2023
DOI: 10.3390/s23146554
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things

Abdul Razaque,
Gulnara Bektemyssova,
Joon Yoo
et al.

Abstract: Deep learning algorithms have a wide range of applications, including cancer diagnosis, face and speech recognition, object recognition, etc. It is critical to protect these models since any changes to them can result in serious losses in a variety of ways. This article proposes the consortium blockchain-enabled conventional neural network (CBCNN), a four-layered paradigm for detecting malicious vehicles. Layer-1 is a convolutional neural network-enabled Internet-of-Things (IoT) model for the vehicle; Layer-2 … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…The framework gathers information from four main layers, namely, the IoT layer, network layer, fog layer, and cloud layer to monitor and analyse the network traffic among IoT devices. The authors in [ 23 , 24 ] proposed blockchain-based solutions to detect malicious vehicles and IoT devices. The main difference between our work and the work proposed in [ 23 ] is that in the latter case, the malicious behaviour of the vehicles is detected using machine learning (neural networks), while in our case we focus on the lateral movement among the endpoints installed inside the vehicles.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The framework gathers information from four main layers, namely, the IoT layer, network layer, fog layer, and cloud layer to monitor and analyse the network traffic among IoT devices. The authors in [ 23 , 24 ] proposed blockchain-based solutions to detect malicious vehicles and IoT devices. The main difference between our work and the work proposed in [ 23 ] is that in the latter case, the malicious behaviour of the vehicles is detected using machine learning (neural networks), while in our case we focus on the lateral movement among the endpoints installed inside the vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [ 23 , 24 ] proposed blockchain-based solutions to detect malicious vehicles and IoT devices. The main difference between our work and the work proposed in [ 23 ] is that in the latter case, the malicious behaviour of the vehicles is detected using machine learning (neural networks), while in our case we focus on the lateral movement among the endpoints installed inside the vehicles. The authors in [ 24 ] addressed the problem of indoor navigation and proposed a new secure communication approach based on blockchain, which is different from the objective of our paper.…”
Section: Introductionmentioning
confidence: 99%