Next Article in Journal
Event-Triggered Robust State Estimation for Nonlinear Networked Systems with Measurement Delays against DoS Attacks
Previous Article in Journal
RIS-Aided Proactive Mobile Network Downlink Interference Suppression: A Deep Reinforcement Learning Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things

1
School of Computing, Gachon University, Seongnam-si 13120, Republic of Korea
2
Department of Computer Engineering, International Information Technology University, Almaty 050000, Kazakhstan
3
Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
4
Computer Science Department, Wright State University, Fairborn, OH 45435, USA
5
Department of Cybersecurity, International Information Technology University, Almaty 050000, Kazakhstan
6
Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Sensors 2023, 23(14), 6554; https://doi.org/10.3390/s23146554
Submission received: 31 May 2023 / Revised: 8 July 2023 / Accepted: 17 July 2023 / Published: 20 July 2023
(This article belongs to the Section Vehicular Sensing)

Abstract

:
Deep learning algorithms have a wide range of applications, including cancer diagnosis, face and speech recognition, object recognition, etc. It is critical to protect these models since any changes to them can result in serious losses in a variety of ways. This article proposes the consortium blockchain-enabled conventional neural network (CBCNN), a four-layered paradigm for detecting malicious vehicles. Layer-1 is a convolutional neural network-enabled Internet-of-Things (IoT) model for the vehicle; Layer-2 is a spatial pyramid polling layer for the vehicle; Layer-3 is a fully connected layer for the vehicle; and Layer-4 is a consortium blockchain for the vehicle. The first three layers accurately identify the vehicles, while the final layer prevents any malicious attempts. The primary goal of the four-layered paradigm is to successfully identify malicious vehicles and mitigate the potential risks they pose using multi-label classification. Furthermore, the proposed CBCNN approach is employed to ensure tamper-proof protection against a parameter manipulation attack. The consortium blockchain employs a proof-of-luck mechanism, allowing vehicles to save energy while delivering accurate information about the vehicle’s nature to the “vehicle management system.” C++ coding is employed to implement the approach, and the ns-3.34 platform is used for simulation. The ns3-ai module is specifically utilized to detect anomalies in the Internet of Vehicles (IoVs). Finally, a comparative analysis is conducted between the proposed CBCNN approach and state-of-the-art methods. The results confirm that the proposed CBCNN approach outperforms competing methods in terms of malicious label detection, average accuracy, loss ratio, and cost reduction.

1. Introduction

The accurate detection of vehicles and the avoidance of malicious vehicles have become highly important. This task can be efficiently performed by utilizing a powerful and reliable object recognition model [1]. In recent times, researchers have focused on categorizing a single item into multiple categories during image recognition [2]. Therefore, the multiple labels provide excellent options for identifying the objects [3]. In multi-label classification, the presence of multiple labels signifies the fulfillment of a specific prediction [4]. The classification task in deep learning neural networks is considered significant because it enables an accurate prediction of class labels for hidden data [5]. Deep learning algorithms based on artificial neural networks (ANNs) have demonstrated exceptional prediction capabilities in solving complex tasks across various domains [6,7] including image classification [8], speech recognition [9,10], intrusion detection systems [11,12], and others. The convolutional neural network (CNN) can perform various operations on input images by repeatedly employing multiple layers to extract features efficiently and automatically [13,14,15]. In the case of multi-label classification, the classifier is trained separately, and the results are combined based on ranking [16,17]. However, predicting multiple conceptual labels remains a significant challenge. While CNNs are widely employed in modern applications as cutting-edge methods, their architectures lack a liability phase for each layer [18,19]. Unfortunately, artificial intelligence (AI) systems are susceptible to attacks at multiple levels, including input, architecture, and decision [20]. Consequently, the labels of objects in the image can be manipulated, leading to a decline in prediction accuracy [21].
Securing deep learning models is of utmost necessity [22]. To enhance output security and accuracy, it is essential to authenticate the layers of deep learning models [23]. However, privacy and security concerns exist since it is easy to steal deep learning models or change private training data [24,25]. Blockchain technology has gained widespread acceptance as a security solution as it ensures security, efficiency, and reduces fraud in CNNs [26,27,28]. Blockchain technology can prevent the manipulation of object labels by incorporating critical features such as security, authenticity, data privacy, and de-tracking [29]. To prevent manipulation within CNN architectures, the input parameters of each layer should be verified. Furthermore, the authenticity module ensures appropriate validation of outputs by comparing them across all layers. Data privacy and de-tracking features are employed to conceal sensitive information while also allowing the restoration of original data in the event of manipulation [30]. To address the challenge of assigning multiple labels to objects, a blockchain-enabled conventional neural network, named the consortium blockchain-enabled conventional neural network (CBCNN), can be developed to create a secure model and identify fraudulent labels, thereby combining the advantages of both approaches.
The proposed CBCNN method is used for vehicle surveillance, specifically for detecting hostile vehicles. This approach is resistant to parameter manipulation attacks. Figure 1 illustrates the general architecture of CNN with blockchain technology using multi-labels.

1.1. Paper Contribution

The contributions of this article are summarized as follows:
The layer-based paradigm is used to correctly detect and limit the malicious vehicle. This paradigm incorporates a CNN-enabled Internet of Things (IoT) model, geographic pyramid pooling, fixed-layer, and consortium blockchain technology. The primary objective is to achieve accurate application of the “malicious” label while enhancing accuracy and reducing the loss ratio.
The CBCNN technique is employed to ensure tamper-proof protection against a parameter manipulation attack. Additionally, hostile vehicles are tracked and identified using multiple labels to prevent unauthorized entry.
The consortium blockchain implements a proof-of-luck mechanism, enabling vehicles to conserve energy while providing correct information about the nature of the vehicle to the “vehicle management system”.
The proposed CBCNN method is prototyped and experimentally assessed to illustrate its practicability and feasibility in real-time malicious vehicle detection scenarios.

1.2. Remaining Structure of Article

The remainder of the paper is organized as follows: Section 2 surveys related works as well as contemporary work on existing approaches. Section 3 demonstrates the system model of the proposed approach. Section 4 defines the problem formulation. Section 5 presents the proposed malicious vehicle detection process using a layer-based paradigm. Section 6 describes the experimental results and setup. Section 7 contains a discussion of the findings, including their benefits. Section 8 concludes with the findings of this article and future work.

2. Related Works

This section discusses the primary characteristics of existing methods. The secure convolutional neural network (SCNN) model is introduced as a solution to address potential attacks [31]. In this approach, each block contains a layer of a CNN model with their neighbors’ hash keys and public and private keys. The single point of failure issue is solved by introducing a multi-layer location sharing system based on blockchain [32], which can also be applied to dynamic situations. An accumulator is used to improve the efficiency of data refreshing and checking within the scheme. However, a continuous communication expense is associated with this scheme. The effectiveness of the proposed scheme is evaluated through a formal security study based on Real-Or-Random (ROR), and the experimental findings demonstrate its superiority over current techniques in terms of communication cost, computational cost, and efficiency. Ref. [33] addressed the security concerns arising from the transition to smart cities in an interconnected world. The blockchain model has been extensively analyzed as a potential solution to the security and privacy challenges of this new era. The interaction of blockchain with smart contracts is evaluated, including their implementation. The CNN is introduced to address the various types of attacks, such as model extraction and model inversion attacks, to preserve privacy; however, the proposed CNN method struggled to efficiently detect both types of attacks. Additionally, blockchain is employed in artificial intelligence to secure data sharing and automatically train models [34]. It is widely adopted to improve system security. Specifically, blockchain technology is used in conjunction with VGGFace deep neural networks to enhance the security and stability of face datasets, which are vulnerable to unauthorized access and tampering. To ensure data integrity, all pixel values are inserted into blocks before being sent to other nodes for access, significantly reducing data tampering.
Ref. [35] proposed a novel multi-model method combining deep neural networks and blockchain technology to characterize early-stage cancer from computed tomography (CT) scan images. The proposed model uses input data from each patient in the network to personify a specific health condition using low dose CT scan images. The deep neural network model personifies the report images, which contain information about the cancer nodules; this information is stored on the blockchain-distributed network for the patient. A privacy-preserving federated learning (FL) system, called BPFL, built on a secure blockchain, has been reported in the literature [36]. This system leverages blockchain as the fundamental distributed structure of FL. To accomplish ciphertext-level model aggregation and filtering, the Multi-Krum technology is enhanced and coupled with homomorphic encryption. The proposed approach can enable the verifiability of the local models while ensuring privacy protection. In this context, a privacy-preserving cross-domain authentication (PPCDA) system for vehicular ad hoc networks (VANETs) built on a secure blockchain is suggested [37]. The suggested approach combines group signing and blockchain technology to achieve its goals. The group signature technique is employed to provide limited privacy protection, whereas the suggested method relies on trustworthy information exchange to enable cross-domain verification among vehicles. Table 1 demonstrates the current work of existing approaches.

3. System Model

Several measures are already in place to ensure vehicle security and safety, from design through manufacturing and operation. Our goal is to keep vehicles secure. The proposed system consists of four layers, each with a specific function in monitoring vehicles and storing information related to their malicious or non-malicious nature. The 4-layered paradigm is used in conjunction with IoT devices to detect malicious/non-malicious vehicles, which collectively execute efficient malicious/non-malicious activities ranging from monitoring to detecting the nature of the vehicle depicted in Figure 2. The system model supports the realistic scenario of traffic from Taepyeong-dong in Gyeonggi Province, South Korea, to Samseong-dong in Seoul, South Korea, which is a distance of 14.4 km. The realistic scenario is tested employing the layered-4 paradigm. Layer-1 is the CNN-enabled IoT layer in charge of monitoring vehicles and taking real-time pictures before applying the feature mapping technique to the obtained images; the feature mapping procedure represents specific qualities in the input image.
Layer 1 processes images from IoT devices (such as sensors, cameras, and network towers) positioned along the route and connected to the base station. When an image is detected, a sensor sends it to another sensor along with its ID and precise location. The sensor nodes that receive data create a list of adjacent nodes. From the collection of sensors, the sensor-enabled camera determines the ideal area for image capture. Because of this, IoT devices can connect via line-of-sight (LOS) despite a variety of physical impediments. As a result, the sensor node generates a list of its neighbors’ geolocations. The sensor node transmits the value of its cost to all its neighbors. Thus, images are successfully transmitted to CNN. Thus, the input image of the vehicle is convolved with one or more filters to yield numerous feature maps. Following this, the multilayer perceptron (MLP) model is applied to the output of layer 1 for the multi-label classification. Utilizing a multi-label approach for the vehicle provides more data to accurately identify its type. Therefore, labels are required as output for each input sample of the vehicle, and the outputs are required concurrently. The MLP transfers allocated multi-labels to Layer 2, known as spatial pyramid pooling (SPP), which overcomes the fixed-size limitation.
SPP collects local features from image layers of vehicles that have been classified based on their accuracy. SPP is the fundamental component used in effective classification and detection systems. The SPP and pooling approaches are coupled to allow neural networks to handle images of varying sizes as input. Pooling allows for the collection of data from neighboring space bins. The size of the space bins remains constant regardless of the size of the vehicles’ input images, while the size of the images is positively connected with it. Furthermore, the SPP layer aggregates the features and generates fixed-length outputs that are fed into the fully connected layers. This information aggregation occurs at a deeper level in the network structure between the convolutional layers and fully connected layers, thereby eliminating the need for cropping or warping the image of the vehicle.
Layer 3, the fully connected layer, compares the similarity of the input and categorizes the input label. The completely connected layer demonstrates a high capability for feature fusion. A fully connected layer mixes the input with a weight matrix and adds a bias vector. A fully linked layer’s neurons communicate with all neurons in the preceding layer. The neuron in fully connected layers linearly changes the input vector using the weight matrix. After that, a non-linear activation function is used to apply a non-linear change to the result in order to detect the exact vehicle.
The fully connected layer translates the vehicles’ generalized graphical representation onto the given sample space. Layer 3 oversees sending the label information from the target loss function to the preceding layer.
Layer 4 utilizes a consortium blockchain to identify malicious vehicles and prevent potential attacks. The consortium blockchain also safeguards data privacy. Layer 4 ensures that the distributed shared databases remain up-to-date. The consortium blockchain achieves two objectives: (i) reducing latency while maintaining data privacy, and (ii) enabling quick data transmission between vehicles. During communication establishment, vehicles undergo verification to prevent attackers from maliciously utilizing resources to disrupt the lawful message process and thereby compromise vehicle identification. The consortium blockchain employs a proof-of-luck method that enables vehicles to conserve energy. Vehicles participating in communication and receiving the most votes can seize control of the entire vehicular network. Consequently, the selected vehicles are rewarded for their participation in the validation process and sequential block construction. If a vehicle fails to create its assigned block, the task is passed on to the next vehicle, and the other vehicles decide to replace it with a new vehicle (witness). This solution also effectively addresses latency issues and provides robust protection against duplicate pending attacks through the immunity of the proof-of-luck mechanism. Finally, the state of the vehicle is presented on the vehicle management system based on the assessment conducted using consortium blockchain technology. Figure 1 depicts the system model of the proposed CBCNN.

4. Problem Formulation for Cost Reduction Using Multi-Labels

The problem can be formulated by generating multi-labels ( m l ) to be delivered to vehicles v within a certain range. The vehicles must be monitored in all directions to ensure that each vehicle receives the appropriate label. Therefore, the multi-label assignment process can be determined as:
V i ( v , O ) = { 1                                   i f   V i V p 0                                 O t h e r w i s e ,
where v denotes the vehicle, V i denotes the number of vehicles in the network, and V p denotes the position of the vehicle.
The multi-label delivering intensity, D I ( m l ) is an important variable that helps to reach all of the vehicles within time, which can be determined as:
D I ( m l ) = m a x i = 1 V t V i ( v , O )
Equation (2) indicates that the intensity and the maximum number of multi-labels given to vehicles should be significantly higher. This is particularly important for multi-labels because accurate identification requires significantly closer spacing. As the distance increases, the monitored measurements become attenuated and deviate from the initial values. To prevent malicious vehicles, a high-detection-density multi-label detection system is proposed.
V i ( V , O ) = ( c o s θ ( T 1 , T 2 ) ) r ,      
where c o s θ ( T 1 , T 2 ) represents the values for two tuples used to locate the vehicles, r represents the distance between the sending and receiving vehicles and indicates the associated reduction.
The proposed approach cannot simultaneously encompass the entire area where all vehicles are moving to distribute the multi-labels. Therefore, it is critical to divide all potential exposure routes by setting coordinates at the starting point, which is regarded as one end and symbolizes where a specific vehicle has begun working with multi-labels. The opposing extremity of the exposure route is then placed on the precise opposite side. As a result, a high-dimensional probability H p r may be used to define the route of the vehicle on the pathway given by:
H p r ( I p , Γ ) = i = 0 m l t I p ( R d ) d l ,      
where I p represents the initial position of the vehicle relative to the robot,   Γ determines all corresponding pathways, m l t denotes the total number of multi-labels to be delivered to vehicles, and R d indicates a random distance between the vehicle and the multi-labels.
High-dimensional probability represents a non-linear process that can only be resolved by splitting all routes under consideration into several sub-interval points between vehicles and labels.
H p r ( I p , Γ ) = m i n i = 0 m l t I p ( R d ) Ψ ,  
where Ψ is the sub-interval point in the pathways.
The sub-interval points should be minimized to achieve the best data aggregation method. This technique is necessary for the multi-labeling of vehicles. When two paths, such as distribution and destination, are correctly defined, this method works flawlessly. However, if a specific vehicle action is moved to the opposing side, a minimal degree of familiarity is achieved. At these two node locations, where vehicles are connected to monitor the vehicle automation process, it is critical to consider the weight of the multi-label. The weight of a multi-label m l w can be determined as:
m l w = i = 0 m l t m l w 1 + m l w 2 ,   .   .   .   , + m l w i
Therefore, m l w = 1 .
While each vehicle travels, different weights of the multi-labels are continuously generated. Consequently, multiple label weights are added. The transmission of data to the correct vehicles should also be used to establish distinct vehicle monitoring periods for the data collection process. This variable time for moving the vehicle t v can be determined as follows:
t v = ( V t + T d r + t b ) ,      
where V t indicates the total number of vehicles, T d r represents the data transmission rate, and t b denotes the buffering time of loading data.
Additionally, the cost of each multi-label should be established to evaluate the operation of vehicles. This is critical because each multi-label has a distinct weight and requires various motions to efficiently move and transmit a large quantity of data. Therefore, the cost of producing multi-label m l g to transport the vehicles can be calculated as follows:
m l g ( m i n ) = i = 0 m l t ( m l w i × ϣ )
where ϣ represents the decision-making process and m l w i represents the weight of the multi-label.
The desired outcome of cost reduction C R of the proposed CBCNN approach can be mathematically expressed by integrating Equation (1) through Equation (8):
C R = m i n i = 0 m l t V i , H p r ( I p , Γ ) , m a x i = 1 m l t V i ( v , O )  
According to the anticipated results of the proposed CBCNN, the cost is reduced, whereas the vehicle detection intensity is increased. This indicates that the use of multi-label should maximize detection strength while minimizing cost and sub-interval location.

5. Proposed Malicious Vehicle Detection Process Using Layer-Based Paradigm

The CBCNN is used to identify and restrict malicious vehicles. The proposed model consists of four layers that work together to aid in vehicle identification and the prevention of hostile vehicle activities. One of the key strengths of this paradigm is its use of multiple labels to achieve accurate detection. The proposed CBCNN makes use of the following traits:
Multi-label classification for vehicles.
CNN-enabled IoT layer modeling for vehicles
Spatial pyramid polling layer modeling for vehicles
Fully connected layer modeling
Consortium blockchain technology modeling for vehicles
Multi-label modeling for vehicles

5.1. CNN-Enabled IoT Layer Modeling for Vehicle

CNNs achieve cutting-edge performance by effectively dealing with multiple labels. This success can be attributed to its ability to learn feature characteristics, unlike traditional methods that rely on hand-engineered features. The CNN is particularly useful for handling vehicles using multiple labels in sequential data. It captures sequence dynamics through network cycles and stores positional information that represents data from a randomly extended context window. The authentication framework was created to support multi-label classification for vehicles. Given that it is possible that most inputs have been corrupted, the authentication framework consists of a short preamble of multiple symbols preceding the multi-label authentication process. These symbols have fixed periods and frequencies; the proposed framework can detect these brief preambles and pass them on to the classifier. Two or more labels are generated as input to the classifier. If the multi-labels are sent as the number of samples S n as input to the classifier, the length of each input sample becomes 2 S n . Thus, the number of the classifier units C n can be determined in each layer β as:
C n = β S n      
The CNN begins processing the images received from IoT devices (such as sensors, cameras, and network towers) installed around the road, that are connected to the base station. A sensor detects the image and communicates it with another sensor along with its ID and exact location. The receiving sensor nodes compile a list of their neighbor nodes S n e . The sensors are grouped together, and the sensor-enabled camera fine-tunes the location for image capture. This capability allows IoT devices to establish a line-of-sight (LOS) connection despite various natural limitations. Consequently, the sensor node generates a list of its neighbor nodes S n e L , along with their geo-locations. The cost value of the sensor node is broadcast to all neighbors. The sensor nodes are organized into a polygon structure, and the area of the polygon A P is determined as follows:
A P = 1 2 i = 0 K t ( G L i P G L i + 1 Q ) ( G L i + 1 P G L i Q )        
where G L i P denotes the lists of geo-locations of sensor nodes positioned at the polygon edge obtained by the x-axis; G L i + 1 Q denotes the lists of geo-locations of sensor nodes positioned at the polygon edge obtained by the y-axis; and K t denotes the total number of sensor nodes. Therefore, the centroid C P , Q can be determined as follows:
C P , Q = 1 6 A p i = 0 K t ( G L i P + G L i + 1 P ) ( G L i P G L i + 1 Q ) ( G L i + 1 P G L i Q )  
And
C Q = 1 6 A p i = 0 K t ( G L i Q + G L i + 1 Q ) ( G L i P G L i + 1 Q ) ( G L i + 1 P G L i Q )  
Merging the x- and y-axes together yields the following equation:
C P , Q = ( C P , C Q )      
The probability for each node to become the cluster head P r c h is determined using the following calculation:
P r c h = M a x { ( 1 ϵ r S r × n f ) , K m i n }    
where ϵ r is the distance between two neighboring nodes, S r is the radius of the sensor, n f is the normalization factor, and K m i n is the minimum threshold of the sensor node.
The distance between the central node ( K c ) and the current node ( K c u ) is determined using the concept of Euclidean distance P ( K c ) , ( K c u ) , which is calculated as follows:
P ( K c ) , ( K c u ) = ( ( K c ) P ( K c u ) P ) 2 + ( ( K c ) Q ( K c u ) Q ) 2
Thus, the image collection process I C can be calculated prior to transmission to the CNN-enabled IoT layer.
I C = ( i ( I ) , ( C H ) ϣ i ( I ) ) + ( ( C H ) ϣ f ( I ) , f ( I ) ) + i = 0 I t { ( C H ) ϣ i ( I ) } i , { ( C H ) ϣ i ( I ) } i + 1  
where, i ( I ) represents the starting-image collection location to the first location of the cluster head ( C H ) ϣ i ( I ) , ϣ f ( I ) ) is the final location of the cluster head to the ending image collection location f ( I ) , and I t is the total number of images.

5.2. Spatial Pyramid Polling Layer Modeling for Vehicle

An SPP network processes an input feature map using different filtering or pooling rates, potentially creating a range of practical fields of vision for the vehicles. Before combining feature maps, a normalization procedure is necessary. Before concatenation, batch normalization is employed at each filter to account for the relative differences in feature values across layers. SPP extracts local characteristics from image layers of vehicles grouped based on the degree of accuracy. SPP is consistently the primary element employed in effective classification and detection systems. The SPP and pooling techniques are combined to enable neural networks to handle input images of various sizes. Pooling enables the acquisition of information from nearby space bins. The size of the space bins remains constant regardless of the size of the input images of the vehicles, while the size of the images is positively correlated with it; this differs from standard deep networks in which the number of sliding windows is fixed regardless of the size of the input images. Multi-scale SPP layers are employed in place of max-pooling layers to enable deep networks to adapt to input images of vehicles of any size. The response of the filters is randomly gathered in each space bin. The outputs of SPP are N f -dimensional vectors with a fixed length for N bins, where f is the number of filters used for the vehicles. Algorithm 1 illustrates the SPP process for vehicles.
Algorithm 1: Spatial pyramid polling modeling for vehicle
  • Initialization: { V i m : Vehicle image; C f : Fixed size input constraints; O f : Fixed size output; Γ: Features; Ŕ: Removal of fixed size input constrains; τ : aggregation; C a : Adjustable-sized constraints}
  • Input: { C f }
  • Output: { O f }
  • Set V i m
  • If Γ C f then
  • Process  Ŕ C f = C v
  • Assign  C a   C N N
  • end-if
  • Perform  τ V i m = O f  
  • Forward  O f F l
  • Return step-4
Step 1 initializes the variables that will be utilized. Steps 2 and 3 supply the input and output, respectively. Step 4 shows the assignment of the vehicle image to the CNN-enabled IoT layer. Step 5 determines if the extracted image features have fixed-sized input, as the CNN-enabled IoT layer does not require fixed-sized input. Steps 6–8 describe the method of removing fixed-sized restrictions to create adjustable-sized input constraints that are compatible with CNN. Step 9 performs the aggregation procedure on the vehicle image obtained from CNN, converting it into a fixed-sized output suitable for the fixed-sized layer. Step 10 demonstrates the method for passing fixed-sized constraints to a fixed-sized layer. Finally, Step 11 initiates the image vehicle procedure described in Step 4.
SPP receives an input Ī from the previous layer for feature mapping, which is determined as
Ī = C f o ( Ī 1 , Ī 2 ,   .   .   .   , Ī 1 ) ,  
where, C f o is the composite function operation in the SPP layer, and concatenation occurs within every feature layer.
The time and space complexities of the spatial pyramid polling modeling algorithm for vehicles are O (log n).
Each SSP process produces a fixed-length feature image of the vehicle. V represents the vector level of SPP, which has a single feature map of any length. Therefore, the vector-level SPP process for the vehicle V S P P can be determined as follows:
V S P P = i = 1 V G i 2     ,  
The total feature length produced by SPP when applied to the standard block C b can be determined as:
S P P ( C b ) = V S P P × T f m ,  
where T f m is the total feature mapping process and i is the index of the SPP grid G i .
The purpose of SPP is to reduce the spatial dimension of feature maps, thereby reducing the number of training parameters and computing complexity.

5.3. Fully Connected Layer Modeling for Vehicle

A fully connected layer for the vehicle combines the input using a weight matrix and adds a bias vector. All neurons in a fully connected layer communicate with all neurons in the preceding layer. Through the weight matrix, the neuron in fully connected layers linearly transforms the input vector. A non-linear activation function n f is then employed to apply a non-linear transformation to the result for detecting the exact vehicle Ύ, which is given as:
Ύ = n f ( i = 1 h t M w × V i n ) + B t      
where h t is the total number of hidden layers, M w is the weight of the matrix, V i n is the input vector, and B t is the bias term.
The fully connected layer maps the generalized graphical representation of the vehicles onto the specified sample space. The fully connected layer is responsible for transmitting the label information for the categories from the target loss function to the preceding layer. A fully connected layer is commonly used to establish a successful mapping between multi-label information and the feature space of vehicle images, which can be determined as follows:
Let V i m be the image of the vehicle, and ϐ is the kernel at the fully connected layer. The output image O i m can thereby be obtained after the operational process.
O i m [ c i n ( x ) , c i n ( y ) ] = p = 1 w q = 0 h V i m [ p , q ] ϐ   [ ( c i n ( x ) p ) , ( c i n ( y ) q ) ]  
where, c i n ( x ) and c i n ( y ) are the coordinates of the input image, p and q are the coordinates of the layer, w is the weight of the vehicle image,   h is the number of hidden layers required for processing the image at the fully connected layer, A N e is the activity of the neuron, K t is the total number of kernels in the fully connected layer; e ,   h ,   Б , and Ϋ are the values of the hyperparameters established using the validation set.
It is crucial for the mapping procedure to determine the normalization outcome for the executed action. Thus, the normalization outcome N o is as follows:
N o = A N e × { Б + h j = m a x ( 0 ,   i e 2 ) m i n ( K t 1 ,   i = e 2 ) ( A N e ( j ) ) 2 } Ϋ  
A fully connected layer is commonly used to establish a successful mapping between multi-label information and the feature space of vehicle images. Therefore, the probability of the sampling P r ( S i n ) can be determined as:
P r ( S i n ) = e θ . S i n / V i m = 1 V t i m e θ . S i n
where, V t i m is the total number of images for the vehicles; S i n is the input sample.

5.4. Consortium Blockchain Technology Modeling for Vehicle

The consortium blockchain is used to detect malicious and non-malicious vehicles depicted in Figure 3. It serves the purpose of facilitating the exchange of multiple labels and modifying information to ensure process, scalability, and accountability. Combining the advantages of private and public blockchains with those of CNN, the consortium blockchain differentiates itself by alleviating network burdens in scenarios involving a small number of vehicles. It is important to consider the number of vehicles connected to the consortium blockchain technology; however, there is the risk of capturing or modifying the multi-labels, which can lead to the detection of incorrect vehicles instead of the suspected ones. Therefore, blockchain technology makes it easier to restrict label alterations.
Algorithm 2 describes the process of detecting malicious vehicles.
Algorithm 2: Malicious vehicle detection process using multi-labels based on consortium blockchain
  • Initialization: { V : V e h i c l e ;   V m ; Malicious vehicles; L m : Multi-Label; E : Encoder; C : Classifier; L m u l : Multi-layers; L m : Encoded Multi-Label; B t s : Blockchain technology server; D : Decoder; L m B : Multi-label block; L m t : Total multi-labels; F m : Feature matcher}
  • Input: {V, L m , m B }
  • Output: {   V h m }
  • Set  L m = E L m
  • Process  E ( L m ) C
  • Forward  C ( L m ) L m u l
  • Calculate  L m u l ( L m ) D ( L m ) = L m C
  • Forward  L m C   B t s   L m B
  • Set  L m B = B t s
  • If  L m B = M B then
  • Block  L m B
  • else  L m B   M B then
  • Allow  L m B
  • End-else
  • End-if 
  • While  ( L m B   L m t )
  • S t o r e   F m = m B + +
  • If  F m =   V then//* malicious features of the vehicle are matched
  • Set  V = V m
  • else  F m   V then//* malicious features of the vehicle are not matched.
  • Set  V V m
  • End-else
  • End-if
  • End-while
The variables are initialized in step 1. Steps 2 and 3 represent the input and output, respectively. Steps 4 and 5 encode the multi-labels and send them to the CNN classifier for action. Steps 6–9 involve the classifier sending the multi-labels to the hidden layers. Once the packets reach the decoder, the decoder converts the encoded multi-labels to the original multi-labels and sends the multi-labels (multi-label blocks) to the blockchain technology. Steps 10 and 11 start the process of detecting malicious multi-label blocks; if any malicious blocks are identified, they are restricted from further propagation. Steps 12 and 13 illustrate that if the block is not identified as a malicious block, it is permitted to proceed. The suspected vehicles are identified in steps 16–21. The features of the malicious blocks are stored in the feature detection component, and these features are compared with those of the vehicle. If the features match, the vehicle is classified as a suspect vehicle; otherwise, it is classified as a legitimate vehicle.
The blockchain server for further processing, as specified in the algorithm:
L m C   B t s   L m B  
If any vehicle is suspected, its multi-labels L m are added to the multi-label block L m B . After checking all the multi-labels, these L m B M B are blocked or restricted from further transmission, and v is assigned as V s . This process blocks each suspected vehicle individually from transmitting any message, allowing the identification and storage of attacker patterns through suspicious blocks in B t s for future reference. Consequently, consortium blockchains are utilized to secure the CNN model.
Corollary 1.
Blockchain enhances the capability of neural networks to detect malicious labels more efficiently.
Corollary 2.
Blockchain ensures the secure transmission of data between CNN layers.
Hypothesis 1.
If the feature detection component is kept alongside multi-labels, the likelihood of detecting incorrect vehicles is reduced.
Proof. 
The feature detection component successfully detects the suspected vehicle by examining the features of all blocks. Equation (26) represents three types of vehicles based on labels: neutral, suspected, and legitimate.
V t = { V s ,   V l ,   V n e }  
Here V t represents vehicle types, where V n e is a neutral vehicle not yet detected or classified, V s is a suspected harmful vehicle, and V l is a legitimate vehicle. The vehicle dataset V D can be defined as:
V D = { V 1 ,   V 2 ,   , V n } ,
where V D represents the vehicle dataset and V 1 ,   V 2 ,   , V n   denote the feature vectors in the dataset.
The behavior of the data is denoted as B V ; this behavior illustrates the data relationships and dependencies based on weights. The behavior of a sample B S D belonging to the suspected class C s is defined as follows:
B S D = B V   ×   C s
The behavior of the data B V can assume values of 1 or 0, representing suspected or legitimate behavior, respectively. If a sample contains 1, the label is suspected; if it contains 0, the label is legitimate. After the encoding and decoding processes, the multi-labels are transferred and stored in blocks L m B , and the features of these blocks are stored in the feature matcher F m . The feature matcher compares the features of each block based on the sample behavior B S D ,   as   shown   in   Equation   ( 28 ) . If a suspected vehicle is present, the features of malicious blocks are stored in the feature matcher F m , and the vehicle is classified as suspected. Storing only multi-labels (containing symmetric, asymmetric, and hash keys of neighbor nodes) has been shown to potentially cause alteration; thus, incorrect vehicles can be detected as suspect. Due to the higher accuracy of CBCNN, the feature matcher component performs an additional check to prevent incorrect vehicle detection.
There are four circumstances for Algorithm 2 that must be avoided since they may result in the hypothesis being rejected. The following are the situations under which a hypothesis is rejected.
If the feature detection component is not kept alongside multi-labels, the likelihood of detecting incorrect vehicles is increased, and the hypothesis is rejected.
If the threshold value set for the behavior of the data B V is negative or higher than one, then the hypothesis can be rejected.
The features of the malicious blocks are set as null values in the feature detection component, and the hypothesis is rejected.
The likelihood that the procedure of assigning the multi-labels to a vehicle would result in a type I error (rejecting the null hypothesis when it is actually true).
Moreover, our main objective is to accept the hypothesis in order to correctly detect the malicious/suspected vehicles. □
Definition 1.
The feature matcher mechanism reduces the true negative rate (true label adjudged as false label) of the CBCNN classification algorithm.
Corollary 3.
Using CBCNN, the feature matcher reduces the likelihood of incorrect malicious labels.
Theorem 1.
The vehicle  v  provides labels  { l 1 , l 2 ,   .   .   .   ,   l v } , the classifier can retrieve and protect detected multi-labels.
Proof. 
Assuming that a classifier receives { l 1 , l 2 ,   .   .   .   ,   l v } , where we assume that the identity of the label is the l i d ( j ) = j and we mark l 1 = l . According to the Lagrange interpolation theorem L ( x ) , there exists a unique polynomial l of degree at most v 1 that passes through vehicles { ( 1 , l 1 ) , ( 2 , l 1 ) , , ( v , l 1 ) } , which can be expressed as:
L ( x ) = i = 1 v t l . j ( v i )        
Hence, v j = 1 t v ;   t j   ( l t j t ) , where, t is the time to deliver the label to the vehicle.
Hence, l can be derived from the given proposition to process the multi-labels m l with probability p i , which may be expressed as follows:
m l = i = 1 l t p i      
The steady coefficient of l is the sum of the steady coefficients of every P i , which is developed through the polynomials { P i } i = ( 1 , m ) , encompassing the ciphertexts.
The sum of the steady coefficients for each P i created by the polynomials is known as the steady coefficient of multi-label m l . This applies to the entire set of ciphertexts.
m l = i = 1 l t C i  
where C i represents the contents of the label l and l t denotes the total number of labels.
The contents of each multi-label can be determined as follows:
C i = ( r i G , M i + r i (   l G ) )    
Herein, M i is the message, r i is a random number, and G is the random number generator.
Consequently, the multi-label consists of contents, a random number, and a random generator to safeguard the multi-label delivered to the vehicle, which can be computed as follows:
m l = i = 0 l t C i = { ( i = 1 l t r i ) G + i = 1 l t M i + ( i = 1 l t r i ) l G }  
Thus, the security of multi-label is computed using the random number generator and label generator.
m l = ( i = 1 l t r i ) l G    
To protect the multi-label, the reverse mapping function M f and the homomorphic characteristic Γ are utilized.
m l = i = 1 l t ( M f ) i Γ      
Therefore, an elliptic curve ε is employed to protect the multi-label. The group of elliptic curve elements ε = ( ε 1 ,   ε 2   ,   .   .   .   ,   ε N ) , which form an Abelian cluster, is mapped into the entire plaintext, which can be determined as:
m l = i = 1 l t ( T p ) i + ε j = 1 l t ( ε 1 ,   ε 2   ,   .   .   .   ,   ε N ) j    
Furthermore, this method provides proof for protecting the multi-label.
The plaintext T p , representing the multi-label given to a vehicle, has been observed to be secured. It should also be assumed that the multi-label m l is protected against a brute force approach by assigning the originator point to itself, unless a number of summations s that creates m l   are sought. This technique is suitable for multi-label protection. □

5.5. Multi-Labels Modeling for Vehicles

To determine the potential associations between objects of different classes, we calculate the classification accuracy of multi-labels. Errors in classification can lead to inaccurate driving actions, as the driver’s behavior towards pedestrians should differ significantly from that towards vehicles. The accurate classification denoted as A c can be defined as:
A c = { ( P r , φ ) ϵ T p ( g c )   C l a s s ( P r ) = C l a s s ( φ ) } ,  
where g c represents the generic class.
The accurate classification A c for a specific class C p can be determined as follows:
A c ( C p ) = { ( ( P r , φ ) ϵ T p ( C p ) )   C l a s s ( P r ) = C p }  
Therefore, the overall classification accuracy for the multi-label is denoted as A o ( m l ) can be computed as follows:
A o ( m l ) = | A c | | T p |    
Furthermore, the classification accuracy for a specific class within the multi-label A o ( C p ) . ( m l ) can be determined as follows:
A o ( C p ) . ( m l ) = | A c ( C p ) | | T p ( C p ) |
The final classifier produces an output that contains all the label information, which is then transmitted to the final layer connected to blockchain technology. In the proposed approach, we utilize multiple labels to identify vehicles. To successfully deliver the multi-labels, the vehicles must provide accurate location information. Thus, the precise location of the vehicle, V p l , can be calculated as follows:
V p l = { V ( i n a )   , V a v , V s ,   V l ,   V n e }
Herein,   V s represents the suspected vehicle, V n e represents the neutral vehicle, V l represents the legitimate vehicle, V a v represents the average velocity of the vehicle, and V ( i n a ) represents the inactivity of the vehicle (slowness or pause).
V a v = i = 0 n V i V t  
During vehicle operation, instances of inactivity may occur due to traffic or road work. The vehicle’s inactivity can be determined as follows:
V ( i n a ) = i = 0 n V e i n a ( t ) V t
where V e i n a ( t ) represents the expected inactive or paused time of the vehicle.
Hypothesis 2.
Applying blockchain technology to the final layer of the CNN model enhances its security and improves malicious vehicle detection.
Proof. 
We have a set of all vehicles described as follows:
    V = { V 1 ,   V 2 ,   .   .   . ,   V n }
The blockchain layer is added to the system to identify any suspected malicious vehicle as follows:
V i   V s    
After acquiring the multi-labels as input, they are transmitted to the CNN, along with the encoder and decoder layers. Once the algorithms have decoded all the multi-labels, the original multi-labels are sent to the SPP layer. □

6. Experimental Results

To validate the performance of the proposed CBCNN, realistic testing scenarios for detecting malicious vehicles are generated, and the proposed approach is compared to state-of-the-art approaches, namely SCNN [31], PPCDA [37], and multi-label classification with label graph superimposing (MCLGS) [38]. These tests are conducted to determine accuracy, malicious label detection, and loss ratio for realizing practical outcomes. We simulated the traffic from Taepyeong-dong in Gyeonggi Province, South Korea, to Samseong-dong in Seoul, South Korea, 14.4 KM, in order to establish a realistic testbed. The proposed approach is validated using C++ and implemented on ns-3.34. Vehicle modeling is performed using a concept illustrated in [39]. Multiple scenarios comprising both malicious and safe multi-labels are used to perform the testing process. The multi-labels are transferred to the vehicles using the proposed CBCNN, which analyzes the multi-labels. Notably, the network generated by vehicles does not require any infrastructure, and vehicle-to-vehicle communication can be established without the need for a physical conduit or a centralized regulating authority. Switches and hubs are not necessary in a VANET, as hop-to-hop communication is available.
IoT devices face several challenges and limitations in terms of mobility and scalability. The energy-efficient border node medium access control (BN-MAC) protocol is used to address these problems [40]. The primary objective of implementing BN-MAC is to reduce energy consumption while maintaining high levels of mobility, scalability, and collision avoidance at the second layer. Several testing scenarios were developed, starting with 60 vehicles. Despite the large number of vehicles, there was minimal traffic congestion. Consequently, the number of multi-labels for vehicles was increased in each testing scenario; therefore, the proposed vehicular network could accommodate up to 18,000 multi-labels for vehicles, exhibiting a realistic situation. The performance of CBCNN and its counterparts is evaluated, and the minimum system requirements are listed in Table 2.
The following notable outcomes were revealed through the experiments:
Malicious vehicle detection.
Average accuracy.
Multi-label Loss.
Cost/KWh reduction in energy consumption.

6.1. Datasets

NS-3 makes use of the data collection framework (DCF) to collect the datasets, which allows it to obtain data generated by simulator models, execute online reduction and data processing, and translate data into multiple output formats.
The DCF is divided into three primary classes: probes, collectors, and aggregators. The probe is a mechanism for instrumenting and controlling the simulation data output, which is used to monitor occurrences. It generates one or more ns-3 trace sources as output. Probes are connected to one or more trace sinks (known as Collectors), that analyze samples online and arrange them for output. The collector, on the other hand, consumes the data generated by one or more probe objects. It transforms data by performing operations such as normalization, elimination, and calculations of fundamental statistics. Collector objects do not directly send data to the ns-3 run; rather, they output data downstream to another sort of object known as an aggregator.
The data acquired by a network of probes and collectors is routed to the aggregator. The aggregator’s primary function is to marshal data and associated metadata into various output forms, such as plain text files, databases, and spreadsheet files. The raw data for vehicle detection is obtained from the following two main sources:
The KITTI benchmark dataset [41].
Tsinghua-Tencent Traffic-Sign Dataset [42].
The dataset storage process is depicted in Figure 4.

6.2. Malicious Vehical Detection

The proposed CBCNN takes two or more labels as inputs to account for potential corruption by hackers. Its primary focus is on detecting suspected vehicle labels. The incorporation of consortium blockchain technology into our model yields clear results, as depicted in Figure 5. As illustrated in Figure 5a, the proposed CBCNN detects 200 malicious labels, whereas MCLGS, SCNN, and PPCDA detect 115, 128, and 146 malicious labels, respectively, out of 4500 transmitted labels. Figure 5b illustrates that the proposed CBCNN detected nearly 370 malicious labels, whereas MCLGS, CNNV, and PPCDA detected 222, 258, and 284 malicious labels, respectively, out of 9000 transmitted labels.
These results indicate that the proposed CBCNN demonstrated a higher level of success in utilizing consortium blockchain technology compared to the competing methods. To evaluate the performance of the multi-label system applied to vehicles, we must define the sets of false positives F p , true positives T p , and false negatives F n , as the metrics used to assess these operations are dependent on the quantities of F p , T p , and F n . Let β represent the set of bounding box predictions, γ represent the set of ground-truth bounding boxes, and ( P r , φ ) represent the relationship between a prediction and ground-truth box on the same frame with P r β and φ γ . Consequently, we define the true positive T p , false negative F n , and false positive F p as follows:
T p = { ( P r , φ ) | P r β     φ γ , Ű ( P r , φ ) D t h r }
F n = { φ | φ γ , P r β : ( P r φ ) T p }
F p = { P r | P r β , φ γ : ( P r φ ) T p }  
where Ű ( P r , φ ) denotes the connection over integration accumulated between the ground-truth φ γ and boundary boxes of the prediction P r β , and D t h r represents the detection threshold.

6.3. Average Accuracy

The average accuracy of detecting malicious labels serves as an assessment metric for evaluating the performance of CBCNN. The average accuracy varies depending on the number of transmitted labels, as illustrated in Figure 6. The experimental results demonstrate the superior accuracy of CBCNN. As illustrated in Figure 6a, CBCNN achieves an average accuracy of 99.84%, whereas MCLGS, PPCDA, and SCNN achieve average accuracies of 93.78%, 96.36%, and 95.19%, respectively, when utilizing 9000 transmitted labels. Furthermore, Figure 6b demonstrates that the proposed CBCNN achieves an average accuracy of 99.39%, whereas MCLGS, PPCDA, and SCNN achieve average accuracies of 93.38%, 95.96%, and 94.41%, respectively, when 18,000 transmitted labels are used. The utilization of blockchain technology is the primary factor contributing to the increased accuracy of the CBCNN.

6.4. Multi-Label Loss

The multi-label loss predicts the effectiveness of the proposed method. Figure 7 illustrates the performance of the proposed CBCNN compared to other state-of-the-art approaches. The proposed technique exhibits a minimal label loss ratio of 0.32% with 9000 transmitted multi-labels, as depicted in Figure 7a.
In contrast, the competing techniques demonstrate label loss ratios of 1.89–4.69%. As the number of multi-labels increases to the level depicted in Figure 7b, the proposed approach maintains a loss ratio of 0.68% with 18,000 labels, whereas the competing strategies exhibit comparatively higher loss ratios of 4.04–6.52%. The key reason for the marginal loss in our approach is the utilization of four layers to accurately convey the labels while preventing label modification.

6.5. Cost/KWh Reduction in Energy Consumption

The cost reduction has a positive impact on the economy and shows the trade-off between reduction and efficiency. In this experiment, the practical implications of the problem formulation from Equations (1)–(9) have been validated. Figure 8 demonstrates that the proposed CBCNN substantially reduced the cost, which is calculated at 0.0124 cost/KWh, whereas the contending methods produce 0.030 to 0.040 cost/KWh, which is much higher than the proposed CBCNN. Let O C be the original consumption of the power in KWh for the total number of the vehicles V t , and after the end of counting the V t , the new power consumption for V t , is N c . Thus, the total cost reduction C r t can be calculated as follows:
C r t = { ( ( O C N c ) O C )   V t × 100 }  

7. Discussion of Result

The analysis of the experimental outcomes yielded intriguing observations. Evidently, the most effective approach for multi-object tracking in autonomous driving scenarios is the deployment of CBCNN with a multi-label detector. However, even for the best-performing methods, there is still significant room for improvement in absolute performance. Therefore, further enhancements may be required for the multi-object detectors used in autonomous driving situations. It should be noted that if the missed detections and incorrect classifications occur on distant objects from the vehicle, the aforementioned issues may be less critical. In fact, depending on the speed of the vehicle, braking or turning may not be necessary to avoid distant objects. The lack of consideration for the distance from objects in existing tracking measures and the absence of weighting mistakes based on that distance are drawbacks. Analyzing this factor could be crucial in selecting the most suitable strategy among different approaches. The proposed CBCNN employs various processes to detect malicious vehicles. Initially, the vehicle images are fed into the proposed CBCNN, which leverages the advantages of blockchain technology by connecting it to the final layer. In this layer, the multi-labels are stored as blocks, with each block containing the hash keys and public and private keys of their neighbors. Additionally, there is a feature detection component that includes all the features of the malicious blocks for matching, thereby enabling the identification of suspected, legitimate, and neutral vehicles. The assessment demonstrates that the proposed technique outperforms the state-of-the-art methods of MCLGS, SCNN, and PPCDA in terms of average accuracy and malicious label detection. The performance of the proposed CBCNN and the competing methods is presented in Table 3.
Future research should focus on selecting metrics that account for object distance and transforming loss functions utilized to train the multi-object detectors and the neural networks used for extracting object descriptors. Having labeled data with distance information would greatly assist this line of inquiry. Notably, none of the multi-object tracking techniques have been optimized to perform data association on objects belonging to multiple classes; rather, all the methods under consideration are aimed at carrying out the re-identification of a single class of objects, typically vehicles, and are only slightly modified for the multi-label. Therefore, developing data association algorithms that consider various object types is another area that warrants exploration. Furthermore, novel approaches to forecasting the future location of tracked objects should be investigated.
Another notable limitation is the lack of simulations of similar identification problems in driving scenarios to assess their impact on autonomous navigation. A framework that enables the integration of artificial vision algorithms and the simulation-based verification of the detrimental consequences of perception errors on autonomous navigation would be valuable for this purpose. However, developing such a framework would be challenging due to the navigation algorithm operating in the world reference system. To overcome this challenge, multi-sensor fusion algorithms must be defined to track the calculation of the speed and direction of vehicles on the road. Providing researchers with access to such a tool would significantly advance their studies in the field.

8. Conclusions and Future Works

This section summarizes the insight gained from the study and suggests areas for future research.

8.1. Conclusions

A four-layered paradigm called CBCNN is proposed for detecting malicious/non-malicious vehicles. The proposed CBCNN paradigm incorporates a CNN-enabled IoT model, geographic pyramid pooling, fixed-layer, and consortium blockchain technology. The primary objective is to detect malicious vehicles accurately while enhancing accuracy and reducing the loss ratio and cost. The proposed CBCNN approach demonstrates the effectiveness of using consortium blockchains for handling sequential data. The consortium blockchain incorporates a proof-of-luck mechanism, allowing vehicles to save energy while providing correct vehicle information to the vehicle management system. The CBCNN is tested using multi-label classification of up to 9000–18,000 transmitted labels without incurring additional costs. The results confirm that the proposed CBCNN provides higher malicious detection capability as compared to competing methods. The CBCNN detects 370 malicious labels by transmitting a maximum of 18,000 labels, which is a larger number than competing approaches. On the other hand, the competing approaches determine 222 to 286 malicious labels, which is 22.7 to 40% less. The proposed CBCNN obtains an accuracy of 99.84% with a maximum of 18,000 labels, which is 3.43–6.01% higher than competing approaches. The proposed CBCNN produces a lower loss ratio of 0.68%, while the loss ratio for competing approaches ranges from 4.04 to 6.52%. Furthermore, the proposed CBCNN has also been evaluated and tested for parameter tampering attacks, which exhibit outstanding resilience. The findings demonstrate that the proposed CBCNN is a superior paradigm for malicious vehicle detection, outperforming competing methods in terms of accuracy, malicious label detection, loss ratio, and cost reduction.

8.2. Future Works

In future research, data enrichment methods will be utilized to fine-tune various CNN models. Different quality-of-service metrics, including delay time, computational complexity, space complexity, and throughput, will be measured.

Author Contributions

Conceptualization, A.R., M.A. (Mohsin Ali) and J.Y.; Data curation, A.R. and A.A.; Formal analysis, A.R., M.A. (Majid Alshammari) and J.Y.; Funding acquisition, J.Y., A.A. and M.A. (Majid Alshammari); Investigation, A.R., G.B., and M.A. (Mohsin Ali); Methodology, A.R., G.B., J.Y. and M.A. (Mohsin Ali); Project administration, S.A.; Resources, M.A. (Mohsin Ali); Software, A.R., G.B. and M.A. (Majid Alshammari); Supervision, A.R. and J.Y.; Validation, A.R., G.B., A.A. and M.A. (Mohsin Ali); Visualization, A.R., G.B., J.Y., F.A., M.A. (Mohsin Ali) and S.A.; Writing—original draft, A.R., M.A. (Mohsin Ali) and F.A.; Writing—review and editing, A.R., G.B., A.A., M.A. (Mohsin Ali), S.A., F.A. and M.A. (Majid Alshammari). All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (NRF-2021R1F1A1063640) and partially supported by the Deanship of Scientific Research.

Acknowledgments

The researchers would like to acknowledge the Deanship of Scientific Research at Taif University, Saudi Arabia, for funding this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Noussaiba, M.; Razaque, A.; Rahal, R. Heterogeneous Algorithm for Efficient-Path Detection and Congestion Avoidance for a Vehicular-Management System. Sensors 2023, 23, 5471. [Google Scholar] [CrossRef] [PubMed]
  2. Wang, X.; Zhu, Z. Context understanding in computer vision: A survey. Comput. Vis. Image Underst. 2023, 229, 103646. [Google Scholar] [CrossRef]
  3. Razaque, A.; Frej, M.B.H.; Bektemyssova, G.; Almi’ani, M.; Amsaad, F.; Alotaibi, A.; Jhanjhi, N.Z.; Ali, M.; Amanzholova, S.; Alshammari, M. Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning. Electronics 2023, 12, 1129. [Google Scholar] [CrossRef]
  4. Li, Z.; Xu, M.; Yang, X.; Han, Y.; Wang, J. A Multi-Label Detection Deep Learning Model with Attention-Guided Image Enhancement for Retinal Images. Micromachines 2023, 14, 705. [Google Scholar] [CrossRef]
  5. Nicolás-Sáenz, L.; Ledezma, A.; Pascau, J.; Muñoz-Barrutia, A. ABANICCO: A New Color Space for Multi-Label Pixel Classification and Color Analysis. Sensors 2023, 23, 3338. [Google Scholar] [CrossRef]
  6. Rashed, B.M.; Popescu, N. Performance Investigation for Medical Image Evaluation and Diagnosis Using Machine-Learning and Deep-Learning Techniques. Computation 2023, 11, 63. [Google Scholar] [CrossRef]
  7. Shi, Q.; Li, L.; Feng, J.; Chen, W.; Yu, J. Automated Model Hardening with Reinforcement Learning for On-Orbit Object Detectors with Convolutional Neural Networks. Aerospace 2023, 10, 88. [Google Scholar] [CrossRef]
  8. Razaque, A.; Frej, M.B.H.; Almi’ani, M.; Alotaibi, M.; Alotaibi, B. Improved support vector machine enabled radial basis function and linear variants for remote sensing image classification. Sensors 2021, 21, 4431. [Google Scholar] [CrossRef]
  9. Tu, Z.; Liu, B.; Zhao, W.; Yan, R.; Zou, Y. A Feature Fusion Model with Data Augmentation for Speech Emotion Recognition. Appl. Sci. 2023, 13, 4124. [Google Scholar] [CrossRef]
  10. Andriyanov, N. The Use of Correlation Features in the Problem of Speech Recognition. Algorithms 2023, 16, 90. [Google Scholar] [CrossRef]
  11. Almiani, M.; AbuGhazleh, A.; Al-Rahayfeh, A.; Atiewi, S.; Razaque, A. Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 2020, 101, 102031. [Google Scholar] [CrossRef]
  12. Almiani, M.; AbuGhazleh, A.; Jararweh, Y.; Razaque, A. DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network. Int. J. Mach. Learn. Cybern. 2021, 12, 3337–3349. [Google Scholar] [CrossRef]
  13. Al-Qubaydhi, N.; Alenezi, A.; Alanazi, T.; Senyor, A.; Alanezi, N.; Alotaibi, B.; Alotaibi, M.; Razaque, A.; Abdelhamid, A.A.; Alotaibi, A. Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning. Electronics 2022, 11, 2669. [Google Scholar] [CrossRef]
  14. Razaque, A.; Nazerke, S.; Bandar, A.; Munif, A.; Akhmetov, M.; Aziz, A. Big data handling approach for unauthorized cloud computing access. Electronics 2022, 11, 137. [Google Scholar] [CrossRef]
  15. Alfaro, R.; Allende-Cid, H.; Allende, H. Multilabel Text Classification with Label-Dependent Representation. Appl. Sci. 2023, 13, 3594. [Google Scholar] [CrossRef]
  16. Deeb, A.; Ibrahim, A.; Salem, M.; Pichler, J.; Tkachov, S.; Karaj, A.; Al Machot, F.; Kyandoghere, K. A Robust Automated Analog Circuits Classification Involving a Graph Neural Network and a Novel Data Augmentation Strategy. Sensors 2023, 23, 2989. [Google Scholar] [CrossRef]
  17. Mo, L.; Zhu, Y.; Zeng, L. A Multi-Label Based Physical Activity Recognition via Cascade Classifier. Sensors 2023, 23, 2593. [Google Scholar] [CrossRef]
  18. Cui, H.; Li, J.; Hua, Z.; Fan, L. TPET: Two-stage Perceptual Enhancement Transformer Network for Low-light Image Enhancement. Eng. Appl. Artif. Intell. 2022, 116, 105411. [Google Scholar] [CrossRef]
  19. Wang, G.; Chen, H.; Chen, L.; Zhuang, Y.; Zhang, S.; Zhang, T.; Dong, H.; Gao, P. P 2FEViT: Plug-and-Play CNN Feature Embedded Hybrid Vision Transformer for Remote Sensing Image Classification. Remote Sens. 2023, 15, 1773. [Google Scholar] [CrossRef]
  20. Ferrario, A.; Loi, M.; Viganò, E. In AI we trust incrementally: A multi-layer model of trust to analyze human-artificial intelligence interactions. Philos. Technol. 2020, 33, 523–539. [Google Scholar] [CrossRef] [Green Version]
  21. Shikha, D.; Olimov, F.; Rafique, M.A.; Kim, J.; Jeon, M. Label-attention transformer with geometrically coherent objects for image captioning. Inf. Sci. 2023, 623, 812–831. [Google Scholar]
  22. Kim, T.; Pak, W. Deep Learning-Based Network Intrusion Detection Using Multiple Image Transformers. Appl. Sci. 2023, 13, 2754. [Google Scholar] [CrossRef]
  23. Ali, E.S.; Hasan, M.K.; Hassan, R.; Saeed, R.A.; Hassan, M.B.; Islam, S.; Nafi, N.S.; Bevinakoppa, S. Machine learning technologies for secure vehicular communication in internet of vehicles: Recent advances and applications. Secur. Commun. Netw. 2021, 2021, 1–23. [Google Scholar] [CrossRef]
  24. Din, N.U.; Zhang, L.; Yang, Y. Automated Battery Making Fault Classification Using Over-Sampled Image Data CNN Features. Sensors 2023, 23, 1927. [Google Scholar] [CrossRef] [PubMed]
  25. Liu, X.; Xie, L.; Wang, Y.; Zou, J.; Xiong, J.; Ying, Z.; Vasilakos, A.V. Vasilakos. Privacy and security issues in deep learning: A survey. IEEE Access 2020, 9, 4566–4593. [Google Scholar] [CrossRef]
  26. Agarwal, U.; Rishiwal, V.; Tanwar, S.; Chaudhary, R.; Sharma, G.; Bokoro, P.N.; Sharma, R. Blockchain technology for secure supply chain management: A comprehensive review. IEEE Access 2022, 10, 85493–85517. [Google Scholar] [CrossRef]
  27. Razaque, A.; Alotaibi, B.; Alotaibi, M.; Hussain, S.; Alotaibi, A.; Jotsov, V. Clickbait detection using deep recurrent neural network. Appl. Sci. 2022, 12, 504. [Google Scholar] [CrossRef]
  28. Qian, S.; Ning, H.; He, Y.; Chen, M. Multi-Label Vulnerability Detection of Smart Contracts Based on Bi-LSTM and Attention Mechanism. Electronics 2022, 11, 3260. [Google Scholar] [CrossRef]
  29. Duan, Y.; Chen, N.; Zhang, P.; Kumar, N.; Chang, L.; Wen, W. MS2GAH: Multi-label semantic supervised graph attention hashing for robust cross-modal retrieval. Pattern Recognit. 2022, 128, 108676. [Google Scholar] [CrossRef]
  30. Bader, L.; Pennekamp, J.; Matzutt, R.; Hedderich, D.; Kowalski, M.; Lücken, V.; Wehrle, K. Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability. Inf. Process. Manag. 2021, 58, 102529. [Google Scholar] [CrossRef]
  31. Nasir, I.M.; Khan, M.A.; Armghan, A.; Javed, M.Y. SCNN: A Secure Convolutional Neural Network using Blockchain. In Proceedings of the 2020 2nd International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 13–15 October 2020. [Google Scholar] [CrossRef]
  32. Liu, H.; Huang, H.; Zhou, Y.; Chen, Q. Improvement of blockchain-based multi-layer location data sharing scheme for Internet of Things. Comput. Commun. 2023, 201, 131–142. [Google Scholar] [CrossRef]
  33. Jiang, S.; Cao, J.; Wu, H.; Chen, K.; Liu, X. Privacy-preserving and Efficient Data Sharing for Blockchain-based Intelligent Transportation Systems. Inf. Sci. 2023, 635, 72–85. [Google Scholar] [CrossRef]
  34. Zhang, Z.; Liu, Q.; Huang, Z.; Wang, H.; Lee, C.K.; Chen, E. Model inversion attacks against graph neural networks. IEEE Trans. Knowl. Data Eng. 2022, 1–13. [Google Scholar] [CrossRef]
  35. Kumar, R.; Wang, W.; Kumar, J.; Yang, T.; Khan, A.; Ali, W.; Ali, I. An integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals. Comput. Med. Imaging Graph. 2021, 87, 101812. [Google Scholar] [CrossRef] [PubMed]
  36. Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Netw. 2022, in press. [CrossRef]
  37. Chen, B.; Wang, Z.; Xiang, T.; Yang, J.; He, D.; Choo KK, R. BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh. Commun. 2023, 41, 100602. [Google Scholar] [CrossRef]
  38. Wang, Y.; He, D.; Li, F.; Long, X.; Zhou, Z.; Ma, J.; Wen, S. Multi-label classification with label graph superimposing. Proc. AAAI Conf. Artif. Intell. 2020, 34, 12265–12272. [Google Scholar] [CrossRef]
  39. Available online: https://github.com/tkn-tub/ns3-gym (accessed on 15 March 2023).
  40. Razaque, A.; Elleithy, K.M. Energy-efficient boarder node medium access control protocol for wireless sensor networks. Sensors. 2014, 14, 5074–5117. [Google Scholar] [CrossRef] [Green Version]
  41. Geiger, A.; Lenz, P.; Urtasun, R. Are we ready for autonomous driving? the kitti vision benchmark suite. In Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012; IEEE: New York, NY, USA; pp. 3354–3361. [Google Scholar]
  42. Wang, Q.; Li, X.; Lu, M. An Improved Traffic Sign Detection and Recognition Deep Model Based on YOLOv5. IEEE Access 2023, 11, 54679–54691. [Google Scholar] [CrossRef]
Figure 1. General architecture of CNN with blockchain technology using multi-labels.
Figure 1. General architecture of CNN with blockchain technology using multi-labels.
Sensors 23 06554 g001
Figure 2. System Model for the proposed CBCNN.
Figure 2. System Model for the proposed CBCNN.
Sensors 23 06554 g002
Figure 3. Malicious/Non-malicious vehicle detection process using consortium blockchain technology with a proof-of-luck mechanism.
Figure 3. Malicious/Non-malicious vehicle detection process using consortium blockchain technology with a proof-of-luck mechanism.
Sensors 23 06554 g003
Figure 4. Dataset storage process through trace sources and polling.
Figure 4. Dataset storage process through trace sources and polling.
Sensors 23 06554 g004
Figure 5. (a) Detected malicious labels with the proposed CBCNN and competing methods using a maximum of 4500 transmitted labels; (b) Detected malicious labels with the proposed CBCNN and competing methods using a maximum of 9000 transmitted labels.
Figure 5. (a) Detected malicious labels with the proposed CBCNN and competing methods using a maximum of 4500 transmitted labels; (b) Detected malicious labels with the proposed CBCNN and competing methods using a maximum of 9000 transmitted labels.
Sensors 23 06554 g005
Figure 6. (a) Average accuracy of the proposed CBCNN and competing methods with up to 9000 transmitted labels; (b) Average accuracy of the proposed CBCNN and competing methods with up to 18,000 transmitted labels.
Figure 6. (a) Average accuracy of the proposed CBCNN and competing methods with up to 9000 transmitted labels; (b) Average accuracy of the proposed CBCNN and competing methods with up to 18,000 transmitted labels.
Sensors 23 06554 g006
Figure 7. (a) Multi-label loss ratio of the proposed CBCNN and competing methods with 9000 transmitted labels; (b) Multi-label loss ratio of the proposed CBCNN and competing methods with 18,000 transmitted labels.
Figure 7. (a) Multi-label loss ratio of the proposed CBCNN and competing methods with 9000 transmitted labels; (b) Multi-label loss ratio of the proposed CBCNN and competing methods with 18,000 transmitted labels.
Sensors 23 06554 g007
Figure 8. Cost/KWh reduction in energy consumption with 90,000 monitored vehicles.
Figure 8. Cost/KWh reduction in energy consumption with 90,000 monitored vehicles.
Sensors 23 06554 g008
Table 1. Contemporary work of existing approaches.
Table 1. Contemporary work of existing approaches.
WorksBlockchain-Enabled MethodsFeaturesVulnerabilities
Nasir et al. [31]A blockchain-enabled convolutional neural network model for potential attacksThe blockchain is introduced to protect a convolutional neural network model from potential attacksRestricted only to the CNN model and lacks accuracy
Hongyan et al. [32]A multi-layer location sharing system based on blockchain for single point of failureThe suggested technique is also applicable in dynamic situations. An accumulator is used to enhance the scheme’s effectiveness in data refreshing and verification. Furthermore, the efficacy of the scheme is assessed using a formal security study based on Real-Or-RandomFailed to obtain efficiency
Shan et al. [33]The blockchain model is analyzed in depth for vehicle detectionEmployed blockchain technology to ensure security and preserve dataLimited only to smart contracts and their implementation
Zhang et al. [34]Blockchain is employed in artificial intelligence to secure data sharing and automatically train the modelsA blockchain is used to secure data exchange and autonomously train models. To enhance the security and reliability of facial datasets, blockchain technology is used in conjunction with VGGFace deep neural networks.Focused only on data tampering
Kumar et al. [35]Integration of blockchain technology and AI-deep neural network model for secure data sharing The blockchain network stores and exchanges the trained model to disseminate information about new cancer patients. Updates about new cases of new patients are addressed using a decentralized blockchain, which tracks all types of patients’ histories.An invalid data sample can jeopardize the classification accuracy of a model as it increases the time required for model training. It consumes more execution time as the deep learning models always require a large amount of resources such as computing power to train the model
Wang et al. [36]Privacy-preserving federated learning system for ciphertext-levelProposed privacy-preserving federated learning system which utilizes blockchain as the fundamental technology to secure data. It also provides model aggregation and model filtering. The Multi-Krum technology is enhanced and coupled with homomorphic encryptionUnable to achieve verifiability
Chen et al. [37]A privacy-preserving cross-domain authentication system for VANETsA secure blockchain-based privacy-preserving cross-domain verification solution for VANETs is proposed. The proposed method blends group signature with blockchain technology. The group signature approach is used to allow cross-domain vehicle verificationThe group signature technique does not provide enough privacy. So, it limits the privacy protection
Our Solution Layered-based paradigm for malicious vehicle detectionThe CBCNN is employed to detect and restrict malicious vehicles to accomplish accurate malicious label identification while enhancing accuracy and decreasing loss ratio.Limited to specific scenarios of vehicle detection
Table 2. Summarized testing parameters and system specifications.
Table 2. Summarized testing parameters and system specifications.
Name of ParametersDescription
Simulatorns-3.34
Number of maximum multi-labels18,000
Transmission Range45 m
Initial energy of the IoT device attached with vehicle4 J
Size of vehicular network1200 × 1200 m2
pause time10 s
Simulation time50 min
Data frame256 bytes
Data Packet size512 bytes
MAC protocolBN-MAC
Tested algorithmCBCNN
Mobility ModelManhattan mobility model
Contending methodsSCNN, PPCDA and MCLGS
Mobility0.1–15 m/s
HARD Disk free space500 MB
RAM2048 MB
Operating systemWindows 10
ProcessorIntel(R) Core 2 Duo
Table 3. Comparison of findings obtained for CBCNN and competing techniques.
Table 3. Comparison of findings obtained for CBCNN and competing techniques.
MethodsMalicious Label Detection (Max: 4500 Labels)Malicious Label Detection (Max: 9000 Labels)Average Accuracy (Max: 9000 Labels)Average Accuracy (Max: 18,000 Labels)Loss Ratio (Max: 9000 Labels)Loss Ratio (Max: 18,000 Labels)
MCLGS 11522293.78%93.38%4.69%6.52%
SCNN12825895.19%94.41%3.49%6.32%
PPCDA14628496.36%95.96%1.89%4.04%
Proposed CBCNN20037099.84%99.39%0.32%0.68%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Razaque, A.; Bektemyssova, G.; Yoo, J.; Alotaibi, A.; Ali, M.; Amsaad, F.; Amanzholova, S.; Alshammari, M. Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors 2023, 23, 6554. https://doi.org/10.3390/s23146554

AMA Style

Razaque A, Bektemyssova G, Yoo J, Alotaibi A, Ali M, Amsaad F, Amanzholova S, Alshammari M. Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors. 2023; 23(14):6554. https://doi.org/10.3390/s23146554

Chicago/Turabian Style

Razaque, Abdul, Gulnara Bektemyssova, Joon Yoo, Aziz Alotaibi, Mohsin Ali, Fathi Amsaad, Saule Amanzholova, and Majid Alshammari. 2023. "Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things" Sensors 23, no. 14: 6554. https://doi.org/10.3390/s23146554

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop