Abstract
Connected and automated vehicles (CAVs) are becoming a reality. Prototyping and testing of self-driving vehicle technology are becoming more popular around the world. The secure deployment of self-driving vehicles necessitates a wide range of technology, competencies, and procedures, all of which must be thoroughly checked and assessed, as road safety may be a risk. As a result, it’s critical to recognize and develop a thorough understanding of the cyber security and privacy concerns with CAVs and of the way these can be prioritized as well as addressed. This chapter investigates falsified information attacks against the RSU’s ongoing FL operation. We discovered a variety of attack tactics used by malicious CAVs to disrupt global system training in vehicular ad hoc networks (VANETs). In which, demonstrate the attacks effectively increased the convergence time and reduced the model’s accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
F. Ahmad, A. Adnane, V.N. Franqueira, A systematic approach for cyber security in vehicular networks (2016)
A. Alnasser, H. Sun, J. Jiang, Cyber security challenges and solutions for V2X communications: A survey. Comput. Netw. 151, 52–67 (2019)
K. Bonawitz, H. Eichner, W. Grieskamp, D. Huba, A. Ingerman, V. Ivanov, ... , J. Roselander, Towards federated learning at scale: System design. arXiv preprint arXiv:1902.01046 (2019)
E. Bagdasaryan, O. Poursaeed, V. Shmatikov, Differential privacy has disparate impact on model accuracy. Adv. Neural Inf. Proces. Syst. 32, 15479–15488 (2019)
P. Blanchard, E.M. El Mhamdi, R. Guerraoui, J. Stainer, Machine learning with adversaries: Byzantine tolerant gradient descent, in Proceedings of the 31st International Conference on Neural Information Processing Systems (2017, December), pp. 118–128
M. Chowdhury, K.C. Wang, Distributed intelligent traffic sensor networks, in Transport Science and Technology, (Emerald Group Publishing Limited, 2006)
Z. Chai, H. Fayyaz, Z. Fayyaz, A. Anwar, Y. Zhou, N. Baracaldo, ..., Y. Cheng, Towards taming the resource and data heterogeneity in federated learning, in 2019 {USENIX} Conference on Operational Machine Learning (OpML 19) (2019), pp. 19–21
R. Canetti, U. Feige, O. Goldreich, M. Naor, Adaptively secure multi-party computation, in Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (1996, July), pp. 639–648
D. Cao, S. Chang, Z. Lin, G. Liu, D. Sun, Understanding distributed poisoning attack in federated learning, in 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS). IEEE (2019, December), pp. 233–239
R. Colbaugh, K. Glass, Moving target defense for adaptive adversaries, in 2013 IEEE International Conference on Intelligence and Security Informatics. IEEE (2013, June), pp. 50–55
Du, Zhaoyang, Celimuge Wu, Tsutomu Yoshinaga, Kok-Lim Alvin Yau, Yusheng Ji, and Jie Li. “Federated learning for vehicular internet of things: Recent advances and open issues.” IEEE Open Journal of the Computer Society 1 (2020): 45–61
Z. El-Rewini, K. Sadatsharan, D.F. Selvaraj, S.J. Plathottam, P. Ranganathan, Cybersecurity challenges in vehicular communications. Vehicular Commun. 23, 100214 (2020)
K.C. Dey, A. Mishra, M. Chowdhury, Potential of intelligent transportation systems in mitigating adverse weather impacts on road mobility: A review. IEEE Trans. Intell. Transp. Syst. 16(3), 1107–1119 (2014)
C. Fung, C.J. Yoon, I. Beschastnikh, Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866 (2018)
Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, X. Du, Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J. 4(6), 1934–1944 (2017)
D.L. Guidoni, G. Maia, F.S. Souza, L.A. Villas, A.A. Loureiro, Vehicular traffic management based on traffic engineering for vehicular ad hoc networks. IEEE Access 8, 45167–45183 (2020)
M. Hao, H. Li, X. Luo, G. Xu, H. Yang, S. Liu, Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Trans. Indust. Inform. 16(10), 6532–6542 (2019)
J. Hayes, O. Ohrimenko, Contamination attacks and mitigation in multi-party machine learning. arXiv preprint arXiv:1901.02402 (2019)
N. Hussain, P. Rani, Comparative Studied Based on Attack Resilient and Efficient Protocol with Intrusion Detection System Based on Deep Neural Network for Vehicular System Security. Distributed Artificial Intelligence: A Modern Approach, 217 (2020)
R. Ito, M. Tsukada, H. Matsutani, An on-device federated learning approach for cooperative anomaly detection. arXiv preprint arXiv:2002.12301 (2020)
S. Jajodia, H.C. van van Tilborg (Eds.), Encyclopedia of Cryptography and Security: A-K. Springer (2011)
Y. Jiang, S. Wang, B.J. Ko, W.H. Lee, L. Tassiulas, Model pruning enables efficient federated learning on edge devices. arXiv preprint arXiv:1909.12326 (2019)
P. Kairouz, H.B. McMahan, B. Avent, A. Bellet, M. Bennis, A.N. Bhagoji, ..., S. Zhao, Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019)
M. Kuderer, S. Gulati, W. Burgard, Learning driving styles for autonomous vehicles from demonstration, in 2015 IEEE International Conference on Robotics and Automation (ICRA). IEEE (2015, May), pp. 2641–2646
D. Li, J. Wang, Fedmd: Heterogenous federated learning via model distillation. arXiv preprint arXiv:1910.03581 (2019)
T. Li, M. Sanjabi, A. Beirami, V. Smith, Fair resource allocation in federated learning. arXiv preprint arXiv:1905.10497 (2019)
G.L. Li, J. Wu, J.H. Li, et al., Service popularity-based smart resources partitioning for fog computing-enabled industrial Internet of Things. IEEE Trans Ind Inform 14(10), 4702–4711 (2018)
L.Z. Li, K. Ota, M.X. Dong, Deep learning for smart industry: Efficient manufacture inspection system with fog computing. IEEE Trans. Ind. Inform. 14(10), 4665–4673 (2018)
L.Z. Li, K. Ota, M.X. Dong, DeepNFV: A light-weight framework for intelligent edge network functions virtualization. IEEE Netw., in press (2018)
T. Li, A.K. Sahu, A. Talwalkar, V. Smith, Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50–60 (2020)
W.Y.B. Lim, N.C. Luong, D.T. Hoang, Y. Jiao, Y.C. Liang, Q. Yang, et al., Federated learning in mobile edge networks: A comprehensive survey. IEEE Commun. Surveys Tutorials 22(3), 2031–2063 (2020)
A.K. Malhi, S. Batra, H.S. Pannu, Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur. 89, 101664 (2020)
M. Jaggi, V. Smith, M. Takac, J. Terhorst, S. Krishnan, T. Hofmann, M.I. Jordan, Communication-efficient distributed dual coordinate ascent, in Advances in Neural Information Processing Systems (2014), pp. 3068–3076
V. Mothukuri, R.M. Parizi, S. Pouriyeh, Y. Huang, A. Dehghantanha, G. Srivastava, A survey on security and privacy of federated learning. Futur. Gener. Comput. Syst. 115, 619–640 (2021)
F. Mo, H. Haddadi, Efficient and Private Federated Learning Using Tee, in EuroSys (2019)
H.B. McMahan, E. Moore, D. Ramage, B.A. Arcas, Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629 (2016)
B. McMahan, E. Moore, D. Ramage, S. Hampson, B.A. Arcas, Communication-efficient learning of deep networks from decentralized data, in Artificial Intelligence and Statistics. PMLR (2017, April), pp. 1273–1282
A. Nilsson, S. Smith, G. Ulm, E. Gustavsson, M. Jirstrand, A performance evaluation of federated learning algorithms, in Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning (2018, December), pp. 1–8
S. Niknam, H.S. Dhillon, J.H. Reed, Federated learning for wireless communications: Motivation, opportunities, and challenges. IEEE Commun. Mag. 58(6), 46–51 (2020)
S. Orme, Addressing Issues with Defense-in-Depth, APTs, and IoT with Active Cyber Defense Cycle and Cyber Resilience (Doctoral dissertation, Utica College) (2019)
M. Obaidat, M. Khodjaeva, J. Holst, M.B. Zid, Security and privacy challenges in vehicular ad hoc networks, in Connected Vehicles in the Internet of Things, (Springer, Cham, 2020), pp. 223–251
S.R. Pokhrel, J. Choi, Federated learning with blockchain for autonomous vehicles: Analysis and design challenges. IEEE Trans. Commun. 68(8), 4734–4746 (2020)
L.H. Pham, Foundations of Adaptive Cyber Defense against Advanced Persistent Threats (Doctoral dissertation, George Mason University) (2020)
S. Rizvi, J. Willet, D. Perino, S. Marasco, C. Condo, A threat to vehicular cyber security and the urgency for correction. Procedia Comput. Sci. 114, 100–105 (2017)
J. Santa, A.F. Gómez-Skarmeta, M. Sánchez-Artigas, Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks. Comput. Commun. 31(12), 2850–2861 (2008)
Rani, Preeti, Naziya Hussain, Rais Abdul Hamid Khan, Yogesh Sharma, and Piyush Kumar Shukla. “Vehicular Intelligence System: Time-Based Vehicle Next Location Prediction in Software-Defined Internet of Vehicles (SDN-IOV) for the Smart Cities.” In Intelligence of Things: AI-IoT Based Critical-Applications and Innovations, pp. 35-54. Springer, Cham, 2021
V. Smith, C.K. Chiang, M. Sanjabi, A. Talwalkar, Federated multi-task learning. arXiv preprint arXiv:1705.10467 (2017)
F. Tramèr, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, P. McDaniel, Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)
S. Truex, N. Baracaldo, A. Anwar, T. Steinke, H. Ludwig, R. Zhang, Y. Zhou, A hybrid approach to privacy-preserving federated learning, in Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security (2019, November), pp. 1–11
X. Wang, Y. Han, C. Wang, Q. Zhao, X. Chen, M. Chen, In-edge ai: Intelligentizing mobile edge computing, caching and communication by federated learning. IEEE Netw. 33(5), 156–165 (2019)
J. Wu, M. Dong, K. Ota, J. Li, Z. Guan, Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(1), 27–38 (2018)
Z. Xie, S. Zhu, Q. Li, W. Wang, You can promote, but you can't hide: large-scale abused app detection in mobile app stores, in Proceedings of the 32nd Annual Conference on Computer Security Applications (2016, December), pp. 374–385
Q. Yang, Y. Liu, Y. Cheng, Y. Kang, T. Chen, H. Yu, Federated learning. Synthesis Lectures Artificial Intell. Machine Learning 13(3), 1–207 (2019)
Z. Yu, J. Hu, G. Min, Z. Zhao, W. Miao, M.S. Hossain, Mobility-aware proactive edge caching for connected vehicles using federated learning. IEEE Trans. Intell. Transp. Syst (2020)
Y. Zhao, J. Zhao, L. Jiang, R. Tan, D. Niyato, Mobile edge computing, blockchain and reputation-based crowdsourcing IoT federated learning: A secure, decentralized and privacy-preserving system. arXiv preprint arXiv:1906.10893 (2019)
Z. Zhao, C. Feng, H.H. Yang, X. Luo, Federated-learning-enabled intelligent fog radio access networks: Fundamental theory, key techniques, and future trends. IEEE Wirel. Commun. 27(2), 22–28 (2020)
J. Zhang, J. Wang, Y. Zhao, B. Chen, An efficient federated learning scheme with differential privacy in mobile edge computing, in International Conference on Machine Learning and Intelligent Communications, (Springer, Cham, 2019), pp. 538–550
T. Zhu, S.Y. Philip, Applying differential privacy mechanism in artificial intelligence, in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE (2019, July), pp. 1601–1609
Xu, Guowen, Hongwei Li, Sen Liu, Kan Yang, and Xiaodong Lin. “Verifynet: Secure and verifiable federated learning.” IEEE Transactions on Information Forensics and Security 15 (2019): 911–926
Pan, Lei, Xi Zheng, H. X. Chen, T. Luan, Huzefa Bootwala, and Lynn Batten. “Cyber security attacks to modern vehicular systems.” Journal of information security and applications 36 (2017): 90–100
Cretu, Gabriela F., Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, and Angelos D. Keromytis. “Casting out demons: Sanitizing training data for anomaly sensors.” In 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 81-95. IEEE, 2008
Wei, Kang, Jun Li, Ming Ding, Chuan Ma, Howard H. Yang, Farhad Farokhi, Shi Jin, Tony QS Quek, and H. Vincent Poor. “Federated learning with differential privacy: Algorithms and performance analysis.” IEEE Transactions on Information Forensics and Security 15 (2020): 3454–3469
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hussain, N., Rani, P., Chouhan, H., Gaur, U.S. (2022). Cyber Security and Privacy of Connected and Automated Vehicles (CAVs)-Based Federated Learning: Challenges, Opportunities, and Open Issues. In: Yadav, S.P., Bhati, B.S., Mahato, D.P., Kumar, S. (eds) Federated Learning for IoT Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-85559-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-85559-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-85558-1
Online ISBN: 978-3-030-85559-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)