Keywords

1 Introduction

There are more than 1.2 billion motor vehicles across the globe now, and it is expected to hit two billion by 2035. It is estimated that over 125 million network connected automobiles will be manufactured between 2018 and 2022 [1]. In China, as of 2017, there were more than 17.8 million users of IoV [2]. IoV is regarded as a typical kind of Internet of Things (IoT), and it can ameliorate driving safety, provide convenience information and facilitate traffic management. IoV implements the communications between vehicles and public networks via vehicle-to-road (V2R), vehicle-to-human (V2H), vehicle-to-vehicle (V2V), and vehicle-to-sensor (V2S) interactions.

However, the rapid development of IoV raises concerns about security and privacy problems which can threaten driving safety and driver’s lives and invade people’s privacy. In 2015, security flaws of BMW vehicles equipped with connected drive were found to enable thieves to unlock doors and steal car data. Following this, more than 1.4 million of Chrysler cars in US were recalled due to network security problems [3]. In 2016, US National Highway Traffic Safety Administration (NHTSA) launched “Cybersecurity Best Practices for Modern Vehicles”, in which cybersecurity standards, principles, and best practices for car industry were described to improve the information security of vehicles. In 2017, “White Papers of Network Security of Internet of Vehicles” was published by China Academy of Information and Communications Technology (CAICT), aiming to promote the safe development of IoV.

Until now, plenty of security strategies have been put forward to ensure the security of IoV, such as encryption, intrusion detection system, secure routing protocols and key management. However, more effective and flexible methods need to be developed to meet the needs of the special features of IoV, including dynamic change of network topology, limited storage capacity and processing capacity of automobile terminal. Artificial intelligence can not only enhance the detection accuracy for threats, but also can find hidden risks by learning from data without explicit programming. Game theory is also an intelligent tool to analyze the interaction process between the attackers and defenders. In this article, we will discuss the structure of IoV, security threats and countermeasures for network security. Meanwhile, artificial intelligence (AI) and game theory based security scheme for IoV will be emphasized, and the application cases of IoV with AI and game theory will be analyzed accordingly.

2 Literature Survey

2.1 Structure of IoV

Vehicle system architecture can be hierarchically grouped into four layers in terms of security, namely, external communication layer (Level 1), vehicle gateway layer (Level 2), in-vehicle network layer (Level 3), and hardware layer (Level 4) (shown in Fig. 1) [4].

Fig. 1.
figure 1

Structure of IoV

External communication layer achieves the communications between vehicles and outside world by linking on-board communication equipment to V2X systems, Wi-Fi and mobile networks. Vehicle gateway layer regulate automotive systems in a vehicle like the headquarter, in which vehicle gateway connects internal ECUs (Electronic Control Units) to external communication equipment at Level 1 and controls message transfer in the in-vehicle networks. In-vehicle network layer is responsible for transmitting messages among ECUs, and it can be classified into multiple of network sub-units in terms of ECU functions, such as body domain, control domain, and telematics domain. CAN (Controller Area Network) or LIN (Local Interconnect Network) is commonly used as communication protocols at this layer. Naturally, hardware layer is comprised of ECUs and various components that perform specific functions related to vehicle [4].

2.2 Attack Classification in IoV

Attacks can be mainly classified into five types in IoV: authentication attacks, attacks on availability, privacy attacks, attacks on routing and attacks of data authenticity. Attacks on authentication include Sybil attack, GPS camouflage, camouflage attack, and wormhole attack. With regard to availability attacks, interference on channel and service denial are two common attacks. Specially, the secrecy attacks steal customer data by interception or eavesdropping. With respect to routing attacks on routing, there are four attack types related to routing, including interception, camouflage, service denial and route modification. In regard to data authenticity attacks, they can be categorized into the masquerading attack, replay attack, illusion attack and information fabrication and falsification (shown in Fig. 2) [5].

Fig. 2.
figure 2

Attack model

2.3 Countermeasures for IoV Security

A wide range of countermeasures have been proposed to prevent the threats on IoV according to special characteristics of IoV attacks, including establishing suitable model of threat, adopting honeypot system, constructing intrusion monitor system, employing privacy protection mechanism of routing, using reliable routing protocols and key management. With regard to threat model, constructing mathematical model and adopting graph-based methods are two main approaches for simulating threats. Intrusion detection system (IDS) can employ anomaly detection approach and signature detection method to hinder attacks through collecting and analyzing internal system’s information. In addition, SVM-based security framework and protocol analysis can offer protection for IoV security as well. Honeypots can realize protection by tempting and hoaxing attackers’ attention to avoid invading in vital system data in the context of IoV. Several secure routing protocols can not only perform normal routing functions, but also can restrain attacks on routing such as SAODV, Ariadne, and SRP protocol. Routing privacy protection mechanism contains a few of algorithms to guard against routine nodes data leakage, including SLPD, ALAR, and STAP. Key management is a crucial strategy for IoV security in that encryption is a significant method for information security, and successful encryption relies on suitable key management. Additionally, pseudonym signature and certificateless signature can also provide effective protection (shown in Fig. 3) [5].

Fig. 3.
figure 3

Countermeasures for IoV security

2.4 Artificial Intelligence and Game Theory Based Security Strategies for IoV

Artificial intelligence (AI) is a kind of ability that a machine simulates human behavior intelligently and carries out specific tasks arranged by humans. Machine learning and deep learning are two main techniques to implement artificial intelligence. Some scholars argued that machine learning, deep learning and reinforcement learning can be adopted to safeguard the information security in Internet of Things (IoT). For example, AI can build up real-time behavioral modeling for net nodes, servers and equipment, and reduce new malware attacks and APT malware (Phishing, Adware, Trojans, etc.) [6].

Machine learning can defend against threats on IoV via gathering and storing right data, the vehicle’s internal network can be monitored by storing and analyzing logs, thereby detecting wicked threats and combating attacks. Once user logs are acquired, machine learning can check anomalies existed in the picture. Thus, machine learning can be able to analyze outside service data and information to detect unusual activities and malware attacks [7].

Loukas put forward a deep learning based intrusion detection approach to prevent cyber-physical attacks in IoV, which can enhance intrusion detection accuracy for vehicles compared with other deep learning and machine learning approaches [8]. Support Vector Machine (SVM) based detection system differentiates normal contents and anomalies by analyzing the training data of normal parts. Naturally, the input space is therefore classified into normal and abnormal parts [9]. Kang developed a Deep Belief Network (DBN) to detect intrusion for in-vehicle network, which ensure 97.8% accuracy and 1.6% false positive rate [10]. Vuong et al. adopted decision tree to search for command injection and denial of service threats on robotic vehicles, indicating the introduction of physical input characteristics can increase detection accuracy and eliminate the false positive rate [11].

Game theory is exploited to find out optimal choices when facing conflicts. It refers to the process which individuals or organizations select strategies from action sets to make best decisions in a specific context [12]. Of these, security games focus on the interaction between malicious attackers and defenders and it is applied to detect intrusion in IoV networks. For instance, Buchegger and Alpcan proposed two-player zero-sum game to generate solutions to security of IoV, in which they defined one player as attacker, and a group of mobile nodes as defender to imitate jamming and Sybil attacks in a vehicular network. The result showed the mobile nodes can improve their safeguard strategy by adopting zero-sum game approach [13].

In the aspect of understanding attack and defense comprehensively, game theory is proven to be an effective analysis tool. Alpan utilized game theory model based on noncooperation approach and provided Nash equilibrium analysis for lots of common network attack detection [14]. Chen mentioned abnormal network attack detection and provided mixed Nash equilibrium analysis [15]. Afterwards, Ismail [16] applied Chen’s conclusion into privacy attack detection of ammeter infrastructure data. However, most of conclusions are based on assumption that attacker’s identity is known already, and this assumption does not work due to high masquerading of attackers [14,15,16]. To resolve the unknown identity problem, some scholars employed Bayesian game theory to solve attack detection problem, whose rationale is based on credibility evaluation of attacker’s previous behaviors and real-time update by Bayesian theory [17,18,19,20,21,22,23,24,25]. In terms of features of mobile wireless ad hoc networks of IoV, researchers performed a numbers of studies on intrusion node detection and node communication incentive [26, 27]. Additionally, game theory is also used for intrusion detection of industrial control including networked control system [28] and energy system [29]. Apart from this, game theory is also widely applied in numerous of fields [30,31,32].

2.5 Case Study of Artificial Intelligence and Game Theory Based Security Strategies for IoV

In the aspect of artificial intelligence, Kang et al. adopted deep neural network method to construct intrusion monitor system for security of IoV. In this system, parameters can be originated by utilizing deep belief networks as a pre-processing step. Following this, high-dimensional packet data can train neural networks to discriminate and analyze hacking and normal data’s statistical properties and find out the relevant characteristics [33].

Regarding artificial intelligence’s practical application, “learn and prevent” device was developed through machine learning by Miller and Valasek, aiming to detect intrusion in the vehicle. The device is essentially a NXP micro-controller, and its simple board can be plugged into the OBD-II port. It can collect the typical data patterns of vehicle in the beginning of driving as observation mode, and then it changes to detection mode to monitor unusual information. Once any attacks are found, the automobile will be switched into “limp mode” to interrupt the networks and suspend vital functions like steering, then prevention and alert mode will be stimulated when any anomalies are found. The prevention mode enables the vehicle to neglect the malicious attacks and attackers can be inhibited, while alert mode empowers the driver to take actions by sending messages.

With respect to game theory, Raya et al. designed a repudiation protocol for network security based on game theory method. Raya et al. presented three choices that each player can adopt according to the available protocols. Firstly, a player can give up the local repudiation step by choosing A due to mobile node’s unwillingness of involving in repudiation step. Secondly, a player can use vote V to fight detected attacker by participating in local voting step. Finally, a player can perform invalidity procedure for attacker’s identity and its own identity and commit suicide. By introducing dynamic game, researchers define mobile nodes as players to solve the repudiation problem.

Eventually, Raya et al. applied repudiation procedure based on gme theroy method to resolve practical problems. The protocol realizes quick and best repudiation process through motivating mobile nodes to be involved in repudiation process actively. Realistic simulation in IoV of this game theory method indicated a better tradeoff among various approaches [34].

3 Conclusions

A wealth of countermeasures based on different theory and new techniques have been employed to defend against threats for the security of IoV. Among them, artificial intelligence and game theory based security strategies can prevent IoV from wicked attacks effectively and securely. Along with the occurrence of more application cases based on aforementioned two methods, artificial intelligence and game theory based secure scheme can play a stronger and broader role in cybersecurity of IoV in the future.

With the rapid development of IoV and techniques, more malicious attacks will emerge and more effective techniques can be developed to fight against threats in the future. Given this, any single technique cannot guarantee the absolute security of IoV, thus combined application of multiple of effective techniques may be a better way to prevent from threats of IoV networks. Additionally, the advent of 5G era and the emergence of a great number of innovative and effective techniques definitely bring new methods for IoV security protection and automobile manufacture industry to ensure the safe driving and facilitate the establishment of smart cities.