2021
DOI: 10.1109/tits.2020.3027390
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 105 publications
(55 citation statements)
references
References 23 publications
0
38
0
3
Order By: Relevance
“…Network Intrusion Detection System (NIDS) is often designed for specific use cases. In the literature, Federated Learning (FL) method has been proposed for intrusion detection in Wireless Edge Network (WEN) [32], [33], IoT [21]- [23], [34]- [39], Industrial IoT (IIoT) [24], [40]- [42], industrial Cyber-Physical System (CPS) [43], Medical CPS [44], Wireless Fidelity (Wi-Fi) network [45], large-scale distributed Local Area Network (LAN) [46], [47], satellite-terrestrial integrated networks [48], Cloud [49], edge computing [50], vehicular network [26], [51], [52]. We acknowledge that FL methods have been proposed for intrusion detection in IoT networks [21]- [23], [34]- [39].…”
Section: Review Of Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Network Intrusion Detection System (NIDS) is often designed for specific use cases. In the literature, Federated Learning (FL) method has been proposed for intrusion detection in Wireless Edge Network (WEN) [32], [33], IoT [21]- [23], [34]- [39], Industrial IoT (IIoT) [24], [40]- [42], industrial Cyber-Physical System (CPS) [43], Medical CPS [44], Wireless Fidelity (Wi-Fi) network [45], large-scale distributed Local Area Network (LAN) [46], [47], satellite-terrestrial integrated networks [48], Cloud [49], edge computing [50], vehicular network [26], [51], [52]. We acknowledge that FL methods have been proposed for intrusion detection in IoT networks [21]- [23], [34]- [39].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Edge computing can be combined with DL to bring intelligence closer to where data are being generated, thereby addressing the issues of data privacy, high communication cost, large memory space requirement, short training time, and high latency [25]. Localized DL (LDL) and Distributed DL (DDL) methods achieve edge intelligence without data aggregation [26]. However, the classification p erformance of these methods is usually low in zero-day (previously unknown) botnet attack scenarios because a single IoT edge device has limited training samples.…”
mentioning
confidence: 99%
“…Shu et al [208] demonstrate an IDS for Vehicular Ad Hoc Networks (VANETs) by installing a distributed SDN controller on each base station to distinguish regular network traffic and malicious network traffic. Using the full network flow information, they used GAN to jointly train numerous SDN controllers for the entire VANET without directly trading their sub-network flows.…”
Section: Unsupervised DL Based Ids In Sdnmentioning
confidence: 99%
“…Deep learning is doing wonders when it comes to intrusion Detection Systems both in WSN and VANETs. To suppress the inter-vehicle attacks and malicious nodes detection, deep learning based distributed approach is widely adapted for abnormal activity detections [36]. Another fault detection technique is Distributed data mining method based on DNN [2] and routing technique is IP Base node degree of WC [37].…”
Section: ) Deep Learningmentioning
confidence: 99%