Journal
CMC-COMPUTERS MATERIALS & CONTINUA
Volume 64, Issue 1, Pages 359-371Publisher
TECH SCIENCE PRESS
DOI: 10.32604/cmc.2020.09821
Keywords
Intelligent transportation system; authentication; rogue attack
Funding
- China's National Key RD Program [2018YFB0803600]
- Natural Science Foundation of China [61801008]
- Beijing Natural Science Foundation National [L172049]
- Scientific Research Common Program of Beijing Municipal Commission of Education [KM201910005025]
- Defense Industrial Technology Development Program [JCKY2016204A102]
Ask authors/readers for more resources
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents, economically damaging traffic jams, hijacking, motivating to wrong routes, and financial losses for businesses and governments. Smart and autonomous vehicles are connected wirelessly, which are more attracted for attackers due to the open nature of wireless communication. One of the problems is the rogue attack, in which the attacker pretends to be a legitimate user or access point by utilizing fake identity. To figure out the problem of a rogue attack, we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state information of the communication link. We consider the communication link between vehicle-to-vehicle, and vehicle-to-infrastructure. We evaluate the performance of our proposed technique by measuring the rogue attack probability, false alarm rate (FAR), mis-detection rate (MDR), and utility function of a receiver based on the test threshold values of reinforcement learning algorithm. The results show that the FAR and MDR are decreased significantly by selecting an appropriate threshold value in order to improve the receiver's utility.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available