Attacks on self-driving cars and their countermeasures : a survey
- Authors: Chowdhury, Abdullahi , Karmakar, Gour , Kamruzzaman, Joarder , Jolfaei, Alireza , Das, Rajkumar
- Date: 2020
- Type: Text , Journal article , Review
- Relation: IEEE Access Vol. 8, no. (2020), p. 207308-207342
- Full Text:
- Reviewed:
- Description: Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-To-Vehicle (V2V), Vehicle-To-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous decision-making capabilities. The level of autonomy depends upon the make-up and degree of sensor sophistication and the vehicle's operational applications. As a result, self-driving cars are being compromised perceived as a serious threat. Therefore, analyzing the threats and attacks on self-driving cars and ITSs, and their corresponding countermeasures to reduce those threats and attacks are needed. For this reason, some survey papers compiling potential attacks on VANETs, ITSs and self-driving cars, and their detection mechanisms are available in the current literature. However, up to our knowledge, they have not covered the real attacks already happened in self-driving cars. To bridge this research gap, in this paper, we analyze the attacks that already targeted self-driving cars and extensively present potential cyber-Attacks and their impacts on those cars along with their vulnerabilities. For recently reported attacks, we describe the possible mitigation strategies taken by the manufacturers and governments. This survey includes recent works on how a self-driving car can ensure resilient operation even under ongoing cyber-Attack. We also provide further research directions to improve the security issues associated with self-driving cars. © 2013 IEEE.
An evidence theoretic approach for traffic signal intrusion detection
- Authors: Chowdhury, Abdullahi , Karmakar, Gour , Kamruzzaman, Joarder , Das, Rajkumar , Newaz, Shah
- Date: 2023
- Type: Text , Journal article
- Relation: Sensors Vol. 23, no. 10 (2023), p. 4646
- Full Text:
- Reviewed:
- Description: The increasing attacks on traffic signals worldwide indicate the importance of intrusion detection. The existing traffic signal Intrusion Detection Systems (IDSs) that rely on inputs from connected vehicles and image analysis techniques can only detect intrusions created by spoofed vehicles. However, these approaches fail to detect intrusion from attacks on in-road sensors, traffic controllers, and signals. In this paper, we proposed an IDS based on detecting anomalies associated with flow rate, phase time, and vehicle speed, which is a significant extension of our previous work using additional traffic parameters and statistical tools. We theoretically modelled our system using the Dempster-Shafer decision theory, considering the instantaneous observations of traffic parameters and their relevant historical normal traffic data. We also used Shannon's entropy to determine the uncertainty associated with the observations. To validate our work, we developed a simulation model based on the traffic simulator called SUMO using many real scenarios and the data recorded by the Victorian Transportation Authority, Australia. The scenarios for abnormal traffic conditions were generated considering attacks such as jamming, Sybil, and false data injection attacks. The results show that the overall detection accuracy of our proposed system is 79.3% with fewer false alarms.
Who are convincing? An experience based opinion formation dynamics in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2016
- Type: Text , Conference proceedings , Conference paper
- Relation: 30th European Simulation and Modelling Conference, ESM 2016; Las Palmas, Spain; 26th-28th October 2016 p. 167-173
- Full Text: false
- Reviewed:
- Description: Online social network (OSN) is one of the major platforms where our opinions are formed now-a-days and increasing so. Opinion formation dynamics captures the ways public opinions are formed, mainly from two different sources, (i) neighbours' opinions, (ii) external opinions from sources other than the neighbours. In this paper, we formulate an opinion formation model by considering two very important factors, that were ignored or a very little explored in the literature. First, we model the convincing power of the opinions encountered from the two sources. Second, we incorporate the experience of users' previous interactions with the two opinion sources. The problem is formulated as an agent based model where each member of an OSN is represented with an agent and their relationships with a graph. Finally through simulation, we create various scenarios, and apply our model to observe the steady state outcomes of the dynamics. This helps us to study the nature of the public opinions under various influences of our model parameters.
- Description: European Simulation and Modelling Conference 2016, ESM 2016
Influence of clustering on the opinion formation dynamics in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 25th International Conference on Neural Information Processing, ICONIP 2018; Siem Reap; Cambodia; 13th-16th December 2018; published in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 11306 LNCS, p. 144-155
- Full Text: false
- Reviewed:
- Description: With the advent of Online Social Networks (OSNs), opinion formation dynamics continuously evolves, mainly because of the widespread use of OSNs as a platform of social interactions and our growing exposure to others’ opinions instantly. When presented with neighbours’ opinions in OSNs, the natural clustering ability of human agents enables them to perceive the grouping of opinions formed in the neighbourhood. A group with similar opinions exhibits stronger influence on an agent than the individual group members. Distance-based opinion formation models only consider the influence of neighbours who are within a confidence bound threshold in the opinion space. However, a bigger group formed outside this distance threshold can exhibit stronger influence than a group within the bound, especially when that group contains influential or popular agents like leaders. To the knowledge of the authors, the proposed model is the first to consider the impact of clustering capability of agent and incorporates the influence of opinion clusters (groups) formed outside the confidence bound. Simulation results show that our model can capture several characteristics of real-world opinion dynamics. © Springer Nature Switzerland AG 2018.
Opinion formation in online social networks : Exploiting predisposition, interaction, and credibility
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Computational Social Systems Vol. 6, no. 3 (2019), p. 554-566
- Full Text: false
- Reviewed:
- Description: The challenging but intriguing problem of modeling opinion formation dynamics in online social networks (OSNs) has attracted many researchers in recent years because the inherent complexities present in human opinion update process are yet to be clearly understood. Although the existing works adopt the distance-based homophily principle to model the neighbors' influences on the formation of an agent's opinion, they ignore several other key factors that govern the update process. Explicitly, we consider two essential aspects of the real-world opinion formation process that were not explored previously. First, we consider the predisposition of agents that leads to selective exposure to information when presented with different opinion sources. Second, we explicitly consider an agent's past interaction experience with others and how opinions encountered in the past interactions influence future opinion update process of that agent. Although the confidence level of an agent on the expressed opinion was previously used to distinguish an expert, we propose the concept of the relative credibility of the opinion sources for such distinction. For this, we take into account an agent's perceived credibility about others and the relative nature of human judgment when exposed to many opinion sources with different credibility. In addition, for the first time, the credibility of sources external to an OSN is considered in the opinion formation model proposed in this paper. We validate our model by analyzing its performance in capturing the real-world opinion formation dynamics using traces collected from an OSN, specifically Twitter. On the other hand, through simulation, various scenarios are created to observe the steady-state outcomes of the dynamics under various influences of our model parameters and network characteristics. Finally, different compelling and practical applications with social and economic values can be built based on our model.
Exploiting evolving trust relationships in the modelling of opinion formation dynamics in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2017
- Type: Text , Conference proceedings , Conference paper
- Relation: 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017; Taipei, Taiwan; 27th-29th March 2017 p. 872-879
- Full Text: false
- Reviewed:
- Description: Mass participation of the members of a society in discussions to resolve issues related to a topic leads to forming public opinion. The timeline of the underlying dynamics goes through several distinguishable phases, and experiences transition from one to another. After initiated by concerned individuals, it draws active attention from almost everyone, and with time progression, people's participation starts declining as the issues are resolved or lost attraction. The existing works in the literature to capture the opinion formation process pay attention to model the dynamics in its active phase and thus ignore the other phases and the corresponding phase transitions. Trust relationships among the participants dynamically shape their interactions in different stages of the dynamics. Existing works fail to incorporate trust in defining the extent of influence one has on others, as they define the social relationships in the opinion space. To address this issue, we adopt simulated annealing to model the transitional behaviour of the dynamics, and then, amalgamate peoples relationships in the trust space with that in the opinion space to define the meta-heuristics of the algorithm for capturing the dynamical properties of the process. Finally, through simulation, we observe that our model is insightful in representing peoples' evolving behaviour in the different stages of opinion formation process, and consequently, can capture the various properties of the steady-state outcomes of the dynamics. © 2017 IEEE.
- Description: Proceedings - International Conference on Advanced Information Networking and Applications, AINA
Consistency driven opinion formation modelling in presence of external sources
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2015
- Type: Text , Conference proceedings
- Relation: International Joint Conference on Neural Networks, IJCNN 2015; Killarney, Ireland; 12th-17th July 2015
- Full Text: false
- Description: Opinion formation in social networks has changed in a more rigorous way due to the inception of Online Social Networks (OSNs) as a platform of generating and sharing huge amount of contents as well as easy and ubiquitous access to varied information sources. Our opinions are not only updated through interactions with our neighbours in OSNs, but also shaped by the opinions received from information sources external to the native OSNs. Current models only consider the neighbours' influence in opinion evolution, thus lack the impact of other information sources, e.g., news media, web search, bulletin board, discussion forum on opinion formation. They consider individual opinion distances to model the influence among interactive neighbours, but fail to capture the influence of majority supported opinions and its possible impact in opinion evolution. Our model explicitly captures the effect of external sources on opinion formation in an OSN. We combine the implication of most perceived opinions in terms of consistency along with opinion distance to emulate the influence of different opinion sources. Consistency is measured by the entropy of opinions derived from a particular source type. Simulation results show that our model properly captures the consensus, polarization and fragmentation properties of opinion evolution. Finally, we investigate the influence of stubborn agents on opinion formation and compare it with a contemporary model. © 2015 IEEE.
Opinion formation dynamics under the combined influences of majority and experts
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2015
- Type: Text , Conference proceedings
- Full Text: false
- Description: Opinion formation modelling is still poorly understood due to the hardness and complexity of the abstraction of human behaviours under the presence of various types of social influences. Two such influences that shape the opinion formation process are: (i) the expert effect originated from the presence of experts in a social group and (ii) the majority effect caused by the presence of a large group of people sharing similar opinions. In real life when these two effects contradict each other, they force public opinions towards their respective directions. Existing models employed the concept of confidence levels associated with the opinions to model the expert effect. However, they ignored the majority effect explicitly, and thereby failed to capture the combined impact of these two influences on opinion evolution. Our model explicitly introduces the majority effect through the use of a concept called opinion consistency, and captures the opinion dynamics under the combined influence of majority supported opinions as well as experts’ opinions. Simulation results show that our model properly captures the consensus, polarization and fragmentation properties of public opinion and reveals the impact of the aforementioned effects. © Springer International Publishing Switzerland 2015.
How much I can rely on you : measuring trustworthiness of a twitter user
- Authors: Das, Rajkumar , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Transactions on Dependable and Secure Computing Vol. 18, no. 2 (2021), p. 949-966
- Full Text:
- Reviewed:
- Description: Trustworthiness in an online environment is essential because individuals and organizations can easily be misled by false and malicious information receiving from untrustworthy users. Though existing methods assess users' trustworthiness by exploiting Twitter account properties, their efficacy is inadequate because of Twitter's restriction on profile and tweet size, the existence of missing or insufficient profiles, and ease to create fake accounts or relationships to pretend as trustworthy. In this paper, we present a holistic approach by exploiting ideas perceived from real-world organizations for trust estimation along with available Twitter information. Users' trustworthiness is determined by considering their credentials, recommendation from referees and the quality of the information in their Twitter accounts and tweets. We establish the feasibility of our approach analytically and further devise a multi-objective cost function for the A
Modelling majority and expert influences on opinion formation in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2018
- Type: Text , Journal article
- Relation: World Wide Web Vol. 21, no. 3 (2018), p. 663-685
- Full Text: false
- Reviewed:
- Description: Two most important social influences that shape the opinion formation process are: (i) the majority influence caused by the existence of a large group of people sharing similar opinions and (ii) the expert influence originated from the presence of experts in a social group. When these two effects contradict each other in real life, they may pull the public opinions towards their respective directions. Existing models on opinion formation utilised the idea of expertise levels in conjunction with the expressed opinions of the agents to encapsulate the expert effect. However, they have disregarded the explicit consideration of the majority effect, and thereby failed to capture the concurrent and combined impact of these two influences on opinion evolution. To represent the majority and expert impacts, we explicitly use the concept of opinion consistency and expertise level consistency respectively in an innovative way by capitalizing the notion of entropy in measuring the homogeneity of a group. Consequently, our model successfully captures the opinion dynamics under the concomitant influence of majority and expert. We validate the efficacy of our model in capturing opinion dynamics in a real world scenario using the opinion evolution traces collected from a widely used online social network (OSN) platform. Moreover, simulation results reveal the impact of the aforementioned effects, and confirm that our model can properly capture the consensus, polarization and fragmentation properties of public opinion. Our model is also compared with some recent models to evaluate its performance in both real world and simulated environments. © 2017, Springer Science+Business Media, LLC.
IoT Sensor Numerical Data Trust Model Using Temporal Correlation
- Authors: Karmakar, Gour , Das, Rajkumar , Kamruzzaman, Joarder
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Internet of Things Journal Vol. 7, no. 4 (2020), p. 2573-2581
- Full Text: false
- Reviewed:
- Description: Internet of Things (IoT) applications are increasingly being adopted for innovative and cost-effective services. However, the IoT devices and data are susceptible to various attacks, including cyberattacks, which emphasizes the need for pervasive security measure like trust evaluation on the fly. There exist several IoT numerical data trustworthiness measures which are based on the quality of information (QoI) and correlations. The QoI measurement techniques excessively exploit heuristics, while the correlation-based approaches predict temporal correlation using an average or moving average, which limits their efficacy. To improve accuracy and reliability, we propose a model for assessing trust of IoT sensor numerical data by representing the temporal correlation using temporal relationship. We represent the temporal relationship between data within a time window in two ways: first, using the discrete cosine transform (DCT) coefficients of daily data; and second, to obtain the impact of shuttle variation, we further divide the daily data into some time windows and calculate the average of each DCT coefficient over all time windows. These two feature sets are then used to develop two independent deep neural network models. The model outcomes are fused by the Dempster-Shepard theory to calculate trust scores. The strength of our model is evaluated using both trustworthy and untrustworthy data - the former are collected from sensors under controlled supervision in a smart city project in Melbourne, Australia and the latter are generated either by simulating breached sensors or perturbing real data. Our proposed approach outperforms a contemporary correlation-based approach in terms of trust score accuracy and consistency. © 2014 IEEE.
Assessing trust level of a driverless car using deep learning
- Authors: Karmakar, Gour , Chowdhury, Abdullahi , Das, Rajkumar , Kamruzzaman, Joarder , Islam, Syed
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Transactions on Intelligent Transportation Systems Vol. 22, no. 7 (2021), p. 4457-4466
- Full Text: false
- Reviewed:
- Description: The increasing adoption of driverless cars already providing a shift to move away from traditional transportation systems to automated ones in many industrial and commercial applications. Recent research has justified that driverless vehicles will considerably reduce traffic congestions, accidents, carbon emissions, and enhance the accessibility of driving to wider cross-section of people and lifestyle choices. However, at present, people's main concerns are about its privacy and security. Since traditional protocol layers based security mechanisms are not so effective for a distributed system, trust value-based security mechanisms, a type of pervasive security, are appearing as popular and promising techniques. A few statistical non-learning based models for measuring the trust level of a driverless are available in the current literature. These are not so effective because of not being able to capture the extremely distributed, dynamic, and complex nature of the traffic systems. To bridge this research gap, in this paper, for the first time, we propose two deep learning-based models that measure the trustworthiness of a driverless car and its major On-Board Unit (OBU) components. The second model also determines its OBU components that were breached during the driving operation. Results produced using real and simulated traffic data demonstrate that our proposed DNN based deep learning models outperform other machine learning models in assessing the trustworthiness of individual car as well as its OBU components. The average precision of detection accuracies for the car, LiDAR, camera, and radar are 0.99, 0.96, 0.81, and 0.83, respectively, which indicates the potential real-life application of our models in assessing the trust level of a driverless car. © 2000-2011 IEEE.
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Authors: Karmakar, Gour , Petty, Mark , Ahmed, Hassan , Das, Rajkumar , Kamruzzaman, Joarder
- Date: 2022
- Type: Text , Conference paper
- Relation: 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2022, Gold Coast, Australia, 18-20 December 2022, Proceedings of IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2022
- Full Text: false
- Reviewed:
- Description: Internet of Things (IoT) is enabling us to introduce cost-effective, innovative and intelligent services in business, industrial, and government application domains. Despite these huge potential benefits of IoT applications, since the backbone of IoT is Internet and IoT connects numerous heterogeneous devices, IoT is vulnerable to many different attacks and thus has been a honey pot to the cybercriminals and hackers. For this reason, the attacks against IoT devices are increasing sharply in recent years. To prevent and detect these attacks, ethical hacking of different IoT devices are of paramount importance. This is because the lesson learnt from these ethical hackings can be exploited to develop effective and robust strategies and mitigation approaches to protect IoT devices from these attacks. There exist a few ethical hacking techniques reported in the literature such as hacking Android phones, Windows XP virtual machine and a DNS rebinding attack on IoT devices. In this paper, we implement an approach for the ethical hacking of a Drone and then hijack it. As an outcome of lesson learnt, the mitigation approaches on how to reduce the hacking on a drone is presented in this paper. © 2022 IEEE.
Significance level of a query for enterprise data
- Authors: Thi Ngoc Dinh, Loan , Karmakar, Gour , Kamruzzaman, Joarder , Stranieri, Andrew , Das, Rajkumar
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 30th International Business Information Management Association Conference - Vision 2020: Sustainable Economic development, Innovation Management, and Global Growth, IBIMA 2017; Madrid, Spain; 8th-9th November 2017 Vol. 2017-January, p. 4494-4504
- Full Text: false
- Reviewed:
- Description: To operate enterprise activities, a large number of queries need to be processed every day through an enterprise system. Consequently, such a system frequently faces hugely overloaded information and incurs high delay in producing query responses for big data. This is because, traditional queries are normally treated with equal importance. With the advent of big data and its use in enterprise systems and the growth of process complexity, the traditional approach of query processing is no more suitable as it does not consider semantic information and captures all data irrespective of their relevance to a business organization, which eventually increases the computational time in both big data collection and analysis. The significance level of a query can make a trade-off between query response delay and the extent of data collection and analysis. This motivates us to concentrate on determining the significance level of a query considering its importance to an enterprise system. To our knowledge, no such approach is available in the literature. To bridge this research gap, this paper, for the first time, proposes an approach to determine the significance level of a query to prioritize them with the relevance to a business organization. As business processes play key roles in any enterprise system and all business processes are not equally important, this is done by determining the semantic similarity between a query and the processes of a business organization and the importance of a business process to that organization. With a case study on an enterprise system of a retail company, the results produced by our proposed approach have shown that significance level is higher for more important queries compared to the less important ones.