Vol. 2 No. 1 (2022): Journal of AI-Assisted Scientific Discovery
Articles

Deep Learning-based Anomaly Detection for Cybersecurity in Autonomous Vehicles

Dr. Sunita Singh
Associate Professor of Computer Science, Indian Institute of Technology Delhi (IIT Delhi)
Cover

Published 30-06-2022

How to Cite

[1]
Dr. Sunita Singh, “Deep Learning-based Anomaly Detection for Cybersecurity in Autonomous Vehicles”, Journal of AI-Assisted Scientific Discovery, vol. 2, no. 1, pp. 108–127, Jun. 2022, Accessed: Nov. 22, 2024. [Online]. Available: https://scienceacadpress.com/index.php/jaasd/article/view/66

Abstract

] Connected and automated vehicles (CAVs) are expected to be more secure compared to traditional vehicles because of their infrastructural support and self-awareness due to on-vehicle technologies. At the same time, new security vulnerabilities in sensing, hardware, communication, and environment in CAVs cannot be ignored. New threats like ransom and denial of privacy might occur based on those vulnerabilities. Moving forward, achieving the goal of a complete driverless and connected ecosystem will need to address those and similar new security issues to provide trust in related technologies.[2] Several privacy and security issues are emerging with connected and automated vehicles growing popularity. It is important to enhance vehicle security measures. To ensure the safety of connected and automated vehicles, it is important to detect potential security threats and ensure data security as well as vehicle safety. The paper mainly focuses on protecting vehicle sensor data from potential adversaries. When adversaries lie to sensor data, we say the sensor data is attacked with falsified data. To detect such cyber attacks, we propose two approaches: one is detected with natural state formulation and the other is detected with an augmented state formulation.

Downloads

Download data is not yet available.

References

  1. [1] X. Wang, I. Mavromatis, A. Tassi, R. Santos-Rodriguez et al., "Location Anomalies Detection for Connected and Autonomous Vehicles," 2019. [PDF]
  2. [2] Y. Wang, N. Masoud, and A. Khojandi, "Anomaly Detection in Connected and Automated Vehicles using an Augmented State Formulation," 2020. [PDF]
  3. [3] A. Stocco and P. Tonella, "Confidence‐driven weighted retraining for predicting safety‐critical failures in autonomous driving systems," 2022. ncbi.nlm.nih.gov
  4. [4] W. Jiang, "A Machine Vision Anomaly Detection System to Industry 4.0 Based on Variational Fuzzy Autoencoder," 2022. ncbi.nlm.nih.gov
  5. [5] M. Levi, Y. Allouche, and A. Kontorovich, "Advanced Analytics for Connected Cars Cyber Security," 2017.
  6. Tatineni, Sumanth. "Ethical Considerations in AI and Data Science: Bias, Fairness, and Accountability." International Journal of Information Technology and Management Information Systems (IJITMIS) 10.1 (2019): 11-21.
  7. Shaik, Mahammad, et al. "Granular Access Control for the Perpetually Expanding Internet of Things: A Deep Dive into Implementing Role-Based Access Control (RBAC) for Enhanced Device Security and Privacy." British Journal of Multidisciplinary and Advanced Studies 2.2 (2018): 136-160.
  8. Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224
  9. [6] M. Mehrab Abrar and S. Hariri, "An Anomaly Behavior Analysis Framework for Securing Autonomous Vehicle Perception," 2023. [PDF]
  10. [7] J. R. V. Solaas, N. Tuptuk, and E. Mariconti, "Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles," 2024. [PDF]
  11. [8] S. Shafayet Chowdhury, K. Mejbaul Islam, and R. Noor, "Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense," 2020. [PDF]
  12. [9] T. Li, M. Shang, S. Wang, and R. Stern, "Detecting stealthy cyberattacks on adaptive cruise control vehicles: A machine learning approach," 2023. [PDF]
  13. [10] S. Haresh, S. Kumar, M. Zeeshan Zia, and Q. H. Tran, "Towards Anomaly Detection in Dashcam Videos," 2020. [PDF]
  14. [11] M. Basnet and M. Hasan Ali, "A Deep Learning Perspective on Connected Automated Vehicle (CAV) Cybersecurity and Threat Intelligence," 2021. [PDF]
  15. [12] N. Owoh, J. Riley, M. Ashawa, S. Hosseinzadeh et al., "An Adaptive Temporal Convolutional Network Autoencoder for Malicious Data Detection in Mobile Crowd Sensing," 2024. ncbi.nlm.nih.gov
  16. [13] S. V. Thiruloga, V. K. Kukkala, and S. Pasricha, "TENET: Temporal CNN with Attention for Anomaly Detection in Automotive Cyber-Physical Systems," 2021. [PDF]
  17. [14] J. Seok Do, A. Bayo Kareem, and J. W. Hur, "LSTM-Autoencoder for Vibration Anomaly Detection in Vertical Carousel Storage and Retrieval System (VCSRS)," 2023. ncbi.nlm.nih.gov
  18. [15] C. Yun, B. Eom, S. Park, C. Kim et al., "A Study on the Effectiveness of Deep Learning-Based Anomaly Detection Methods for Breast Ultrasonography," 2023. ncbi.nlm.nih.gov
  19. [16] W. Gouda, S. Tahir, S. Alanazi, M. Almufareh et al., "Unsupervised Outlier Detection in IOT Using Deep VAE," 2022. ncbi.nlm.nih.gov
  20. [17] S. Agrawal, S. Sarkar, O. Aouedi, G. Yenduri et al., "Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions," 2021. [PDF]
  21. [18] R. Kale, Z. Lu, K. Wai Fok, and V. L. L. Thing, "A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection," 2022. [PDF]
  22. [19] B. Wang and C. Yang, "Video Anomaly Detection Based on Convolutional Recurrent AutoEncoder," 2022. ncbi.nlm.nih.gov
  23. [20] J. Egger, A. Pepe, C. Gsaxner, Y. Jin et al., "Deep learning—a first meta-survey of selected reviews across scientific disciplines, their commonalities, challenges and research impact," 2021. ncbi.nlm.nih.gov
  24. [21] C. Wu, S. Shao, C. Tunc, P. Satam et al., "An explainable and efficient deep learning framework for video anomaly detection," 2022. ncbi.nlm.nih.gov
  25. [22] W. T. Lunardi, M. Andreoni Lopez, and J. P. Giacalone, "ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection," 2022. [PDF]
  26. [23] L. P. Yuan, E. Choo, T. Yu, I. Khalil et al., "Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users," 2020. [PDF]
  27. [24] P. J. Gunkel, C. S. Fischer, and P. Isserstedt, "Quarks and light (pseudo-)scalar mesons at finite chemical potential," 2019. [PDF]
  28. [25] J. Wiederer, J. Schmidt, U. Kressel, K. Dietmayer et al., "A Benchmark for Unsupervised Anomaly Detection in Multi-Agent Trajectories," 2022. [PDF]
  29. [26] M. Bikandi, G. Velez, N. Aginako, and I. Irigoien, "Synthetic outlier generation for anomaly detection in autonomous driving," 2023. [PDF]
  30. [27] M. Ayalew Belay, S. Stenen Blakseth, A. Rasheed, and P. Salvo Rossi, "Unsupervised Anomaly Detection for IoT-Based Multivariate Time Series: Existing Solutions, Performance Analysis and Future Directions," 2023. ncbi.nlm.nih.gov
  31. [28] H. Cao, W. Zou, Y. Wang, T. Song et al., "Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey," 2022. [PDF]
  32. [29] D. Bogdoll, M. Nitsche, and J. Marius Zöllner, "Anomaly Detection in Autonomous Driving: A Survey," 2022. [PDF]
  33. [30] V. Kumar Kukkala, S. Vignesh Thiruloga, and S. Pasricha, "Roadmap for Cybersecurity in Autonomous Vehicles," 2022. [PDF]