-
CiteScore
0.50
Impact Factor
IECE Transactions on Sensing, Communication, and Control, 2024, Volume 1, Issue 2: 136-153

Free Access | Research Article | 31 December 2024
1 Department of Computer Science, Qurtuba University of Science & Information Technology, 25000 Peshawar, Pakistan
2 Department of Computer Science, Abbottabad University of Science and Technology, Abbottabad, Pakistan
3 College of Mechatronics and Control Engineering; and College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, China
4 Faculty of Electrical Engineering, West Pomeranian University of Technology, Szczecin, Poland
5 Department of Computer Engineering, Gachon University, Seongnam 13120, Republic of Korea
* Corresponding Authors: Taj Rahman, [email protected] ; Inam Ullah, [email protected]
Received: 03 December 2024, Accepted: 26 December 2024, Published: 31 December 2024  

Abstract
In recent years, vehicular ad hoc networks (VANETs) have faced growing security concerns, particularly from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These attacks flood the network with malicious traffic, disrupting services and compromising resource availability. While various techniques have been proposed to address these threats, this study presents an optimized framework leveraging advanced deep-learning models for improved detection accuracy. The proposed Intrusion Detection System (IDS) employs Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), and Deep Belief Networks (DBN) alongside robust feature selection techniques, Random Projection (RP) and Principal Component Analysis (PCA). This framework extracts and analyzes significant features using a publicly available application-layer DoS attack dataset, achieving higher detection accuracy than traditional methods. Experimental results indicate that combining CNN, LSTM networks, and DBN with feature selection techniques like Random Projection (RP) and PCA results in improved classification performance, achieving an accuracy of 0.994, surpassing the state-of-the-art machine learning models. This novel approach enhances the reliability and safety of vehicle communications by providing efficient, real-time threat detection. The findings contribute significantly to VANET security, laying a robust foundation for future advancements in connected vehicle protection.

Graphical Abstract
Vehicular Network Security Through Optimized Deep Learning Model with Feature Selection Techniques

Keywords
vehicular networks security
denial of service (DoS) detection
deep learning intrusion detection
feature optimization techniques
connected vehicle protection

Funding
This work was supported without any funding.

Cite This Article
APA Style
Khan, F. M., Rahman, T., Zeb, A., Haider, Z. A., Khan, I. U., Bilal, H., Khan, M. A. & Ullah, I. (2024). Vehicular Network Security Through Optimized Deep Learning Model with Feature Selection Techniques. IECE Transactions on Sensing, Communication, and Control, 1(2), 136–153. https://doi.org/10.62762/TSCC.2024.626147

References
  1. Asra, S. A. (2022). Security issues of vehicular ad hoc networks (VANET): A systematic review. TIERS Information Technology Journal, 3(1), 17-27.
    [Google Scholar]
  2. Phan, T. C., & Singh, P. (2023). A recent connected vehicle-IoT automotive application based on communication technology. International journal of data informatics and intelligent computing, 2(4), 40-51.
    [Google Scholar]
  3. Ullah, I., Qian, S., Deng, Z., & Lee, J. H. (2021). Extended Kalman filter-based localization algorithm by edge computing in wireless sensor networks. Digital Communications and Networks, 7(2), 187-195.
    [Google Scholar]
  4. Abdulkadhim, F. G., Yi, Z., Onaizah, A. N., Rabee, F., & Al-Muqarm, A. M. A. (2022). Optimizing the roadside unit deployment mechanism in VANET with efficient protocol to prevent data loss. Wireless Personal Communications, 127(1), 815-843.
    [Google Scholar]
  5. Zamrai, M. A. H., Yusof, K. M., & Azizan, A. (2024). Dissecting Denial of Service (DoS) Syn Flood Attack Dynamics and Impacts in Vehicular Communication Systems. In ITM Web of Conferences (Vol. 63, p. 01008). EDP Sciences.
    [Google Scholar]
  6. Tariq, U. (2024). Optimized Feature Selection for DDoS Attack Recognition and Mitigation in SD-VANETs. World Electric Vehicle Journal, 15(9).
    [Google Scholar]
  7. Setitra, M. A., & Fan, M. (2024). Detection of DDoS attacks in SDN-based VANET using optimized TabNet. Computer Standards & Interfaces, 90, 103845.
    [Google Scholar]
  8. Banafshehvaragh, S. T., & Rahmani, A. M. (2023). Intrusion, anomaly, and attack detection in smart vehicles. Microprocessors and Microsystems, 96, 104726.
    [Google Scholar]
  9. Ullah, I., Noor, A., Nazir, S., Ali, F., Ghadi, Y. Y., & Aslam, N. (2024). Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. The Journal of Supercomputing, 80(5), 5870-5899.
    [Google Scholar]
  10. Kumaragurubaran, S., & Vijayakumar, N. (2024). A novel swarm intelligence‐based fuzzy logic in efficient connectivity of vehicles. International Journal of Communication Systems, 37(11), e5795.
    [Google Scholar]
  11. Ayyub, M., Oracevic, A., Hussain, R., Khan, A. A., & Zhang, Z. (2022). A comprehensive survey on clustering in vehicular networks: Current solutions and future challenges. Ad Hoc Networks, 124, 102729.
    [Google Scholar]
  12. Nasir, R., Ashraf, H., & Jhanjhi, N. Z. (2023). Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey. arXiv preprint arXiv:2312.12925.
    [Google Scholar]
  13. Bangui, H., Ge, M., & Buhnova, B. (2022). A hybrid machine learning model for intrusion detection in VANET. Computing, 104(3), 503-531.
    [Google Scholar]
  14. Adhikari, D., Ullah, I., Syed, I., & Choi, C. (2023). Phishing Detection in the Internet of Things for Cybersecurity. In Cybersecurity Management in Education Technologies (pp. 86-106). CRC Press.
    [Google Scholar]
  15. Almehdhar, M., Albaseer, A., Khan, M. A., Abdallah, M., Menouar, H., Al-Kuwari, S., & Al-Fuqaha, A. (2024). Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks. IEEE Open Journal of Vehicular Technology.
    [Google Scholar]
  16. Raza, M., Barket, A. R., Rehman, A. U., Rehman, A., & Ullah, I. (2020, August). Mobile crowdsensing based architecture for intelligent traffic prediction and quickest path selection. In 2020 International Conference on UK-China Emerging Technologies (UCET) (pp. 1-4). IEEE.
    [Google Scholar]
  17. Alqahtani, H., & Kumar, G. (2024). Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems. Engineering Applications of Artificial Intelligence, 129, 107667.
    [Google Scholar]
  18. Haider, Z. A., Khan, F. M., Zafar, A., & Khan, I. U. (2024). Optimizing Machine Learning Classifiers for Credit Card Fraud Detection on Highly Imbalanced Datasets Using PCA and SMOTE Techniques. VAWKUM Transactions on Computer Sciences, 12(2), 28-49.
    [Google Scholar]
  19. Gyamfi, E., & Jurcut, A. (2022). Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors, 22(10), 3744.
    [Google Scholar]
  20. Al-Shareeda, M. A., & Manickam, S. (2023). A systematic literature review on security of vehicular ad-hoc network (vanet) based on veins framework. IEEE Access, 11, 46218-46228.
    [Google Scholar]
  21. Hassan, S. M., Mohamad, M. M., & Muchtar, F. B. (2024). Advanced Intrusion Detection in MANETs: A Survey of Machine Learning and Optimization Techniques for Mitigating Black/Gray Hole Attacks. IEEE Access.
    [Google Scholar]
  22. Soares, K., & Shinde, A. A. (2024, March). Intrusion Detection Systems in VANET: A Review on Implementation Techniques and Datasets. In 2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV) (pp. 897-905). IEEE.
    [Google Scholar]
  23. Ali, B. S., Ullah, I., Al Shloul, T., Khan, I. A., Khan, I., Ghadi, Y. Y., ... & Hamam, H. (2024). ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. The Journal of Supercomputing, 80(6), 7876-7905.
    [Google Scholar]
  24. Anwar, M. S., Alhalabi, W., Choi, A., Ullah, I., & Alhudali, A. (2024). Internet of metaverse things (IoMT): Applications, technology challenges and security consideration. In Future Communication Systems Using Artificial Intelligence, Internet of Things and Data Science (pp. 133-158). CRC Press.
    [Google Scholar]
  25. Wang, Y., Wang, X., Ariffin, M. M., Abolfathi, M., Alqhatani, A., & Almutairi, L. (2023). Attack detection analysis in software-defined networks using various machine learning method. Computers and Electrical Engineering, 108, 108655.
    [Google Scholar]
  26. Manivannan, D. (2024). Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things. Journal of Network and Computer Applications, 103925.
    [Google Scholar]
  27. Bakro, M., Kumar, R. R., Alabrah, A., Ashraf, Z., Ahmed, M. N., Shameem, M., & Abdelsalam, A. (2023). An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier. IEEE Access, 11, 64228-64247.
    [Google Scholar]
  28. Almehdhar, M., Albaseer, A., Khan, M. A., Abdallah, M., Menouar, H., Al-Kuwari, S., & Al-Fuqaha, A. (2024). Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks. IEEE Open Journal of Vehicular Technology.
    [Google Scholar]
  29. Mazhar, S., Rakib, A., Pan, L., Jiang, F., Anwar, A., Doss, R., & Bryans, J. (2024). State-of-the-Art Authentication and Verification Schemes in VANETs: A Survey. Vehicular Communications, 100804.
    [Google Scholar]
  30. Ali, S. H., Ullah, I., Ali, S. A., Haq, M. I. U., & Ullah, N. (2024). A Cyber-Physical System Based on On-Board Diagnosis (OBD-II) for Smart City. IECE Transactions on Intelligent Systematics, 1(2), 49-57.
    [Google Scholar]
  31. Nabi, F., & Zhou, X. (2024). Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security. Cyber Security and Applications, 100033.
    [Google Scholar]
  32. Haider, Z. A., Khan, F. M., Khan, I. U., & Azad, M. A. K. (2024). Utilizing Effective Deep Learning Models for Early Prediction and Detection of Chronic Kidney Disease. Spectrum of engineering sciences, 2(3), 101-131.
    [Google Scholar]
  33. Abro, G. E. M., Ali, Z. A., & Abdallah, A. M. (2024). Signal Strength-Based Alien Drone Detection and Containment in Indoor UAV Swarm Simulations. IECE Transactions on Intelligent Systematics, 1(2), 69-78.
    [Google Scholar]
  34. Sharafian, A., Ullah, I., Singh, S. K., Ali, A., Khan, H., & Bai, X. (2024). Adaptive fuzzy backstepping secure control for incommensurate fractional order cyber–physical power systems under intermittent denial of service attacks. Chaos, Solitons & Fractals, 186, 115288.
    [Google Scholar]
  35. Akande, H. B., Awoniyi, C., Ogundokun, R. O., Oloyede, A. A., Yiamiyu, O. A., & Caroline, A. T. (2024, April). Enhancing Network Security: Intrusion Detection Systems with Hybridized CNN and DNN Algorithms. In 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG) (pp. 1-7). IEEE.
    [Google Scholar]
  36. Khan, I. U., Khan, F. M., Haider, Z. A., Khattak, S., Naheed, G., & Kiani, S. S. Dynamic Malware Detection Using Effective Machine Learning Models with Feature Selection Techniques.
    [Google Scholar]
  37. Rajender, N., & Gopalachari, M. V. (2024). An efficient dimensionality reduction based on adaptive-GSM and transformer assisted classification for high dimensional data. International Journal of Information Technology, 16(1), 403-416.
    [Google Scholar]
  38. Anitha, T., Aanjankumar, S., Poonkuntran, S., & Nayyar, A. (2023). A novel methodology for malicious traffic detection in smart devices using BI-LSTM–CNN-dependent deep learning methodology. Neural Computing and Applications, 35(27), 20319-20338.
    [Google Scholar]
  39. Ullah, I., Ali, F., Khan, H., Khan, F., & Bai, X. (2024). Ubiquitous computation in internet of vehicles for human-centric transport systems. Computers in Human Behavior, 161, 108394.
    [Google Scholar]
  40. SHARIPUDDIN, W., EA, M., ZZ, K., WIJAYA, I., & SANDRA, D. (2023). Improvement detection system on complex network using hybrid deep belief network and selection features. Indonesian Journal of Electrical Engineering and Computer Science, 31(1), 470-479.
    [Google Scholar]

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 137
PDF Downloads: 13

Publisher's Note
IECE stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
IECE or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
IECE Transactions on Sensing, Communication, and Control

IECE Transactions on Sensing, Communication, and Control

ISSN: 3065-7431 (Online) | ISSN: 3065-7423 (Print)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/iece/

Copyright © 2024 Institute of Emerging and Computer Engineers Inc.