References of "Senouci, Sidi-Mohammed"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailA Lightweight 5G-V2X Intra-slice Intrusion Detection System Using Knowledge Distillation
Hossain, Shajjad; Boualouache, Abdelwahab UL; Brik, Bouziane et al

in A Lightweight 5G-V2X Intra-slice Intrusion Detection System Using Knowledge Distillation (2023, May)

As the automotive industry grows, modern vehicles will be connected to 5G networks, creating a new Vehicular-to-Everything (V2X) ecosystem. Network Slicing (NS) supports this 5G-V2X ecosystem by enabling ... [more ▼]

As the automotive industry grows, modern vehicles will be connected to 5G networks, creating a new Vehicular-to-Everything (V2X) ecosystem. Network Slicing (NS) supports this 5G-V2X ecosystem by enabling network operators to flexibly provide dedicated logical networks addressing use case specific-requirements on top of a shared physical infrastructure. Despite its benefits, NS is highly vulnerable to privacy and security threats, which can put Connected and Automated Vehicles (CAVs) in dangerous situations. Deep Learning-based Intrusion Detection Systems (DL-based IDSs) have been proposed as the first defense line to detect and report these attacks. However, current DL-based IDSs are processing and memory-consuming, increasing security costs and jeopardizing 5G-V2X acceptance. To this end, this paper proposes a lightweight intrusion detection scheme for 5G-V2X sliced networks. Our scheme leverages DL and Knowledge Distillation (KD) for training in the cloud and offloading knowledge to slice-tailored lightweight DL models running on CAVs. Our results show that our scheme provides an optimal trade-off between detection accuracy and security overhead. Specifically, it can reduce security overhead in computation and memory complexity to more than 50% while keeping almost the same performance as heavy DL-based IDSs. [less ▲]

Detailed reference viewed: 145 (1 UL)
Full Text
Peer Reviewed
See detailOn-Demand Security Framework for 5GB Vehicular Networks
Boualouache, Abdelwahab UL; Brik, Bouziane; Senouci, Sidi-Mohammed et al

in IEEE Internet of Things Magazine (2023)

Building accurate Machine Learning (ML) attack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating ... [more ▼]

Building accurate Machine Learning (ML) attack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model's security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trusted interactions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an efficient consensus algorithm with an intelligent incentive mechanism to select the best FL workers that deliver highly accurate local ML models. Our experiments demonstrate that the framework achieves higher accuracy on a well-known vehicular dataset with a lower blockchain consensus time than related solutions. Specifically, our framework enhances the accuracy by 14% and decreases the consensus time, at least by 50%, compared to related works. Finally, this article discusses the framework's key challenges and potential solutions. [less ▲]

Detailed reference viewed: 163 (8 UL)
Full Text
Peer Reviewed
See detailEdge Computing enabled Intrusion Detection for C-V2X Networks using Federated Learning
Selamnia, Aymene; Brik, Bouziane; Senouci, Sidi-Mohammed et al

in The 2022 IEEE Global Communications Conference (GLOBECOM) (2022, December)

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML ... [more ▼]

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption. [less ▲]

Detailed reference viewed: 106 (3 UL)
Full Text
Peer Reviewed
See detailEdge Computing-enabled Intrusion Detection for C-V2X Networks using Federated Learning
Selamnia, Aymene; Brik, Bouziane; Senouci, Sidi-Mohammed et al

in The 2022 IEEE Global Communications Conference (GLOBECOM) (2022, December)

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML ... [more ▼]

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption. [less ▲]

Detailed reference viewed: 84 (1 UL)
Full Text
Peer Reviewed
See detail5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities
Boualouache, Abdelwahab UL; Brik, Bouziane; Tang, Qiang et al

in IEEE Internet of Things Journal (2022)

5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G ... [more ▼]

5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use–cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities. [less ▲]

Detailed reference viewed: 142 (15 UL)
Full Text
Peer Reviewed
See detailDeep Learning-based Intra-slice Attack Detection for 5G-V2X Sliced Networks
Boualouache, Abdelwahab UL; Djaidja, Taki Eddine Toufik; Senouci, Sidi-Mohammed et al

in 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) (2022, August 25)

Connected and Automated Vehicles (CAVs) represent one of the main verticals of 5G to provide road safety, road traffic efficiency, and user convenience. As a key enabler of 5G, Network Slicing (NS) aims ... [more ▼]

Connected and Automated Vehicles (CAVs) represent one of the main verticals of 5G to provide road safety, road traffic efficiency, and user convenience. As a key enabler of 5G, Network Slicing (NS) aims to create Vehicle-to-Everything (V2X) network slices with different network requirements on a shared and programmable physical infrastructure. However, NS has generated new network threats that might target CAVs leading to road hazards. More specifically, such attacks may target either the inner functioning of each V2X-NS (intra-slice) or break the NS isolation. In this paper, we aim to deal with the raised question of how to detect intra-slice V2X attacks. To do so, we leverage both Virtual Security as a Service (VSaS) concept and deep learning (DL) to deploy a set of DL-empowered security Virtual Network Functions (sVNFs) within V2X-NSs. These sVNFs are in charge of detecting such attacks, thanks to a DL model that we also build in this work. The proposed DL model is trained, validated, and tested using a publicly available dataset. The results show the efficiency and accuracy of our scheme to detect intra-slice V2X attacks. [less ▲]

Detailed reference viewed: 102 (3 UL)