Optimizing Security Protocol: A Synergy of Bio-Inspired Planet Optimization Algorithm With Ensemble Learning-Based Attack Detection for Connected and Autonomous Vehicles
Connected and Autonomous Vehicles (CAVs) enable different functionalities and capabilities such as navigation and path planning, automated driving assistance, cruise control, low-carbon transportation, and independent decision-making in real-world scenarios. However, the increased usage of CAVs redu...
Gespeichert in:
Veröffentlicht in: | IEEE access 2024, Vol.12, p.173209-173222 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 173222 |
---|---|
container_issue | |
container_start_page | 173209 |
container_title | IEEE access |
container_volume | 12 |
creator | Alrayes, Fatma S. Aljebreen, Mohammed Maray, Mohammed Alshuhail, Asma Alrslani, Faheed A. F. Salama, Ahmed S. |
description | Connected and Autonomous Vehicles (CAVs) enable different functionalities and capabilities such as navigation and path planning, automated driving assistance, cruise control, low-carbon transportation, and independent decision-making in real-world scenarios. However, the increased usage of CAVs reduces the possible vulnerabilities in the Internet of Vehicles (IoVs) framework, exposing it to cyber-attacks. An Intrusion Detection System (IDS) is a method to report network attacks by Autonomous Vehicles (AVs) without authorization and encryption techniques for internal and external vehicular transmission. To alleviate this risk, the lightweight IDS system must identify attacks on vehicular systems. Deep learning (DL) approaches promising algorithms for intrusion detection in CAVs, which leverage their capability to automatically extract and learn complex patterns from intricate and vast datasets. DL-based IDS can efficiently identify anomalous activities indicative of system vulnerabilities or cyberattacks by analyzing vehicle behaviour, network traffic, and sensor data in real-time, thus ensuring the integrity and security of CAV operations. Bio-inspired optimization algorithms have recently been used for feature selection (FS) and hyperparameter tuning processes, commonly stimulated by physical ideologies, evolution theories, and specific characteristics of living beings, to solve optimization issues competently in different applications. Therefore, this study introduces a novel Planet Optimization Algorithm with a Deep Ensemble Learning-based Intrusion Detection (POADEL-ID) technique for CAV networks. The presented POADEL-ID model concentrates on identifying intrusions in the CAV networks. In the POADEL-ID technique, linear scaling normalization (LSN) is utilized for the data scaling process. Besides, the high-dimensionality problem is resolved by the POA-based FS approach. Moreover, intrusion detection is performed by using an ensemble of three techniques, namely long short-term memory (LSTM), convolutional autoencoder (CAE), and kernel extreme learning machine (KELM). The multi-verse optimization (MVO) technique is implemented for the hyperparameter tuning process to enhance the |
doi_str_mv | 10.1109/ACCESS.2024.3481070 |
format | Article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_3131913679</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10718285</ieee_id><doaj_id>oai_doaj_org_article_8be689e4acd9419889d4942048343b4a</doaj_id><sourcerecordid>3131913679</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-dd0240573185a35bbb7de92a68955f3763e67fa696d8c22fba2a21b0d0de787f3</originalsourceid><addsrcrecordid>eNpNkU1v3CAQhq2qlRql-QXtAalnb_mwDfTmuNt0pZUSaftxRNgeb9jasAV82P6j_suw8aoKBxiGed4Z8WbZe4JXhGD5qW6a9W63opgWK1YIgjl-lV1RUsmclax6_SJ-m92EcMBpiZQq-VX27_4YzWT-GrtHO-hmb-IJPXgXXefGz6hGu5MFvz8hN6Bb4_KNDUfjoUcPo7YQ0QXX0TiL6nHvksDjhH6lHa1tgKkdAW1Be5s65Lc6JLSOUXe_0ReI0D1zg_Oocdama3rWNpXM0Vk3uTmgn_BouhHCu-zNoMcAN5fzOvvxdf29-ZZv7-82Tb3NOypkzPs-_QMuOSOi1Kxs25b3IKmuhCzLgfGKQcUHXcmqFx2lQ6uppqTFPe6BCz6w62yz6PZOH9TRm0n7k3LaqOeE83ulfTyPpEQLSRYK3fWyIFII2ReyoLgQrGBtoZPWx0Xr6N2fGUJUBzd7m8ZXjDAiCau4TFVsqeq8C8HD8L8rwepssVosVmeL1cXiRH1YKAMALwhOBBUlewKQdaSR</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3131913679</pqid></control><display><type>article</type><title>Optimizing Security Protocol: A Synergy of Bio-Inspired Planet Optimization Algorithm With Ensemble Learning-Based Attack Detection for Connected and Autonomous Vehicles</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Alrayes, Fatma S. ; Aljebreen, Mohammed ; Maray, Mohammed ; Alshuhail, Asma ; Alrslani, Faheed A. F. ; Salama, Ahmed S.</creator><creatorcontrib>Alrayes, Fatma S. ; Aljebreen, Mohammed ; Maray, Mohammed ; Alshuhail, Asma ; Alrslani, Faheed A. F. ; Salama, Ahmed S.</creatorcontrib><description>Connected and Autonomous Vehicles (CAVs) enable different functionalities and capabilities such as navigation and path planning, automated driving assistance, cruise control, low-carbon transportation, and independent decision-making in real-world scenarios. However, the increased usage of CAVs reduces the possible vulnerabilities in the Internet of Vehicles (IoVs) framework, exposing it to cyber-attacks. An Intrusion Detection System (IDS) is a method to report network attacks by Autonomous Vehicles (AVs) without authorization and encryption techniques for internal and external vehicular transmission. To alleviate this risk, the lightweight IDS system must identify attacks on vehicular systems. Deep learning (DL) approaches promising algorithms for intrusion detection in CAVs, which leverage their capability to automatically extract and learn complex patterns from intricate and vast datasets. DL-based IDS can efficiently identify anomalous activities indicative of system vulnerabilities or cyberattacks by analyzing vehicle behaviour, network traffic, and sensor data in real-time, thus ensuring the integrity and security of CAV operations. Bio-inspired optimization algorithms have recently been used for feature selection (FS) and hyperparameter tuning processes, commonly stimulated by physical ideologies, evolution theories, and specific characteristics of living beings, to solve optimization issues competently in different applications. Therefore, this study introduces a novel Planet Optimization Algorithm with a Deep Ensemble Learning-based Intrusion Detection (POADEL-ID) technique for CAV networks. The presented POADEL-ID model concentrates on identifying intrusions in the CAV networks. In the POADEL-ID technique, linear scaling normalization (LSN) is utilized for the data scaling process. Besides, the high-dimensionality problem is resolved by the POA-based FS approach. Moreover, intrusion detection is performed by using an ensemble of three techniques, namely long short-term memory (LSTM), convolutional autoencoder (CAE), and kernel extreme learning machine (KELM). The multi-verse optimization (MVO) technique is implemented for the hyperparameter tuning process to enhance the</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3481070</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Accuracy ; Advanced driver assistance systems ; Algorithms ; Automatic vehicle identification systems ; Autonomous navigation ; Autonomous vehicles ; Bio-inspired algorithm ; Bio-inspired computing ; Communications traffic ; Computational modeling ; Cruise control ; Cybersecurity ; Data models ; Deep learning ; Ensemble learning ; hyperparameter tuning ; Internet of Vehicles ; Intrusion detection ; intrusion detection system ; Intrusion detection systems ; Long short term memory ; Machine learning ; Optimization ; Optimization algorithms ; Optimization methods ; planet optimization algorithm ; Real time operation ; Security ; Tuning</subject><ispartof>IEEE access, 2024, Vol.12, p.173209-173222</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0002-1066-8261 ; 0000-0002-1644-8526 ; 0000-0001-5957-6467 ; 0000-0002-7066-2945</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10718285$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,4022,27632,27922,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Alrayes, Fatma S.</creatorcontrib><creatorcontrib>Aljebreen, Mohammed</creatorcontrib><creatorcontrib>Maray, Mohammed</creatorcontrib><creatorcontrib>Alshuhail, Asma</creatorcontrib><creatorcontrib>Alrslani, Faheed A. F.</creatorcontrib><creatorcontrib>Salama, Ahmed S.</creatorcontrib><title>Optimizing Security Protocol: A Synergy of Bio-Inspired Planet Optimization Algorithm With Ensemble Learning-Based Attack Detection for Connected and Autonomous Vehicles</title><title>IEEE access</title><addtitle>Access</addtitle><description>Connected and Autonomous Vehicles (CAVs) enable different functionalities and capabilities such as navigation and path planning, automated driving assistance, cruise control, low-carbon transportation, and independent decision-making in real-world scenarios. However, the increased usage of CAVs reduces the possible vulnerabilities in the Internet of Vehicles (IoVs) framework, exposing it to cyber-attacks. An Intrusion Detection System (IDS) is a method to report network attacks by Autonomous Vehicles (AVs) without authorization and encryption techniques for internal and external vehicular transmission. To alleviate this risk, the lightweight IDS system must identify attacks on vehicular systems. Deep learning (DL) approaches promising algorithms for intrusion detection in CAVs, which leverage their capability to automatically extract and learn complex patterns from intricate and vast datasets. DL-based IDS can efficiently identify anomalous activities indicative of system vulnerabilities or cyberattacks by analyzing vehicle behaviour, network traffic, and sensor data in real-time, thus ensuring the integrity and security of CAV operations. Bio-inspired optimization algorithms have recently been used for feature selection (FS) and hyperparameter tuning processes, commonly stimulated by physical ideologies, evolution theories, and specific characteristics of living beings, to solve optimization issues competently in different applications. Therefore, this study introduces a novel Planet Optimization Algorithm with a Deep Ensemble Learning-based Intrusion Detection (POADEL-ID) technique for CAV networks. The presented POADEL-ID model concentrates on identifying intrusions in the CAV networks. In the POADEL-ID technique, linear scaling normalization (LSN) is utilized for the data scaling process. Besides, the high-dimensionality problem is resolved by the POA-based FS approach. Moreover, intrusion detection is performed by using an ensemble of three techniques, namely long short-term memory (LSTM), convolutional autoencoder (CAE), and kernel extreme learning machine (KELM). The multi-verse optimization (MVO) technique is implemented for the hyperparameter tuning process to enhance the</description><subject>Accuracy</subject><subject>Advanced driver assistance systems</subject><subject>Algorithms</subject><subject>Automatic vehicle identification systems</subject><subject>Autonomous navigation</subject><subject>Autonomous vehicles</subject><subject>Bio-inspired algorithm</subject><subject>Bio-inspired computing</subject><subject>Communications traffic</subject><subject>Computational modeling</subject><subject>Cruise control</subject><subject>Cybersecurity</subject><subject>Data models</subject><subject>Deep learning</subject><subject>Ensemble learning</subject><subject>hyperparameter tuning</subject><subject>Internet of Vehicles</subject><subject>Intrusion detection</subject><subject>intrusion detection system</subject><subject>Intrusion detection systems</subject><subject>Long short term memory</subject><subject>Machine learning</subject><subject>Optimization</subject><subject>Optimization algorithms</subject><subject>Optimization methods</subject><subject>planet optimization algorithm</subject><subject>Real time operation</subject><subject>Security</subject><subject>Tuning</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkU1v3CAQhq2qlRql-QXtAalnb_mwDfTmuNt0pZUSaftxRNgeb9jasAV82P6j_suw8aoKBxiGed4Z8WbZe4JXhGD5qW6a9W63opgWK1YIgjl-lV1RUsmclax6_SJ-m92EcMBpiZQq-VX27_4YzWT-GrtHO-hmb-IJPXgXXefGz6hGu5MFvz8hN6Bb4_KNDUfjoUcPo7YQ0QXX0TiL6nHvksDjhH6lHa1tgKkdAW1Be5s65Lc6JLSOUXe_0ReI0D1zg_Oocdama3rWNpXM0Vk3uTmgn_BouhHCu-zNoMcAN5fzOvvxdf29-ZZv7-82Tb3NOypkzPs-_QMuOSOi1Kxs25b3IKmuhCzLgfGKQcUHXcmqFx2lQ6uppqTFPe6BCz6w62yz6PZOH9TRm0n7k3LaqOeE83ulfTyPpEQLSRYK3fWyIFII2ReyoLgQrGBtoZPWx0Xr6N2fGUJUBzd7m8ZXjDAiCau4TFVsqeq8C8HD8L8rwepssVosVmeL1cXiRH1YKAMALwhOBBUlewKQdaSR</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Alrayes, Fatma S.</creator><creator>Aljebreen, Mohammed</creator><creator>Maray, Mohammed</creator><creator>Alshuhail, Asma</creator><creator>Alrslani, Faheed A. F.</creator><creator>Salama, Ahmed S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-1066-8261</orcidid><orcidid>https://orcid.org/0000-0002-1644-8526</orcidid><orcidid>https://orcid.org/0000-0001-5957-6467</orcidid><orcidid>https://orcid.org/0000-0002-7066-2945</orcidid></search><sort><creationdate>2024</creationdate><title>Optimizing Security Protocol: A Synergy of Bio-Inspired Planet Optimization Algorithm With Ensemble Learning-Based Attack Detection for Connected and Autonomous Vehicles</title><author>Alrayes, Fatma S. ; Aljebreen, Mohammed ; Maray, Mohammed ; Alshuhail, Asma ; Alrslani, Faheed A. F. ; Salama, Ahmed S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-dd0240573185a35bbb7de92a68955f3763e67fa696d8c22fba2a21b0d0de787f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Advanced driver assistance systems</topic><topic>Algorithms</topic><topic>Automatic vehicle identification systems</topic><topic>Autonomous navigation</topic><topic>Autonomous vehicles</topic><topic>Bio-inspired algorithm</topic><topic>Bio-inspired computing</topic><topic>Communications traffic</topic><topic>Computational modeling</topic><topic>Cruise control</topic><topic>Cybersecurity</topic><topic>Data models</topic><topic>Deep learning</topic><topic>Ensemble learning</topic><topic>hyperparameter tuning</topic><topic>Internet of Vehicles</topic><topic>Intrusion detection</topic><topic>intrusion detection system</topic><topic>Intrusion detection systems</topic><topic>Long short term memory</topic><topic>Machine learning</topic><topic>Optimization</topic><topic>Optimization algorithms</topic><topic>Optimization methods</topic><topic>planet optimization algorithm</topic><topic>Real time operation</topic><topic>Security</topic><topic>Tuning</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alrayes, Fatma S.</creatorcontrib><creatorcontrib>Aljebreen, Mohammed</creatorcontrib><creatorcontrib>Maray, Mohammed</creatorcontrib><creatorcontrib>Alshuhail, Asma</creatorcontrib><creatorcontrib>Alrslani, Faheed A. F.</creatorcontrib><creatorcontrib>Salama, Ahmed S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alrayes, Fatma S.</au><au>Aljebreen, Mohammed</au><au>Maray, Mohammed</au><au>Alshuhail, Asma</au><au>Alrslani, Faheed A. F.</au><au>Salama, Ahmed S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optimizing Security Protocol: A Synergy of Bio-Inspired Planet Optimization Algorithm With Ensemble Learning-Based Attack Detection for Connected and Autonomous Vehicles</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>173209</spage><epage>173222</epage><pages>173209-173222</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Connected and Autonomous Vehicles (CAVs) enable different functionalities and capabilities such as navigation and path planning, automated driving assistance, cruise control, low-carbon transportation, and independent decision-making in real-world scenarios. However, the increased usage of CAVs reduces the possible vulnerabilities in the Internet of Vehicles (IoVs) framework, exposing it to cyber-attacks. An Intrusion Detection System (IDS) is a method to report network attacks by Autonomous Vehicles (AVs) without authorization and encryption techniques for internal and external vehicular transmission. To alleviate this risk, the lightweight IDS system must identify attacks on vehicular systems. Deep learning (DL) approaches promising algorithms for intrusion detection in CAVs, which leverage their capability to automatically extract and learn complex patterns from intricate and vast datasets. DL-based IDS can efficiently identify anomalous activities indicative of system vulnerabilities or cyberattacks by analyzing vehicle behaviour, network traffic, and sensor data in real-time, thus ensuring the integrity and security of CAV operations. Bio-inspired optimization algorithms have recently been used for feature selection (FS) and hyperparameter tuning processes, commonly stimulated by physical ideologies, evolution theories, and specific characteristics of living beings, to solve optimization issues competently in different applications. Therefore, this study introduces a novel Planet Optimization Algorithm with a Deep Ensemble Learning-based Intrusion Detection (POADEL-ID) technique for CAV networks. The presented POADEL-ID model concentrates on identifying intrusions in the CAV networks. In the POADEL-ID technique, linear scaling normalization (LSN) is utilized for the data scaling process. Besides, the high-dimensionality problem is resolved by the POA-based FS approach. Moreover, intrusion detection is performed by using an ensemble of three techniques, namely long short-term memory (LSTM), convolutional autoencoder (CAE), and kernel extreme learning machine (KELM). The multi-verse optimization (MVO) technique is implemented for the hyperparameter tuning process to enhance the</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3481070</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-1066-8261</orcidid><orcidid>https://orcid.org/0000-0002-1644-8526</orcidid><orcidid>https://orcid.org/0000-0001-5957-6467</orcidid><orcidid>https://orcid.org/0000-0002-7066-2945</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2024, Vol.12, p.173209-173222 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_3131913679 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Accuracy Advanced driver assistance systems Algorithms Automatic vehicle identification systems Autonomous navigation Autonomous vehicles Bio-inspired algorithm Bio-inspired computing Communications traffic Computational modeling Cruise control Cybersecurity Data models Deep learning Ensemble learning hyperparameter tuning Internet of Vehicles Intrusion detection intrusion detection system Intrusion detection systems Long short term memory Machine learning Optimization Optimization algorithms Optimization methods planet optimization algorithm Real time operation Security Tuning |
title | Optimizing Security Protocol: A Synergy of Bio-Inspired Planet Optimization Algorithm With Ensemble Learning-Based Attack Detection for Connected and Autonomous Vehicles |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T23%3A15%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optimizing%20Security%20Protocol:%20A%20Synergy%20of%20Bio-Inspired%20Planet%20Optimization%20Algorithm%20With%20Ensemble%20Learning-Based%20Attack%20Detection%20for%20Connected%20and%20Autonomous%20Vehicles&rft.jtitle=IEEE%20access&rft.au=Alrayes,%20Fatma%20S.&rft.date=2024&rft.volume=12&rft.spage=173209&rft.epage=173222&rft.pages=173209-173222&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3481070&rft_dat=%3Cproquest_doaj_%3E3131913679%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3131913679&rft_id=info:pmid/&rft_ieee_id=10718285&rft_doaj_id=oai_doaj_org_article_8be689e4acd9419889d4942048343b4a&rfr_iscdi=true |