0000000000332071

AUTHOR

Bouziane Brik

showing 5 related works from this author

On-Demand Security Framework for 5GB Vehicular Networks

2023

Building accurate Machine Learning (ML) at-tack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model’s security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trustedinteractions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an ef…

—5G and Beyond Vehicular Networks: Computer science [C05] [Engineering computing & technology]Blockchain[SPI] Engineering Sciences [physics]Security and Privacy: Sciences informatiques [C05] [Ingénierie informatique & technologie]Federated Learning5G and Beyond Vehicular Networks
researchProduct

Système d'Inférence floue pour adapter dynamiquement le temps de réservation des ressources/amélioration de la sécurité

2021

[SPI] Engineering Sciences [physics]
researchProduct

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

2023

Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]5GBIoV[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Zero-day attacksSécurité5G V2X IoV Sécurité Attaques Détection Apprentissage Fédéré[INFO] Computer Science [cs]Intrusion DetectionDétectionAttaquesSecurityV2XApprentissage FédéréFederated Learning5GConnected and Automated Vehicles[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

DRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks

2022

[SPI] Engineering Sciences [physics]
researchProduct

Edge Computing-enabled Intrusion Detection for C-V2X Networks using Federated Learning

2022

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across thes…

: Computer science [C05] [Engineering computing & technology]Federated deep learning[SPI] Engineering Sciences [physics]Intrusion detection systemEdge computing: Sciences informatiques [C05] [Ingénierie informatique & technologie]C-V2X
researchProduct