Smart City Gnosys

Smart city article details

Title Threat Modeling For Ml-Based Topology Prediction In Vehicular Edge Computing Architecture
ID_Doc 57297
Authors Doan H.H.; Paul A.A.; Zeindlinger H.; Zhang Y.; Khan S.; Svetinovic D.
Year 2023
Published 2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
DOI http://dx.doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361465
Abstract The Internet of Vehicles (IoV), a network that interlinks vehicles, infrastructure, and assorted entities, serves as a cornerstone for intelligent transportation systems and the emergence of smart cities. Within this context, edge computing has been identified as a critical solution for providing rapid and reliable data processing. Machine Learning (ML) techniques have become essential to IoV activities such as resource allocation and load balancing across mobile edge servers, typified by decentralized services that range from natural language processing to image recognition. The fusion of ML with edge computing within IoV architecture promises enhanced performance, efficiency, and safety. However, this amalgamation also creates challenges related to data privacy, cybersecurity, malfunctioning edge devices, inconsistent network connectivity, human errors, and malicious insiders. Consequently, this paper focuses on modeling security threats within an ML-based edge computing framework for the IoV. We analyze the system provided by the Linux Foundation Edge Akraino Project's Stable Topology Prediction blueprint by employing a hybrid threat modeling technique. Our strategy leverages STRIDE to elicit threats on distinct system elements like vehicle-to-vehicle communication networks, edge networks, and ML models. Subsequently, these threats are consolidated for a comprehensive view using an attack tree. © 2023 IEEE.
Author Keywords Internet of Vehicles; Machine Learning; Mobile Edge Computing; Network Topology; Threat Modeling


Similar Articles


Id Similarity Authors Title Published
47813 View0.888Jain R.; Tihanyi N.; Ferrag M.A.Securing Tomorrow’S Smart Cities: Investigating Software Security In Internet Of Vehicles And Deep Learning TechnologiesLecture Notes in Intelligent Transportation and Infrastructure, Part F99 (2025)
46048 View0.869Brocklehurst C.; Radenkovic M.Resistance To Cybersecurity Attacks In A Novel Network For Autonomous VehiclesJournal of Sensor and Actuator Networks, 11, 3 (2022)
8516 View0.868Sousa B.; Magaia N.; Silva S.An Intelligent Intrusion Detection System For 5G-Enabled Internet Of VehiclesElectronics (Switzerland), 12, 8 (2023)
2469 View0.867Rabah N.B.; Idoudi H.A Machine Learning Framework For Intrusion Detection In Vanet CommunicationsEmerging Trends in Cybersecurity Applications (2022)
4466 View0.865Tiwari P.K.; Prakash S.; Tripathi A.; Yang T.; Rathore R.S.; Aggarwal M.; Shukla N.K.A Secure And Robust Machine Learning Model For Intrusion Detection In Internet Of VehiclesIEEE Access, 13 (2025)
58842 View0.864Aleisa H.N.; Alrowais F.; Allafi R.; Almalki N.S.; Faqih R.; Marzouk R.; Alnfiai M.M.; Motwakel A.; Ibrahim S.S.Transforming Transportation: Safe And Secure Vehicular Communication And Anomaly Detection With Intelligent Cyber-Physical System And Deep LearningIEEE Transactions on Consumer Electronics, 70, 1 (2024)
44548 View0.862Bangui H.; Buhnova B.Recent Advances In Machine-Learning Driven Intrusion Detection In Transportation: SurveyProcedia Computer Science, 184 (2021)
60992 View0.861Meneguette R.; De Grande R.; Ueyama J.; Filho G.P.R.; Madeira E.Vehicular Edge Computing: Architecture, Resource Management, Security, And ChallengesACM Computing Surveys, 55, 1 (2022)
7302 View0.86Alladi T.; Agrawal A.; Gera B.; Chamola V.; Yu F.R.Ambient Intelligence For Securing Intelligent Vehicular Networks: Edge-Enabled Intrusion And Anomaly Detection StrategiesIEEE Internet of Things Magazine, 6, 1 (2023)
37148 View0.858Dean A.; Huber B.; Kandah F.Mitigating Location-Based Attacks Using Predication Models In Vehicular Ad-Hoc NetworksProceedings - IEEE Consumer Communications and Networking Conference, CCNC (2022)