Skip to main content

Showing 1–5 of 5 results for author: Boualouache, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03070  [pdf, other

    cs.CR cs.AI

    Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

    Authors: Abdelaziz Amara korba, Abdelwahab Boualouache, Bouziane Brik, Rabah Rahal, Yacine Ghamri-Doudane, Sidi Mohammed Senouci

    Abstract: Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  2. arXiv:2407.02969  [pdf, other

    cs.CR cs.AI

    Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV

    Authors: Abdelaziz Amara korba, Abdelwahab Boualouache, Yacine Ghamri-Doudane

    Abstract: The Internet of Vehicles (IoV) is a crucial technology for Intelligent Transportation Systems (ITS) that integrates vehicles with the Internet and other entities. The emergence of 5G and the forthcoming 6G networks presents an enormous potential to transform the IoV by enabling ultra-reliable, low-latency, and high-bandwidth communications. Nevertheless, as connectivity expands, cybersecurity thre… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  3. arXiv:2201.10500  [pdf, other

    cs.CR cs.LG cs.NI

    A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks

    Authors: Abdelwahab Boualouache, Thomas Engel

    Abstract: Significant progress has been made towards deploying Vehicle-to-Everything (V2X) technology. Integrating V2X with 5G has enabled ultra-low latency and high-reliability V2X communications. However, while communication performance has enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers have become more strategic. Public Key Infrastructure proposed… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

  4. arXiv:2001.09170  [pdf, other

    cs.CR

    Software-Defined Location Privacy Protection for Vehicular Networks

    Authors: Abdelwahab Boualouache, Ridha Soua, Thomas Engel

    Abstract: While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs). However, ETSI has recently published a technical report which hig… ▽ More

    Submitted 24 January, 2020; originally announced January 2020.

  5. arXiv:1704.00679  [pdf, other

    cs.CR

    A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

    Authors: Abdelwahab Boualouache, Sidi-Mohammed Senouci, Samira Moussaoui

    Abstract: The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both of academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs'users. However, due to the pseudonyms linking attack… ▽ More

    Submitted 3 April, 2017; originally announced April 2017.