, in Connected Vehicles in the Internet of Things, (Springer, Cham, 2020), pp. 223–251

    Chapter  Google Scholar 

  42. S.R. Pokhrel, J. Choi, Federated learning with blockchain for autonomous vehicles: Analysis and design challenges. IEEE Trans. Commun. 68(8), 4734–4746 (2020)

    Article  Google Scholar 

  43. L.H. Pham, Foundations of Adaptive Cyber Defense against Advanced Persistent Threats (Doctoral dissertation, George Mason University) (2020)

    Google Scholar 

  44. S. Rizvi, J. Willet, D. Perino, S. Marasco, C. Condo, A threat to vehicular cyber security and the urgency for correction. Procedia Comput. Sci. 114, 100–105 (2017)

    Article  Google Scholar 

  45. J. Santa, A.F. Gómez-Skarmeta, M. Sánchez-Artigas, Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks. Comput. Commun. 31(12), 2850–2861 (2008)

    Article  Google Scholar 

  46. Rani, Preeti, Naziya Hussain, Rais Abdul Hamid Khan, Yogesh Sharma, and Piyush Kumar Shukla. “Vehicular Intelligence System: Time-Based Vehicle Next Location Prediction in Software-Defined Internet of Vehicles (SDN-IOV) for the Smart Cities.” In Intelligence of Things: AI-IoT Based Critical-Applications and Innovations, pp. 35-54. Springer, Cham, 2021

    Google Scholar 

  47. V. Smith, C.K. Chiang, M. Sanjabi, A. Talwalkar, Federated multi-task learning. arXiv preprint arXiv:1705.10467 (2017)

    Google Scholar 

  48. F. Tramèr, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, P. McDaniel, Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)

    Google Scholar 

  49. S. Truex, N. Baracaldo, A. Anwar, T. Steinke, H. Ludwig, R. Zhang, Y. Zhou, A hybrid approach to privacy-preserving federated learning, in Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security (2019, November), pp. 1–11

    Google Scholar 

  50. X. Wang, Y. Han, C. Wang, Q. Zhao, X. Chen, M. Chen, In-edge ai: Intelligentizing mobile edge computing, caching and communication by federated learning. IEEE Netw. 33(5), 156–165 (2019)

    Article  Google Scholar 

  51. J. Wu, M. Dong, K. Ota, J. Li, Z. Guan, Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(1), 27–38 (2018)

    Article  Google Scholar 

  52. Z. Xie, S. Zhu, Q. Li, W. Wang, You can promote, but you can't hide: large-scale abused app detection in mobile app stores, in Proceedings of the 32nd Annual Conference on Computer Security Applications (2016, December), pp. 374–385

    Google Scholar 

  53. Q. Yang, Y. Liu, Y. Cheng, Y. Kang, T. Chen, H. Yu, Federated learning. Synthesis Lectures Artificial Intell. Machine Learning 13(3), 1–207 (2019)

    Article  Google Scholar 

  54. Z. Yu, J. Hu, G. Min, Z. Zhao, W. Miao, M.S. Hossain, Mobility-aware proactive edge caching for connected vehicles using federated learning. IEEE Trans. Intell. Transp. Syst (2020)

    Google Scholar 

  55. Y. Zhao, J. Zhao, L. Jiang, R. Tan, D. Niyato, Mobile edge computing, blockchain and reputation-based crowdsourcing IoT federated learning: A secure, decentralized and privacy-preserving system. arXiv preprint arXiv:1906.10893 (2019)

    Google Scholar 

  56. Z. Zhao, C. Feng, H.H. Yang, X. Luo, Federated-learning-enabled intelligent fog radio access networks: Fundamental theory, key techniques, and future trends. IEEE Wirel. Commun. 27(2), 22–28 (2020)

    Article  Google Scholar 

  57. J. Zhang, J. Wang, Y. Zhao, B. Chen, An efficient federated learning scheme with differential privacy in mobile edge computing, in International Conference on Machine Learning and Intelligent Communications, (Springer, Cham, 2019), pp. 538–550

    Chapter  Google Scholar 

  58. T. Zhu, S.Y. Philip, Applying differential privacy mechanism in artificial intelligence, in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE (2019, July), pp. 1601–1609

    Google Scholar 

  59. Xu, Guowen, Hongwei Li, Sen Liu, Kan Yang, and Xiaodong Lin. “Verifynet: Secure and verifiable federated learning.” IEEE Transactions on Information Forensics and Security 15 (2019): 911–926

    Google Scholar 

  60. Pan, Lei, Xi Zheng, H. X. Chen, T. Luan, Huzefa Bootwala, and Lynn Batten. “Cyber security attacks to modern vehicular systems.” Journal of information security and applications 36 (2017): 90–100

    Google Scholar 

  61. Cretu, Gabriela F., Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, and Angelos D. Keromytis. “Casting out demons: Sanitizing training data for anomaly sensors.” In 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 81-95. IEEE, 2008

    Google Scholar 

  62. Wei, Kang, Jun Li, Ming Ding, Chuan Ma, Howard H. Yang, Farhad Farokhi, Shi Jin, Tony QS Quek, and H. Vincent Poor. “Federated learning with differential privacy: Algorithms and performance analysis.” IEEE Transactions on Information Forensics and Security 15 (2020): 3454–3469

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hussain, N., Rani, P., Chouhan, H., Gaur, U.S. (2022). Cyber Security and Privacy of Connected and Automated Vehicles (CAVs)-Based Federated Learning: Challenges, Opportunities, and Open Issues. In: Yadav, S.P., Bhati, B.S., Mahato, D.P., Kumar, S. (eds) Federated Learning for IoT Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-85559-8_11

Download citation

Publish with us

Policies and ethics