关于完全可识别的下一代车载网络的优化设计

IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computer Communications Pub Date : 2024-08-06 DOI:10.1016/j.comcom.2024.08.002
Amani Ibraheem , Zhengguo Sheng , George Parisis
{"title":"关于完全可识别的下一代车载网络的优化设计","authors":"Amani Ibraheem ,&nbsp;Zhengguo Sheng ,&nbsp;George Parisis","doi":"10.1016/j.comcom.2024.08.002","DOIUrl":null,"url":null,"abstract":"<div><p>Due to the emerging advances in connected and autonomous vehicles, today’s in-vehicle networks, unlike traditional networks, are not only internally connected but externally as well, exposing the vehicle to the outside world and making it more vulnerable to cyber-security threats. Monitoring the in-vehicle network, thus, becomes one of the essential and crucial tasks to be implemented in vehicles. However, the closed-in nature of the vehicle’s components hinders the global monitoring of the in-vehicle network, leading to incomplete measurements, which may result in undetected failures. One solution to this is to use network tomography. Nevertheless, applying network tomography in in-vehicle networks is not a trivial task. Mainly because it requires that the in-vehicle network topology should be <em>identifiable</em>. To this end, we propose in this work an identifiable in-vehicle network topology that enables overall monitoring of the network using network tomography. The new topology is proposed based on extensive analysis to ensure full identifiability under the constraint that only edge nodes can monitor the network, which is the case for in-vehicle networks where internal nodes are not directly accessible. We propose two main algorithms to transform existing in-vehicle network topologies. The first algorithm applies to an existing topology which can be transformed into full identifiability by adding extra nodes/links. Evaluation results show the effectiveness of the proposed transformation algorithms with a maximum added weight of only 3% of the original weight. Furthermore, a new optimisation algorithm is also proposed to minimise the topology weight whilst maintaining the full identifiability by redesigning a new topology. With this algorithm, the results show that the total weight can be reduced by 6%. In addition, compared with the existing approaches, monitoring the in-vehicle networks with the proposed approach can achieve better monitoring overhead and a 100% identifiability ratio.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"226 ","pages":"Article 107920"},"PeriodicalIF":4.5000,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the optimal design of fully identifiable next-generation in-vehicle networks\",\"authors\":\"Amani Ibraheem ,&nbsp;Zhengguo Sheng ,&nbsp;George Parisis\",\"doi\":\"10.1016/j.comcom.2024.08.002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Due to the emerging advances in connected and autonomous vehicles, today’s in-vehicle networks, unlike traditional networks, are not only internally connected but externally as well, exposing the vehicle to the outside world and making it more vulnerable to cyber-security threats. Monitoring the in-vehicle network, thus, becomes one of the essential and crucial tasks to be implemented in vehicles. However, the closed-in nature of the vehicle’s components hinders the global monitoring of the in-vehicle network, leading to incomplete measurements, which may result in undetected failures. One solution to this is to use network tomography. Nevertheless, applying network tomography in in-vehicle networks is not a trivial task. Mainly because it requires that the in-vehicle network topology should be <em>identifiable</em>. To this end, we propose in this work an identifiable in-vehicle network topology that enables overall monitoring of the network using network tomography. The new topology is proposed based on extensive analysis to ensure full identifiability under the constraint that only edge nodes can monitor the network, which is the case for in-vehicle networks where internal nodes are not directly accessible. We propose two main algorithms to transform existing in-vehicle network topologies. The first algorithm applies to an existing topology which can be transformed into full identifiability by adding extra nodes/links. Evaluation results show the effectiveness of the proposed transformation algorithms with a maximum added weight of only 3% of the original weight. Furthermore, a new optimisation algorithm is also proposed to minimise the topology weight whilst maintaining the full identifiability by redesigning a new topology. With this algorithm, the results show that the total weight can be reduced by 6%. In addition, compared with the existing approaches, monitoring the in-vehicle networks with the proposed approach can achieve better monitoring overhead and a 100% identifiability ratio.</p></div>\",\"PeriodicalId\":55224,\"journal\":{\"name\":\"Computer Communications\",\"volume\":\"226 \",\"pages\":\"Article 107920\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2024-08-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0140366424002597\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0140366424002597","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

由于互联汽车和自动驾驶汽车的不断进步,如今的车载网络与传统网络不同,不仅与内部相连,而且还与外部相连,从而使车辆暴露于外部世界,更容易受到网络安全威胁。因此,对车载网络进行监控就成为车辆必须执行的重要任务之一。然而,车辆组件的封闭性阻碍了对车载网络的全面监控,导致测量不完整,从而可能导致无法检测到的故障。解决这一问题的方法之一是使用网络断层扫描技术。然而,在车载网络中应用网络断层扫描技术并非易事。这主要是因为它要求车载网络拓扑结构必须是可识别的。为此,我们在这项工作中提出了一种可识别的车载网络拓扑结构,以便利用网络断层扫描技术对网络进行整体监控。新拓扑是在广泛分析的基础上提出的,以确保在只有边缘节点可以监控网络的约束条件下完全可识别,而这正是内部节点无法直接访问的车载网络的情况。我们提出了两种主要算法来改造现有的车载网络拓扑结构。第一种算法适用于现有的拓扑结构,通过增加额外的节点/链路可将其转化为完全可识别的拓扑结构。评估结果表明,所建议的转换算法非常有效,增加的最大权重仅为原始权重的 3%。此外,还提出了一种新的优化算法,通过重新设计新的拓扑结构,在保持完全可识别性的同时最大限度地降低拓扑结构权重。结果表明,采用这种算法后,总权重可降低 6%。此外,与现有方法相比,使用所提出的方法监控车载网络可实现更好的监控开销和 100% 的可识别率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
On the optimal design of fully identifiable next-generation in-vehicle networks

Due to the emerging advances in connected and autonomous vehicles, today’s in-vehicle networks, unlike traditional networks, are not only internally connected but externally as well, exposing the vehicle to the outside world and making it more vulnerable to cyber-security threats. Monitoring the in-vehicle network, thus, becomes one of the essential and crucial tasks to be implemented in vehicles. However, the closed-in nature of the vehicle’s components hinders the global monitoring of the in-vehicle network, leading to incomplete measurements, which may result in undetected failures. One solution to this is to use network tomography. Nevertheless, applying network tomography in in-vehicle networks is not a trivial task. Mainly because it requires that the in-vehicle network topology should be identifiable. To this end, we propose in this work an identifiable in-vehicle network topology that enables overall monitoring of the network using network tomography. The new topology is proposed based on extensive analysis to ensure full identifiability under the constraint that only edge nodes can monitor the network, which is the case for in-vehicle networks where internal nodes are not directly accessible. We propose two main algorithms to transform existing in-vehicle network topologies. The first algorithm applies to an existing topology which can be transformed into full identifiability by adding extra nodes/links. Evaluation results show the effectiveness of the proposed transformation algorithms with a maximum added weight of only 3% of the original weight. Furthermore, a new optimisation algorithm is also proposed to minimise the topology weight whilst maintaining the full identifiability by redesigning a new topology. With this algorithm, the results show that the total weight can be reduced by 6%. In addition, compared with the existing approaches, monitoring the in-vehicle networks with the proposed approach can achieve better monitoring overhead and a 100% identifiability ratio.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Communications
Computer Communications 工程技术-电信学
CiteScore
14.10
自引率
5.00%
发文量
397
审稿时长
66 days
期刊介绍: Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today''s computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms. Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.
期刊最新文献
Editorial Board A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks The pupil outdoes the master: Imperfect demonstration-assisted trust region jamming policy optimization against frequency-hopping spread spectrum High-performance BFT consensus for Metaverse through block linking and shortcut loop Automating 5G network slice management for industrial applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1