Page 827 - AI for Good Innovate for Impact
P. 827

AI for Good Innovate for Impact



               efforts to combat cybercrime in critical systems, promoting accountability, resilience, and long-
               term confidence in smart mobility solutions.


               2�3 Future work                                                                                     Transport  4.10: Intelligent

               As V2X communication and AI-based intrusion detection systems continue to evolve, there are
               several areas where further improvement if provided with the scholarship

               Firstly, since this research focuses on V2V security, it is crucial to validate the model in real-
               world scenarios. Deploying the Intrusion Detection System (IDS) on On-Board Units (OBUs)
               will require specialized hardware and field testing to ensure effectiveness in dynamic vehicular
               environments.

               Secondly, A significant limitation of current research is the scarcity of high-quality, labelled
               intrusion datasets specific to V2V communication. Existing datasets, such as CICIDS2017,
               primarily address general network security rather than vehicle-specific cyber threats. Future
               research will explore Generative Adversarial Networks (GANs) to generate synthetic intrusion
               data, improving model generalization and covering a wider range of potential attack scenarios.

               With these advancements, the research can transition from theoretical modelling to practical,
               real-world applications, enhancing the security of V2X systems.


               3      Use Case Requirements

               •    REQ-01: It is critical that the V2V communication system is secure from cyber threats
                    such as data injection, jamming, and spoofing, ensuring vehicle safety and preventing
                    accidents caused by malicious intrusions.
               •    REQ-02: It is crucial that the intrusion detection system (IDS) operates in real-time,
                    enabling the immediate identification and mitigation of attacks to prevent catastrophic
                    consequences in connected vehicles.
               •    REQ-03: It is essential that the IDS is scalable to accommodate large vehicle networks,
                    ensuring that communication between a growing number of vehicles, infrastructure, and
                    pedestrians remains secure without sacrificing performance.
               •    REQ-04: It is critical that the IDS is capable of generalizing across various attack scenarios,
                    allowing it to detect both known and unknown threats, thereby ensuring robust security
                    for all potential attack vectors in V2V communication.
               •    REQ-05: It is essential that the IDS can be deployed on resource-constrained devices,
                    such as Onboard Units (OBUs), optimizing for computational efficiency while maintaining
                    high accuracy in intrusion detection.

























                                                                                                    791
   822   823   824   825   826   827   828   829   830   831   832