Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 14 , Issue 1 , PP: 179-196, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet

Raj Kumar 1 * , Sakshi Pandey 2 , Asha KS 3 , Rakesh Kumar Yadav 4 , Abhinav Mishra 5 , Sunil Sharma 6

  • 1 Department of uGDX, ATLAS SkillTech University, Mumbai, Maharashtra, India - (raj.kumar@atlasuniversity.edu.in)
  • 2 Centre of Research Impact and Outcome, Chitkara University, Rajpura- 140417, Punjab, India - (sakshi.pandey.orp@chitkara.edu.in)
  • 3 Department of Electronics and Communication Engineering, Faculty of Engineering and Technology, JAIN (Deemed-to-be University), Bangalore, Karnataka, India - (ks.asha@jainuniversity.ac.in)
  • 4 Associate Professor, Maharishi School of Engineering & Technology, Maharishi University of Information Technology, Uttar Pradesh, India - (rkymuit@gmail.com)
  • 5 Chitkara Centre for Research and Development, Chitkara University, Himachal Pradesh-174103 India - (abhinav.mishra.orp@chitkara.edu.in)
  • 6 Assistant Professor, Department of Computer Science & Engineering, Vivekananda Global University, Jaipur, India - ( sunil.sharma@vgu.ac.in)
  • Doi: https://doi.org/10.54216/JCIM.140112

    Received: January 23, 2024 Revised: March 27, 2024 Accepted: June 11, 2024
    Abstract

    The proposed systems can improve cyber security in VANET applications by enabling efficient detection of complex attacks on the RSU component. The subsequent sections discuss the systems that are applied and support the suggestions for improving the VANET trustworthiness. VANETs and show that the utilization of Cross-Layer Adaptive GNNs can improve cyber security and LEARNING in VANET-based RSUs. As a result, the suggested system can provide robust ways for detecting cyber-attacks by: modeling the network architecture using graphs while combining information regarding several protocol layers to detect complicated interactions between the network entities and find the abnormal activities. the nature of the GNN enables it to update in real-time by adapting to the evolving attack patterns and the shifting network conditions, making them sturdy and flexible defense ways for cyber security. The proposed network e systems can efficiently detect multiple cyber threats and focus on reducing the number of false positives while maintaining low computation costs. Therefore, chances are that incorporating the Cross-layer adaptive GNNs into the RSUs can improve cyber security in VANETs, enhancing the robustness and reliability of prospective smart transportation systems.

    Keywords :

    VANET , Roadside units (RSUs) , Cyber security , Graph Neural Networks (GNNs) , Cross-layer adaptation , Intrusion detection.

    References

         [1]      A. A. Khan, M. Abolhasan, W. Ni, J. Lipman, and A. Jamalipour, "A Hybrid-Fuzzy Logic Guided Genetic Algorithm (H-FLGA) Approach for Resource Optimization in 5G VANETs," in IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 6964-6974, July 2019, DOI: 10.1109/TVT.2019.2915194.

         [2]      C. Wu et al., "Packet Size-Aware Broadcasting in VANETs With Fuzzy Logic and RL-Based Parameter Adaptation," in IEEE Access, vol. 3, pp. 2481-2491, 2015, DOI: 10.1109/ACCESS.2015.2502949.

         [3]      F. A. Ghaleb et al., "Deep Kalman Neuro Fuzzy-Based Adaptive Broadcasting Scheme for Vehicular Ad Hoc Network: A Context-Aware Approach," in IEEE Access, vol. 8, pp. 217744-217761, 2020, DOI: 10.1109/ACCESS.2020.3040903.

         [4]      H. Fatemidokht, M. K. Rafsanjani, B. B. Gupta, and C. -H. Hsu, "Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems," in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4757-4769, July 2021, DOI: 10.1109/TITS.2020.3041746.

         [5]      H. Zhou, H. Wang, X. Chen, X. Li, and S. Xu, "Data Offloading Techniques Through Vehicular Ad Hoc Networks: A Survey," in IEEE Access, vol. 6, pp. 65250-65259, 2018, DOI: 10.1109/ACCESS.2018.2878552.

         [6]      J. Shu, L. Zhou, W. Zhang, X. Du, and M. Guizani, "Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach," in IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4519-4530, July 2021, DOI: 10.1109/TITS.2020.3027390.

         [7]      K. Fukuoka, M. Yamamoto, T. Yokotani, M. Saito and Y. Terashima, "Network Behavior Estimation Method for Wireless Ad-Hoc Networks by Analyzing Data Transmission Traffic," 2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU), 2019, pp. 1-4, DOI: 10.23919/ICMU48249.2019.9006669.

         [8]      L. L. Cárdenas, A. M. Mezher, P. A. Barbecho Bautista, J. P. Astudillo León and M. A. Igartua, "A Multimetric Predictive ANN-Based Routing Protocol for Vehicular Ad Hoc Networks," in IEEE Access, vol. 9, pp. 86037-86053, 2021, doi: 10.1109/ACCESS.2021.3088474.

         [9]      L. Nie, Y. Wu, H. Wang and y. li, "Anomaly Detection Based on Spatio-Temporal and Sparse Features of Network Traffic in VANETs," in IEEE Access, vol. 7, pp. 177954-177964, 2019, DOI: 10.1109/ACCESS.2019.2958068.

       [10]     M. A. Hossain, R. M. Noor, K. -L. A. Yau, S. R. Azzuhri, M. R. Z’aba, and I. Ahmed, "Comprehensive Survey of Machine Learning Approaches in Cognitive Radio-Based Vehicular Ad Hoc Networks," in IEEE Access, vol. 8, pp. 78054-78108, 2020, DOI: 10.1109/ACCESS.2020.2989870.

       [11]     Shaymaa Adnan Abdulrahman , Rafah Amer Jaafar, Detection and Classification of Alcoholics Using Electroencephalogram Signal and Support Vector Machine, Fusion: Practice and Applications, Vol. 2 , No. 1 , (2020) : 14-21 (Doi   :  https://doi.org/10.54216/FPA.020103)

       [12]     Anjali Raghav , Monika Gupta, Ensemble Learning for Facial Expression Recognition, Fusion: Practice and Applications, Vol. 2 , No. 1 , (2020) : 31-41 (Doi   :  https://doi.org/10.54216/FPA.020104)

       [13]     M. Y. Arafat and S. Moh, "Routing Protocols for Unmanned Aerial Vehicle Networks: A Survey," in IEEE Access, vol. 7, pp. 99694-99720, 2019, DOI: 10.1109/ACCESS.2019.2930813.

       [14]     N. Lin, L. Fu, L. Zhao, G. Min, A. Al-Dubai and H. Gacanin, "A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model," in IEEE Transactions on Wireless Communications, vol. 19, no. 7, pp. 4919-4933, July 2020, DOI: 10.1109/TWC.2020.2988363.

       [15]     V. Roy. " An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things" Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023 ,PP. 8-17.

       [16]     R. A. Najib and S. Moh, "Routing Protocols for Unmanned Aerial Vehicle-Aided Vehicular Ad Hoc Networks: A Survey," in IEEE Access, vol. 8, pp. 77535-77560, 2020, DOI: 10.1109/ACCESS.2020.2989790.

       [17]     S. Hung, X. Zhang, A. Festag, K. Chen and G. Fettweis, "Vehicle-Centric Network Association in Heterogeneous Vehicle-to-Vehicle Networks," in IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 5981-5996, June 2019, DOI: 10.1109/TVT.2019.2910324.

       [18]     V. Roy. " Breast cancer Classification with Multi-Fusion Technique and Correlation Analysis" Fusion: Practice & Applications, Vol. 9, No. 2, 2023 ,PP. 48-61.

       [19]     Xiaohui Yuan , Reem Atassi, Geological Landslide Disaster Monitoring Based on Wireless Network Technology, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 1 , (2021) : 21-32 (Doi   :  https://doi.org/10.54216/IJWAC.020102)

       [20]     P. Kumar, A. Baliyan, K. R. Prasad, N. Sreekanth, P. Jawarkar, V. Roy, E. T. Amoatey, "Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks", Wireless Communications and Mobile Computing, vol. 2022, Article ID 5713092, 15 pages, 2022. https://doi.org/10.1155/2022/5713092

       [21]     Mohd Zainal Abidin Ab Kadir , Mhmed Algrnaodi , Ahmed N. Al-Masri, Optimal Algorithm for Shared Network Communication Bandwidth in IoT Applications, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 1 , (2021) : 33-48 (Doi   :  https://doi.org/10.54216/IJWAC.020103)

       [22]     X. Li, Y. Wang, P. Vijayakumar, D. He, N. Kumar, and J. Ma, "Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network," in IEEE Transactions on Vehicular Technology, vol. 68, no. 11, pp. 11309-11322, Nov. 2019, DOI: 10.1109/TVT.2019.2943118.

       [23]     X. Lu, L. Xiao, T. Xu, Y. Zhao, Y. Tang, and W. Zhuang, "Reinforcement Learning Based PHY Authentication for VANETs," in IEEE Transactions on Vehicular Technology, vol. 69, no. 3, pp. 3068-3079, March 2020, DOI: 10.1109/TVT.2020.2967026.

       [24]     Y. A. Shah, H. A. Habib, F. Aadil, M. F. Khan, M. Maqsood and T. Nawaz, "CAMONET: Moth-Flame Optimization (MFO) Based Clustering Algorithm for VANETs," in IEEE Access, vol. 6, pp. 48611-48624, 2018, DOI: 10.1109/ACCESS.2018.2868118.

       [25]     Mohamed Elsharkawy , Ahmed N. Al Masri, A Novel Image Encryption with Deep Learning Model for Secure Content based Image Retrieval, Journal of Cybersecurity and Information Management, Vol. 0 , No. 2 , (2019) : 54-64 (Doi   :  https://doi.org/10.54216/JCIM.000105)

       [26]     Abdul Rahaman Wahab Sait , Irina Pustokhina , M. Ilayaraja, Mitigating DDoS Attacks in Wireless Sensor Networks using Heuristic Feature Selection with Deep Learning Model, Journal of Cybersecurity and Information Management, Vol. 0 , No. 2 , (2019) : 65-74 (Doi   :  https://doi.org/10.54216/JCIM.000106)

       [27]     Y. Maalej, S. Sorour, A. Abdel-Rahim, and M. Guizani, "Vanets Meet Autonomous Vehicles: Multimodal Surrounding Recognition Using Manifold Alignment," in IEEE Access, vol. 6, pp. 29026-29040, 2018, DOI: 10.1109/ACCESS.2018.2839561.

       [28]     V. Roy. "An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 , PP. 42-52.

       [29]     Y. Tang, N. Cheng, W. Wu, M. Wang, Y. Dai, and X. Shen, "Delay-Minimization Routing for Heterogeneous VANETs With Machine Learning-Based Mobility Prediction," in IEEE Transactions on Vehicular Technology, vol. 68, no. 4, pp. 3967-3979, April 2019, DOI: 10.1109/TVT.2019.2899627.

       [30]     Lobna Osman, Olutosin Taiwo, Ahmed Elashry, Absalom E. Ezugwu,  Intelligent Edge Computing for IoT: Enhancing Security and Privacy,  Journal of Intelligent Systems and Internet of Things,  Vol. 8 ,  No. 1 ,  (2023) : 55-65 (Doi   :  https://doi.org/10.54216/JISIoT.080105)

       [31]     Ossama H. Embarak, Raed Abu Zitar,  Securing Wireless Sensor Networks Against DoS attacks in Industrial 4.0,  Journal of Intelligent Systems and Internet of Things,  Vol. 8 ,  No. 1 ,  (2023) : 66-74 (Doi   :  https://doi.org/10.54216/JISIoT.080106)

       [32]     Y. Yang, Z. Gao, Y. Ma, B. Cao, and D. He, "Machine Learning Enabling Analog Beam Selection for Concurrent Transmissions in Millimeter-Wave V2V Communications," in IEEE Transactions on Vehicular Technology, vol. 69, no. 8, pp. 9185-9189, Aug. 2020, DOI: 10.1109/TVT.2020.3001340.

    Cite This Article As :
    Kumar, Raj. , Pandey, Sakshi. , KS, Asha. , Kumar, Rakesh. , Mishra, Abhinav. , Sharma, Sunil. Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 179-196. DOI: https://doi.org/10.54216/JCIM.140112
    Kumar, R. Pandey, S. KS, A. Kumar, R. Mishra, A. Sharma, S. (2024). Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet. Journal of Cybersecurity and Information Management, (), 179-196. DOI: https://doi.org/10.54216/JCIM.140112
    Kumar, Raj. Pandey, Sakshi. KS, Asha. Kumar, Rakesh. Mishra, Abhinav. Sharma, Sunil. Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet. Journal of Cybersecurity and Information Management , no. (2024): 179-196. DOI: https://doi.org/10.54216/JCIM.140112
    Kumar, R. , Pandey, S. , KS, A. , Kumar, R. , Mishra, A. , Sharma, S. (2024) . Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet. Journal of Cybersecurity and Information Management , () , 179-196 . DOI: https://doi.org/10.54216/JCIM.140112
    Kumar R. , Pandey S. , KS A. , Kumar R. , Mishra A. , Sharma S. [2024]. Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet. Journal of Cybersecurity and Information Management. (): 179-196. DOI: https://doi.org/10.54216/JCIM.140112
    Kumar, R. Pandey, S. KS, A. Kumar, R. Mishra, A. Sharma, S. "Cyber Security Protection in Roadside Unit Based on Cross-Layer Adaptive Graph Neural Networks (Gnns) in Vanet," Journal of Cybersecurity and Information Management, vol. , no. , pp. 179-196, 2024. DOI: https://doi.org/10.54216/JCIM.140112