Skip to main content

Part of the book series: Wireless Networks ((WN))

Abstract

Vehicular Ad Hoc Networks (VANETs) provides the efficient dissemination of information among the vehicles and roadside infrastructure. However, due to the high mobility of onboard units (OBUs) and the large-scale network topology, VANETs are vulnerable to attacks. In this chapter, we first review the fundamentals of VANETs in Section 1.1. Next, the type of attacks in VANETs is presented in Section 1.2, including the scope of the attack, and the impact to VANETs. We review the VANETs security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning in Section 1.3. Finally, we conclude in Section 1.4.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. W. Alasmary and W. Zhuang, “Mobility impact in ieee 802.11 p infrastructureless vehicular networks,” Ad Hoc Networks, vol. 10, no. 2, pp. 222–230, Mar. 2012.

    Google Scholar 

  2. A. Abdrabou, B. Liang, and W. Zhuang, “Delay analysis for sparse vehicular sensor networks with reliability considerations,” IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4402–4413, Sept. 2013.

    Google Scholar 

  3. H. A. Omar, W. Zhuang, and L. Li, “Vemac: A tdma-based mac protocol for reliable broadcast in vanets,” IEEE Trans. Mobile Computing, vol. 12, no. 9, pp. 1724–1736, Sept. 2013.

    Google Scholar 

  4. S. Bharati and W. Zhuang, “Cah-mac: cooperative adhoc mac for vehicular networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 470–479, Sept. 2013.

    Google Scholar 

  5. S. Bharati, W. Zhuang, L. V. Thanayankizil, and F. Bai, “Link-layer cooperation based on distributed tdma mac for vehicular networks,” IEEE Trans. Veh. Technol., vol. 66, no. 7, pp. 6415–6427, Jul. 2017.

    Article  Google Scholar 

  6. K. Abboud, H. A. Omar, and W. Zhuang, “Interworking of dsrc and cellular network technologies for v2x communications: A survey,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9457–9470, Dec. 2016.

    Google Scholar 

  7. S. Bharati and W. Zhuang, “Crb: Cooperative relay broadcasting for safety applications in vehicular networks,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9542–9553, Dec. 2016.

    Google Scholar 

  8. K. Abboud and W. Zhuang, “Stochastic analysis of a single-hop communication link in vehicular ad hoc networks,” IEEE Trans. Intell. Transportation Syst., vol. 15, no. 5, pp. 2297–2307, Oct. 2014.

    Google Scholar 

  9. H. T. Cheng, H. Shan, and W. Zhuang, “Infotainment and road safety service support in vehicular networking: From a communication perspective,” Mechanical Systems and Signal Processing, vol. 25, no. 6, pp. 2020–2038, Aug. 2011.

    Google Scholar 

  10. H. A. Omar, N. Lu, and W. Zhuang, “Wireless access technologies for vehicular network safety applications,” IEEE Network, vol. 30, no. 4, pp. 22–26, Aug. 2016.

    Article  Google Scholar 

  11. K. Abboud and W. Zhuang, “Impact of microscopic vehicle mobility on cluster-based routing overhead in vanets,” IEEE Trans. Veh. Technol., vol. 64, no. 12, pp. 5493–5502, Dec. 2015.

    Google Scholar 

  12. S. Abdelhamid, H. Hassanein, and G. Takahara, “Vehicle as a resource (VaaR),” IEEE Netw., vol. 29, no. 1, pp. 12–17, Feb. 2015.

    Google Scholar 

  13. S. Bitam, A. Mellouk, and S. Zeadally, “VANET-cloud: A generic cloud computing model for vehicular ad hoc networks,” IEEE Wireless Commun., vol. 22, no. 1, pp. 96–102, Feb. 2015.

    Google Scholar 

  14. J. S. Choo, M. Kim, S. Pack, and G. Dan, “The software-defined vehicular cloud: A new level of sharing the road,” IEEE Veh. Technol. Mag., vol. 12, no. 2, pp. 78–88, Jun. 2017.

    Article  Google Scholar 

  15. G. T. 22.886, “Study on enhancement of 3gpp support for 5g v2x services,” V15.1.0, Mar. 2017.

    Google Scholar 

  16. J. Ni, A. Zhang, X. Lin, and X. S. Shen, “Security, privacy, and fairness in fog-based vehicular crowdsensing,” IEEE Commun. Mag., vol. 55, no. 6, pp. 146–152, Jun. 2017.

    Google Scholar 

  17. Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Commun. Surveys & Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.

    Article  Google Scholar 

  18. K. Zheng, H. Meng, P. Chatzimisios, L. Lei, and X. Shen, “An SMDP-based resource allocation in vehicular cloud computing systems,” IEEE Trans. Ind. Electron., vol. 62, no. 12, pp. 7920–7928, Dec. 2015.

    Google Scholar 

  19. Z. Jiang, S. Zhou, X. Guo, and Z. Niu, “Task replication for deadline-constrained vehicular cloud computing: Optimal policy, performance analysis and implications on road traffic,” IEEE Internet Things J., vol. 5, no. 1, pp. 93–107, Feb. 2018.

    Article  Google Scholar 

  20. J. Feng, Z. Liu, C. Wu, and Y. Ji, “AVE: autonomous vehicular edge computing framework with aco-based scheduling,” IEEE Trans. Veh. Technol., vol. 66, no. 12, pp. 10660–10675, Dec. 2017.

    Google Scholar 

  21. Y. Sun, X. Guo, S. Zhou, Z. Jiang, X. Liu, and Z. Niu, “Learning-based task offloading for vehicular cloud computing systems,” in Proc. IEEE Int’l Conf. Commun. (ICC), Kansas City, MO, May 2018.

    Google Scholar 

  22. R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, “VANET security surveys,” Computer Commun., vol. 44, pp. 1–13, May 2014.

    Article  Google Scholar 

  23. M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Vehicular Commun., vol. 1, no. 2, pp. 53–66, Apr. 2014.

    Google Scholar 

  24. L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, and W. Zhuang, “UAV relay in vanets against smart jamming with reinforcement learning,” IEEE Trans. Veh. Technol., vol. 67, no. 5, pp. 4087–4097, May 2018.

    Article  Google Scholar 

  25. M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloud computing,” Journal of Network and Computer Applications, vol. 40, pp. 325–344, Apr. 2014.

    Google Scholar 

  26. X. Lu, X. Wan, L. Xiao, Y. Tang, and W. Zhuang, “Learning-based rogue edge detection in vanets with ambient radio signals,” in IEEE Int’l Conf. Commun. (ICC), pp. 1–6, Kansas City, MO, May 2018.

    Google Scholar 

  27. L. Xiao and X. Wan and C. Dai and X. Du and X. Chen and M. Guizani, “Security in mobile edge caching with reinforcement learning,” IEEE Wireless Communications Magazine, in press.

    Google Scholar 

  28. R. V. Kulkarni and G. K. Venayagamoorthy, “Neural network based secure media access control protocol for wireless sensor networks,” in Proc. Int’l Joint Conf. Neural Networks, pp. 3437–3444, Atlanta, GA, Jun. 2009.

    Google Scholar 

  29. Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, “A system for Denial-of-Service attack detection based on multivariate correlation analysis,” IEEE Trans. Parallel and Distributed Systems, vol. 25, no. 2, pp. 447–456, May 2013.

    Google Scholar 

  30. Y. Li, D. E. Quevedo, S. Dey, and L. Shi, “SINR-based DoS attack on remote state estimation: A game-theoretic approach,” IEEE Trans. Control of Network Systems, vol. 4, no. 3, pp. 632–642, Apr. 2016.

    Article  MathSciNet  Google Scholar 

  31. Y. Gwon, S. Dastangoo, C. Fossa, and H. Kung, “Competing mobile network game: Embracing anti-jamming and jamming strategies with reinforcement learning,” in Proc. IEEE Conf. Commun. and Network Security (CNS), pp. 28–36, National Harbor, MD, Oct. 2013.

    Google Scholar 

  32. M. A. Aref, S. K. Jayaweera, and S. Machuzak, “Multi-agent reinforcement learning based cognitive anti-jamming,” in Proc. IEEE Wireless Commun. and Networking Conf (WCNC), pp. 1–6, San Francisco, CA, Mar. 2017.

    Google Scholar 

  33. G. Han, L. Xiao, and H. V. Poor, “Two-dimensional anti-jamming communication based on deep reinforcement learning,” in IEEE Int’l Conf. Acoustics, Speech and Signal Processing, pp. 2087–2091, New Orleans, LA, Mar. 2017.

    Google Scholar 

  34. L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang, “PHY-layer spoofing detection with reinforcement learning in wireless networks,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10037–10047, Dec. 2016.

    Google Scholar 

  35. M. Ozay, I. Esnaola, F. T. Yarman Vural, S. R. Kulkarni, and H. V. Poor, “Machine learning methods for attack detection in the smart grid,” IEEE Trans. Neural Networks and Learning Systems, vol. 27, no. 8, pp. 1773–1786, Mar. 2015.

    Google Scholar 

  36. C. Shi, J. Liu, H. Liu, and Y. Chen, “Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT,” in Proc. ACM Int Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 1–10, Chennai, India, Jul. 2017.

    Google Scholar 

  37. M. Abu Alsheikh, S. Lin, D. Niyato, and H. P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” IEEE Commun. Surveys and Tutorials, vol. 16, no. 4, pp. 1996–2018, Apr. 2014.

    Google Scholar 

  38. J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H. Kargupta, “In-network outlier detection in wireless sensor networks,” Knowledge and Information Systems, vol. 34, no. 1, pp. 23–54, Jan. 2013.

    Google Scholar 

  39. A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Commun. Surveys and Tutorials, vol. 18, no. 2, pp. 1153–1176, Oct. 2015.

    Google Scholar 

  40. L. Xiao, Y. Li, X. Huang, and X. J. Du, “Cloud-based malware detection game for mobile devices with offloading,” IEEE Trans. Mobile Computing, vol. 16, no. 10, pp. 2742–2750, Oct. 2017.

    Article  Google Scholar 

  41. F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine learning classifiers for mobile malware detection,” Soft Computing, vol. 20, no. 1, pp. 343–357, Jan. 2016.

    Article  Google Scholar 

  42. L. Xiao, C. Xie, T. Chen, and H. Dai, “A mobile offloading game against smart attacks,” IEEE Access, vol. 4, pp. 2281–2291, May 2016.

    Google Scholar 

  43. L. Xiao, Q. Yan, W. Lou, G. Chen, and Y. T. Hou, “Proximity-based security techniques for mobile users in wireless networks,” IEEE Trans. Information Forensics and Security, vol. 8, no. 12, pp. 2089–2100, Oct. 2013.

    Article  Google Scholar 

  44. N. Taherkhani and S. Pierre, “Centralized and localized data congestion control strategy for vehicular ad hoc networks using a machine learning clustering algorithm,” IEEE Trans. Intelligent Transportation Systems, vol. 17, no. 11, pp. 3275–3285, Apr. 2016.

    Google Scholar 

  45. J. Grover, V. Laxmi, and M. S. Gaur, “Misbehavior detection based on ensemble learning in VANET,” in Int’l Conf. Advanced Computing, Networking and Security, pp. 602–611, Surathkal, India, Dec. 2011.

    Google Scholar 

  46. X. He, H. Dai, and P. Ning, “Improving learning and adaptation in security games by exploiting information asymmetry,” in IEEE Conf. Computer Commun. (INFOCOM), pp. 1787–1795, Hongkong, China, May 2015.

    Google Scholar 

  47. V. Mnih and K. Kavukcuoglu and D. Silver and others, “Human-level control through deep reinforcement learning,” Nature, vol. 518, no. 7540, pp. 529–533, Jan. 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Xiao, L., Zhuang, W., Zhou, S., Chen, C. (2019). Introduction. In: Learning-based VANET Communication and Security Techniques. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-01731-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01731-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01730-9

  • Online ISBN: 978-3-030-01731-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics