Abstract
Vehicular Ad Hoc Networks (VANETs) provides the efficient dissemination of information among the vehicles and roadside infrastructure. However, due to the high mobility of onboard units (OBUs) and the large-scale network topology, VANETs are vulnerable to attacks. In this chapter, we first review the fundamentals of VANETs in Section 1.1. Next, the type of attacks in VANETs is presented in Section 1.2, including the scope of the attack, and the impact to VANETs. We review the VANETs security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning in Section 1.3. Finally, we conclude in Section 1.4.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
W. Alasmary and W. Zhuang, “Mobility impact in ieee 802.11 p infrastructureless vehicular networks,” Ad Hoc Networks, vol. 10, no. 2, pp. 222–230, Mar. 2012.
A. Abdrabou, B. Liang, and W. Zhuang, “Delay analysis for sparse vehicular sensor networks with reliability considerations,” IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4402–4413, Sept. 2013.
H. A. Omar, W. Zhuang, and L. Li, “Vemac: A tdma-based mac protocol for reliable broadcast in vanets,” IEEE Trans. Mobile Computing, vol. 12, no. 9, pp. 1724–1736, Sept. 2013.
S. Bharati and W. Zhuang, “Cah-mac: cooperative adhoc mac for vehicular networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 470–479, Sept. 2013.
S. Bharati, W. Zhuang, L. V. Thanayankizil, and F. Bai, “Link-layer cooperation based on distributed tdma mac for vehicular networks,” IEEE Trans. Veh. Technol., vol. 66, no. 7, pp. 6415–6427, Jul. 2017.
K. Abboud, H. A. Omar, and W. Zhuang, “Interworking of dsrc and cellular network technologies for v2x communications: A survey,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9457–9470, Dec. 2016.
S. Bharati and W. Zhuang, “Crb: Cooperative relay broadcasting for safety applications in vehicular networks,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9542–9553, Dec. 2016.
K. Abboud and W. Zhuang, “Stochastic analysis of a single-hop communication link in vehicular ad hoc networks,” IEEE Trans. Intell. Transportation Syst., vol. 15, no. 5, pp. 2297–2307, Oct. 2014.
H. T. Cheng, H. Shan, and W. Zhuang, “Infotainment and road safety service support in vehicular networking: From a communication perspective,” Mechanical Systems and Signal Processing, vol. 25, no. 6, pp. 2020–2038, Aug. 2011.
H. A. Omar, N. Lu, and W. Zhuang, “Wireless access technologies for vehicular network safety applications,” IEEE Network, vol. 30, no. 4, pp. 22–26, Aug. 2016.
K. Abboud and W. Zhuang, “Impact of microscopic vehicle mobility on cluster-based routing overhead in vanets,” IEEE Trans. Veh. Technol., vol. 64, no. 12, pp. 5493–5502, Dec. 2015.
S. Abdelhamid, H. Hassanein, and G. Takahara, “Vehicle as a resource (VaaR),” IEEE Netw., vol. 29, no. 1, pp. 12–17, Feb. 2015.
S. Bitam, A. Mellouk, and S. Zeadally, “VANET-cloud: A generic cloud computing model for vehicular ad hoc networks,” IEEE Wireless Commun., vol. 22, no. 1, pp. 96–102, Feb. 2015.
J. S. Choo, M. Kim, S. Pack, and G. Dan, “The software-defined vehicular cloud: A new level of sharing the road,” IEEE Veh. Technol. Mag., vol. 12, no. 2, pp. 78–88, Jun. 2017.
G. T. 22.886, “Study on enhancement of 3gpp support for 5g v2x services,” V15.1.0, Mar. 2017.
J. Ni, A. Zhang, X. Lin, and X. S. Shen, “Security, privacy, and fairness in fog-based vehicular crowdsensing,” IEEE Commun. Mag., vol. 55, no. 6, pp. 146–152, Jun. 2017.
Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Commun. Surveys & Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.
K. Zheng, H. Meng, P. Chatzimisios, L. Lei, and X. Shen, “An SMDP-based resource allocation in vehicular cloud computing systems,” IEEE Trans. Ind. Electron., vol. 62, no. 12, pp. 7920–7928, Dec. 2015.
Z. Jiang, S. Zhou, X. Guo, and Z. Niu, “Task replication for deadline-constrained vehicular cloud computing: Optimal policy, performance analysis and implications on road traffic,” IEEE Internet Things J., vol. 5, no. 1, pp. 93–107, Feb. 2018.
J. Feng, Z. Liu, C. Wu, and Y. Ji, “AVE: autonomous vehicular edge computing framework with aco-based scheduling,” IEEE Trans. Veh. Technol., vol. 66, no. 12, pp. 10660–10675, Dec. 2017.
Y. Sun, X. Guo, S. Zhou, Z. Jiang, X. Liu, and Z. Niu, “Learning-based task offloading for vehicular cloud computing systems,” in Proc. IEEE Int’l Conf. Commun. (ICC), Kansas City, MO, May 2018.
R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, “VANET security surveys,” Computer Commun., vol. 44, pp. 1–13, May 2014.
M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Vehicular Commun., vol. 1, no. 2, pp. 53–66, Apr. 2014.
L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, and W. Zhuang, “UAV relay in vanets against smart jamming with reinforcement learning,” IEEE Trans. Veh. Technol., vol. 67, no. 5, pp. 4087–4097, May 2018.
M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloud computing,” Journal of Network and Computer Applications, vol. 40, pp. 325–344, Apr. 2014.
X. Lu, X. Wan, L. Xiao, Y. Tang, and W. Zhuang, “Learning-based rogue edge detection in vanets with ambient radio signals,” in IEEE Int’l Conf. Commun. (ICC), pp. 1–6, Kansas City, MO, May 2018.
L. Xiao and X. Wan and C. Dai and X. Du and X. Chen and M. Guizani, “Security in mobile edge caching with reinforcement learning,” IEEE Wireless Communications Magazine, in press.
R. V. Kulkarni and G. K. Venayagamoorthy, “Neural network based secure media access control protocol for wireless sensor networks,” in Proc. Int’l Joint Conf. Neural Networks, pp. 3437–3444, Atlanta, GA, Jun. 2009.
Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, “A system for Denial-of-Service attack detection based on multivariate correlation analysis,” IEEE Trans. Parallel and Distributed Systems, vol. 25, no. 2, pp. 447–456, May 2013.
Y. Li, D. E. Quevedo, S. Dey, and L. Shi, “SINR-based DoS attack on remote state estimation: A game-theoretic approach,” IEEE Trans. Control of Network Systems, vol. 4, no. 3, pp. 632–642, Apr. 2016.
Y. Gwon, S. Dastangoo, C. Fossa, and H. Kung, “Competing mobile network game: Embracing anti-jamming and jamming strategies with reinforcement learning,” in Proc. IEEE Conf. Commun. and Network Security (CNS), pp. 28–36, National Harbor, MD, Oct. 2013.
M. A. Aref, S. K. Jayaweera, and S. Machuzak, “Multi-agent reinforcement learning based cognitive anti-jamming,” in Proc. IEEE Wireless Commun. and Networking Conf (WCNC), pp. 1–6, San Francisco, CA, Mar. 2017.
G. Han, L. Xiao, and H. V. Poor, “Two-dimensional anti-jamming communication based on deep reinforcement learning,” in IEEE Int’l Conf. Acoustics, Speech and Signal Processing, pp. 2087–2091, New Orleans, LA, Mar. 2017.
L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang, “PHY-layer spoofing detection with reinforcement learning in wireless networks,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10037–10047, Dec. 2016.
M. Ozay, I. Esnaola, F. T. Yarman Vural, S. R. Kulkarni, and H. V. Poor, “Machine learning methods for attack detection in the smart grid,” IEEE Trans. Neural Networks and Learning Systems, vol. 27, no. 8, pp. 1773–1786, Mar. 2015.
C. Shi, J. Liu, H. Liu, and Y. Chen, “Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT,” in Proc. ACM Int Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 1–10, Chennai, India, Jul. 2017.
M. Abu Alsheikh, S. Lin, D. Niyato, and H. P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” IEEE Commun. Surveys and Tutorials, vol. 16, no. 4, pp. 1996–2018, Apr. 2014.
J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H. Kargupta, “In-network outlier detection in wireless sensor networks,” Knowledge and Information Systems, vol. 34, no. 1, pp. 23–54, Jan. 2013.
A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Commun. Surveys and Tutorials, vol. 18, no. 2, pp. 1153–1176, Oct. 2015.
L. Xiao, Y. Li, X. Huang, and X. J. Du, “Cloud-based malware detection game for mobile devices with offloading,” IEEE Trans. Mobile Computing, vol. 16, no. 10, pp. 2742–2750, Oct. 2017.
F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine learning classifiers for mobile malware detection,” Soft Computing, vol. 20, no. 1, pp. 343–357, Jan. 2016.
L. Xiao, C. Xie, T. Chen, and H. Dai, “A mobile offloading game against smart attacks,” IEEE Access, vol. 4, pp. 2281–2291, May 2016.
L. Xiao, Q. Yan, W. Lou, G. Chen, and Y. T. Hou, “Proximity-based security techniques for mobile users in wireless networks,” IEEE Trans. Information Forensics and Security, vol. 8, no. 12, pp. 2089–2100, Oct. 2013.
N. Taherkhani and S. Pierre, “Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm,” IEEE Trans. Intelligent Transportation Systems, vol. 17, no. 11, pp. 3275–3285, Apr. 2016.
J. Grover, V. Laxmi, and M. S. Gaur, “Misbehavior detection based on ensemble learning in VANET,” in Int’l Conf. Advanced Computing, Networking and Security, pp. 602–611, Surathkal, India, Dec. 2011.
X. He, H. Dai, and P. Ning, “Improving learning and adaptation in security games by exploiting information asymmetry,” in IEEE Conf. Computer Commun. (INFOCOM), pp. 1787–1795, Hongkong, China, May 2015.
V. Mnih and K. Kavukcuoglu and D. Silver and others, “Human-level control through deep reinforcement learning,” Nature, vol. 518, no. 7540, pp. 529–533, Jan. 2015.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Xiao, L., Zhuang, W., Zhou, S., Chen, C. (2019). Introduction. In: Learning-based VANET Communication and Security Techniques. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-01731-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-01731-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01730-9
Online ISBN: 978-3-030-01731-6
eBook Packages: EngineeringEngineering (R0)