Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 11 , Issue 2 , PP: 42-62, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Advanced Intrusion Detection in Vehicular Networks: Empowering Security through Hybrid Off-loading Techniques and Enhanced Radial Bias Neural Network

Prashant Kumar Shukla 1 * , Ratish Agarwal 2

  • 1 Department of Information Technology, University Institute of Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, MP, India, - (prashantshukla2005@gmail.com)
  • 2 Department of Information Technology, University Institute of Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, MP, India, - (ratish@rgpv.ac.in)
  • Doi: https://doi.org/10.54216/JISIoT.110205

    Received: September 05, 2022 Revised: December 13, 2022 Accepted: January 16, 2024
    Abstract

    Over the last several decades, the implementation of ITS has shown to be the most efficient and successful strategy for expanding the variety of current transportation networks. Vehicle-based offloading of data going to be essential for forthcoming networking innovations like D2D and 5G due to the substantial contribution it makes to efficiently using network capability while wasting minimal power. Information transmissions that would normally need a cellular network's infrastructure may instead be made using alternative networking mechanisms including Bluetooth, WiFi, and opportunistic communications. Data offloading has the ability to significantly increase the efficiency with which network resources are used. The offloading of data from vehicles has a considerable impact on the strain on cellular networks. It helps the network achieve higher throughput by facilitating the simultaneous reception of data by a large number of users. First, we must establish that the problem of Vehicular data offloading is an NP-hard target set selection (TSS) issue before we can even begin to characterize it. Using a combination of Hybrid PSO and GWO, TSS selects a small group of nodes to do the redundant data exchange (Particle Swarm Optimization with Gray Wolf Optimization). Collaboration between individuals and ISPs to identify effective aim sets may provide useful insights. If malicious users are present in the target group, they may slow down network activity by spoofing or by reducing the network's offloading capacity. It is possible that the whole network's performance would suffer as a direct result of these malicious users. In this study, we suggest a hybrid approach to communication for specifying the intended audience. We take use of the characteristics of opinion dynamics amongst users to get around the issue of overlapping community detection. Trust-based metrics inferred from users' activities are used to ensure the safety of the target set. In order to call 911, the suggested work additionally incorporates a method of sorting and classifying the offload limitations through Radial Bias Neural Network (RBNN). The following may be determined with the use of the proposed work's performance indicators: precision, entropy, and delay.

    Keywords :

    Accuracy and Entropy , offload limitations, delay , Improved Reduced Round Advanced Encryption , Radial Bias Neural Network (RBNN) , NP-hard target set selection (TSS) problem

    References

    [1]    Munqith Saleem, Hanan Burhan Saadon, Marwa S. Mahdi Hussin,Tamarah Alaa Diame, Raaid Alubady, Mohd K. Abd Ghani, Hatıra Günerhan, Application of Edge Computing-Based Information-Centric Networking in Smart Cities, Journal of Intelligent Systems and Internet of Things, Vol. 8 , No. 2 , (2023) : 72-85 (Doi   :  https://doi.org/10.54216/JISIoT.080208)

    [2]    Mohammad Hammoudeh,Saeed M. Aljaberi, Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment, Journal of Cybersecurity and Information Management, Vol. 8 , No. 1 , (2021) : 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102)

    [3]     Basma M. Yousef,Germien G. Sedhom,Alshimaa H. Ismail, U-Shape Wideband Slot Antenna for 5G Mobile Phone Applications, International Journal of Wireless and Ad Hoc Communication, Vol. 5 , No. 2 , (2022) : 77-83 (Doi   :  https://doi.org/10.54216/IJWAC.050206)

    [4]    Y. Li et al., "Multiple mobile data offloading through delay tolerant networks", in Proc. of the 6th ACM workshop on Challenged networks (ACM CHANTS), 2011, pp. 43-48.

    [5]     Z. Li, C. Wang, S. Yang, C. Jiang and I. Stojmenovic, "Space-crossing: Community-based data forwarding in mobile social networks under the hybrid communication architecture", IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 4720-4727, Sep. 2015.

    [6]    D. Huang, P. Wang and D. Niyato, "A dynamic offloading algorithm for mobile computing", IEEE Trans. Wireless Commun., vol. 11, no. 6, pp. 1991-1995, Jun. 2012.

    [7]    L. Valerio, R. Bruno and A. Passarella, "Adaptive data offloading in opportunistic networks through an actor-critic learning method", in Proceedings of the 9th ACM MobiCom workshop on Challenged networks (ACM CHANTS), Sep. 2014, pp. 31-36..

    [8]    B. Han et al., "Mobile data offloading through opportunistic communications and social participation", IEEE Trans. Mobile Comput., vol. 11, no. 5, pp. 821-834, May 2012.

    [9]    M. Ghorbani, H. R. Rabiee, and A. Khodadadi, "Bayesian overlapping community detection in dynamic networks", arXiv preprint arXiv:1605.02288, 2016.

    [10] S. Andreev, A. Pyattaev, K. Johnsson, O. Galinina and Y. Koucheryavy, "Cellular traffic offloading onto network-assisted device-to-device connections", IEEE Commun. Mag., vol. 52, no. 4, pp. 20-31, Apr. 2014. 106

    [11] B. Han, P. Hui, V. Kumar, M. V. Marathe, G. Pei and A. Srinivasan, "Cellular Traffic Offloading through Opportunistic Communications: A Case Study", in Proc. of the 5th ACM workshop on Challenged networks (ACM CHANTS 2010), Sep. 2010, pp. 31-38.

    [12]  L. Valerio, R. Bruno and A. Passarella, "Cellular traffic offloading via opportunistic networking with reinforcement learning", Computer Communications, vol. 71, pp. 129-141, 2015.

    [13] Ackerman, Eyal, Oren Ben-Zwi, and Guy Wolfovitz, "Combinatorial model and bounds for target set selection", Theoretical Computer Science, vol. 411, no. 44-46, pp. 4017-4022, 2010. 

    [14] W. Liu, W. Gong, W. Du and C. Zou, "Computation offloading strategy for multi user mobile data streaming applications", in 19th International Conference on Advanced Communication Technology (ICACT), 2017, pp. 111-120.

    [15] F. Rebecchi, M. D. de Amorim, V. Conan, A. Passarella, R. Bruno and M. Conti, "Data offloading techniques in cellular networks: A survey", IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 580-603, 2nd Quart. 2015.

    [16] G. Gao, M. Xiao, J. Wu, K. Han and L. Huang, "Deadline-sensitive mobile data offloading via opportunistic communications", in Proc. 13th Annu. IEEE Int. Conf. Sens. Commun. Netw. (SECON) , 2016, pp. 1-9.

    [17] V. Srinivasan, M. Motani and W. T. Ooi, "Analysis and Implications of Student Contact Patterns Derived from Campus Schedules", in Proc. The 12th ACM International Conference on Mobile Computing and Networking (MOBICOM'06), 2006, pp. 86-97.

    [18] P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft and C. Diot, "Pocket Switched Networks and Human Mobility in Conf. Environments", in Proc. ACM Special Interest Group Data Comm. Workshop (SIGCOMM '05), 2005.

    [19]  N. Eagle, A. Pentland and D. Lazer, "Inferring social network structure using mobile phone data", Proc. Nat. Acad. Sci., vol. 106, no. 36, pp. 15274- 15278, Sep. 2007.

    [20] J. Orimolade and N. Ventura, "Intelligent access network selection for data offloading in heterogeneous networks" in AFRICON 2015, 2015, pp. 1-5. 107

    [21]  J. Jiang, S. Zhang and B. Li, "Maximized cellular traffic offloading via device-to-device content sharing", IEEE J. Sel. Areas Commun., vol. 34, no. 1, pp. 82-91, Jan 2016.

    [22] D. Kempe, J. M. Kleinberg and E. Tardos, "Maximizing the spread of influence through a social network", Theory of Computing, vol. 11, no. 4, Apr 2015.

    [23] V. Gupta and M. K. Rohil, "Mobile data offloading: Benefits issues and technological solutions", in International Conference on Computer Science Engineering & Applications (ICCSEA), May 2012, pp. 73-80.

    [24] K. Lee, J. Lee, Y. Yi, I. Rhee and S. Chong, "Mobile data offloading: How much can WiFi deliver ?", IEEE/ACM Trans. Netw., vol. 21, no. 2, pp. 536- 550, Apr. 2013.

    [25] S. Hoteit et al., "Mobile data traffic offloading over passpoint hotspots", Comput. Netw., vol. 84, no. 19, pp. 76-93, Jun. 2015

    Cite This Article As :
    Kumar, Prashant. , Agarwal, Ratish. Advanced Intrusion Detection in Vehicular Networks: Empowering Security through Hybrid Off-loading Techniques and Enhanced Radial Bias Neural Network. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2024, pp. 42-62. DOI: https://doi.org/10.54216/JISIoT.110205
    Kumar, P. Agarwal, R. (2024). Advanced Intrusion Detection in Vehicular Networks: Empowering Security through Hybrid Off-loading Techniques and Enhanced Radial Bias Neural Network. Journal of Intelligent Systems and Internet of Things, (), 42-62. DOI: https://doi.org/10.54216/JISIoT.110205
    Kumar, Prashant. Agarwal, Ratish. Advanced Intrusion Detection in Vehicular Networks: Empowering Security through Hybrid Off-loading Techniques and Enhanced Radial Bias Neural Network. Journal of Intelligent Systems and Internet of Things , no. (2024): 42-62. DOI: https://doi.org/10.54216/JISIoT.110205
    Kumar, P. , Agarwal, R. (2024) . Advanced Intrusion Detection in Vehicular Networks: Empowering Security through Hybrid Off-loading Techniques and Enhanced Radial Bias Neural Network. Journal of Intelligent Systems and Internet of Things , () , 42-62 . DOI: https://doi.org/10.54216/JISIoT.110205
    Kumar P. , Agarwal R. [2024]. Advanced Intrusion Detection in Vehicular Networks: Empowering Security through Hybrid Off-loading Techniques and Enhanced Radial Bias Neural Network. Journal of Intelligent Systems and Internet of Things. (): 42-62. DOI: https://doi.org/10.54216/JISIoT.110205
    Kumar, P. Agarwal, R. "Advanced Intrusion Detection in Vehicular Networks: Empowering Security through Hybrid Off-loading Techniques and Enhanced Radial Bias Neural Network," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 42-62, 2024. DOI: https://doi.org/10.54216/JISIoT.110205