TY - JOUR
T1 - Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection
AU - Mourad, Azzam
AU - Tout, Hanine
AU - Wahab, Omar Abdel
AU - Otrok, Hadi
AU - Dbouk, Toufic
N1 - Funding Information:
Manuscript received April 13, 2020; revised June 17, 2020; accepted June 30, 2020. Date of publication July 10, 2020; date of current version January 7, 2021. This work was supported in part by the Lebanese American University, in part by Universite du Quebec en Outaouais, and in part by Khalifa University. (Corresponding author: Azzam Mourad.) Azzam Mourad and Hanine Tout are with the Department of Computer Science and Mathematics, Lebanese American University, Beirut 961, Lebanon (e-mail: [email protected]; [email protected]). Omar Abdel Wahab is with the Department of Computer Science and Engineering, Université du Quebec en Outaouais, Gatineau, QC 8Y 3G5, Canada (e-mail: [email protected]). Hadi Otrok is with the Center of Cyber-Physical Systems, Department of EECS, Khalifa University, Abu Dhabi, UAE (e-mail: [email protected]). Toufic Dbouk is with Samsung Electronics America, Ridgefield Park, NJ 07660 USA (e-mail: [email protected]). Digital Object Identifier 10.1109/JIOT.2020.3008488
Publisher Copyright:
© 2014 IEEE.
PY - 2021/1/15
Y1 - 2021/1/15
N2 - Internet of Vehicles and vehicular networks have been compelling targets for malicious security attacks where several intrusion detection solutions have been proposed for protecting them. Nonetheless, their main problem lies in their heavy computation, which makes them unsuitable for next-generation artificial intelligence-powered self-driving vehicles whose computational power needs to be primarily reserved for real-time driving decisions. To address this challenge, several approaches have been lately presented to take advantage of the cloud computing for offloading intrusion detection tasks to central cloud servers, thus reducing storage and processing costs on vehicles. However, centralized cloud computing entails high latency on intrusion detection related data transmission and plays against its adoption in delay-critical intelligent applications. In this context, this article proposes a vehicular-edge computing (VEC) fog-enabled scheme allowing offloading intrusion detection tasks to federated vehicle nodes located within nearby formed ad hoc vehicular fog to be cooperatively executed with minimal latency. The problem has been formulated as a multiobjective optimization model and solved using a genetic algorithm maximizing offloading survivability in the presence of high mobility and minimizing computation execution time and energy consumption. Experiments performed on resource-constrained devices within actual ad hoc fog environment illustrate that our solution significantly reduces the execution time of the detection process while maximizing the offloading survivability under different real-life scenarios.
AB - Internet of Vehicles and vehicular networks have been compelling targets for malicious security attacks where several intrusion detection solutions have been proposed for protecting them. Nonetheless, their main problem lies in their heavy computation, which makes them unsuitable for next-generation artificial intelligence-powered self-driving vehicles whose computational power needs to be primarily reserved for real-time driving decisions. To address this challenge, several approaches have been lately presented to take advantage of the cloud computing for offloading intrusion detection tasks to central cloud servers, thus reducing storage and processing costs on vehicles. However, centralized cloud computing entails high latency on intrusion detection related data transmission and plays against its adoption in delay-critical intelligent applications. In this context, this article proposes a vehicular-edge computing (VEC) fog-enabled scheme allowing offloading intrusion detection tasks to federated vehicle nodes located within nearby formed ad hoc vehicular fog to be cooperatively executed with minimal latency. The problem has been formulated as a multiobjective optimization model and solved using a genetic algorithm maximizing offloading survivability in the presence of high mobility and minimizing computation execution time and energy consumption. Experiments performed on resource-constrained devices within actual ad hoc fog environment illustrate that our solution significantly reduces the execution time of the detection process while maximizing the offloading survivability under different real-life scenarios.
KW - Ad hoc vehicular fog
KW - cooperative intrusion detection
KW - federated vehicles
KW - Internet of Things (IoT)
KW - Internet of Vehicles (IoV)
KW - mobile-edge computing (MEC)
KW - multiobjective optimization
KW - offloading
KW - resource management
KW - security
KW - vehicular fog federation
KW - vehicular-edge computing (VEC)
UR - http://www.scopus.com/inward/record.url?scp=85099123407&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2020.3008488
DO - 10.1109/JIOT.2020.3008488
M3 - Article
AN - SCOPUS:85099123407
SN - 2327-4662
VL - 8
SP - 829
EP - 843
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 2
M1 - 9138386
ER -