Loading…

Authentication of Vehicles and Road Side Units in Intelligent Transportation System

Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents, economically damaging traffic jams, hijacking, motivating to wrong routes, and financial losses for businesses and governments. Smart and autonomous vehicles are connected wirelessly, which are...

Full description

Saved in:
Bibliographic Details
Published in:Computers, materials & continua materials & continua, 2020, Vol.64 (1), p.359-371
Main Authors: Waqas, Muhammad, Tu, Shanshan, Ur Rehman, Sadaqat, Halim, Zahid, Anwar, Sajid, Abbas, Ghulam, Haq Abbas, Ziaul, Ur Rehman, Obaid
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents, economically damaging traffic jams, hijacking, motivating to wrong routes, and financial losses for businesses and governments. Smart and autonomous vehicles are connected wirelessly, which are more attracted for attackers due to the open nature of wireless communication. One of the problems is the rogue attack, in which the attacker pretends to be a legitimate user or access point by utilizing fake identity. To figure out the problem of a rogue attack, we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state information of the communication link. We consider the communication link between vehicle-tovehicle, and vehicle-to-infrastructure. We evaluate the performance of our proposed technique by measuring the rogue attack probability, false alarm rate (FAR), misdetection rate (MDR), and utility function of a receiver based on the test threshold values of reinforcement learning algorithm. The results show that the FAR and MDR are decreased significantly by selecting an appropriate threshold value in order to improve the receiver’s utility.
ISSN:1546-2226
1546-2218
1546-2226
DOI:10.32604/cmc.2020.09821