scholarly journals An Adversarial Attack Defending System for Securing In-Vehicle Networks

Author(s):  
Yi Li ◽  
Jing Lin ◽  
Kaiqi Xiong
Telecom ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 108-140
Author(s):  
Paulo Álvares ◽  
Lion Silva ◽  
Naercio Magaia

It had been predicted that by 2020, nearly 26 billion devices would be connected to the Internet, with a big percentage being vehicles. The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims at improving traffic congestion, travel time, and comfort, all the while reducing pollution and accidents. However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. Blockchain is a fairly recent technology that guarantees trust between nodes through cryptography mechanisms and consensus protocols in distributed, untrustful environments, like IoV networks. Much research has been done in implementing the former in the latter to impressive results, as Blockchain can cover and offer solutions to many IoV problems. However, these implementations have to deal with the challenge of IoV node’s resource constraints since they do not suffice for the computational and energy requirements of traditional Blockchain systems, which is one of the biggest limitations of Blockchain implementations in IoV. Finally, these two technologies can be used to build the foundations for smart cities, enabling new application models and better results for end-users.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2925
Author(s):  
Antonio Mederos-Barrera ◽  
Cristo Jurado-Verdu ◽  
Victor Guerra ◽  
Jose Rabadan ◽  
Rafael Perez-Jimenez

Visible light communications (VLC) technology is emerging as a candidate to meet the demand for interconnected devices’ communications. However, the costs of incorporating specific hardware into end-user devices slow down its market entry. Optical camera communication (OCC) technology paves the way by reusing cameras as receivers. These systems have generally been evaluated under static conditions, in which transmitting sources are recognized using computationally expensive discovery algorithms. In vehicle-to-vehicle networks and wearable devices, tracking algorithms, as proposed in this work, allow one to reduce the time required to locate a moving source and hence the latency of these systems, increasing the data rate by up to 2100%. The proposed receiver architecture combines discovery and tracking algorithms that analyze spatial features of a custom RGB LED transmitter matrix, highlighted in the scene by varying the cameras’ exposure time. By using an anchor LED and changing the intensity of the green LED, the receiver can track the light source with a slow temporal deterioration. Moreover, data bits sent over the red and blue channels do not significantly affect detection, hence transmission occurs uninterrupted. Finally, a novel experimental methodology to evaluate the evolution of the detection’s performance is proposed. With the analysis of the mean and standard deviation of novel K parameters, it is possible to evaluate the detected region-of-interest scale and centrality against the transmitter source’s ideal location.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3922
Author(s):  
Sheeba Lal ◽  
Saeed Ur Rehman ◽  
Jamal Hussain Shah ◽  
Talha Meraj ◽  
Hafiz Tayyab Rauf ◽  
...  

Due to the rapid growth in artificial intelligence (AI) and deep learning (DL) approaches, the security and robustness of the deployed algorithms need to be guaranteed. The security susceptibility of the DL algorithms to adversarial examples has been widely acknowledged. The artificially created examples will lead to different instances negatively identified by the DL models that are humanly considered benign. Practical application in actual physical scenarios with adversarial threats shows their features. Thus, adversarial attacks and defense, including machine learning and its reliability, have drawn growing interest and, in recent years, has been a hot topic of research. We introduce a framework that provides a defensive model against the adversarial speckle-noise attack, the adversarial training, and a feature fusion strategy, which preserves the classification with correct labelling. We evaluate and analyze the adversarial attacks and defenses on the retinal fundus images for the Diabetic Retinopathy recognition problem, which is considered a state-of-the-art endeavor. Results obtained on the retinal fundus images, which are prone to adversarial attacks, are 99% accurate and prove that the proposed defensive model is robust.


Sign in / Sign up

Export Citation Format

Share Document