共 6 条
Smart Cities and Transportation Based Vehicle-To-Vehicle Communication and Cyber Security Analysis Using Machine Learning Model in 6G Network
被引:1
|作者:
Kong, Shurui
[1
]
Wang, Kemeng
[1
]
Feng, Caiying
[1
]
Wang, Junjie
[2
]
机构:
[1] Shangqiu Inst Technol, Sch Informat & Elect Engn, Shangqiu 476000, Hennan, Peoples R China
[2] Hanliang Middle Sch, Shangqiu 476000, Hennan, Peoples R China
关键词:
Vehicle to Vehicle Communication;
Smart City Transportation;
Cyber-Physical Systems;
Machine Learning Model;
6G Networks;
D O I:
10.1007/s11277-024-11183-3
中图分类号:
TN [电子技术、通信技术];
学科分类号:
0809 ;
摘要:
Increasing number of sensor-centric communication and computer equipment installed inside cars for various purposes, such as vehicle monitoring, physical wiring reduction, driving efficiency, has made in-vehicle communication an essential part of today's driving environment. However, the relevant literature on cyber security for in-vehicle communication systems does not currently offer any targeted, workable solutions for in-vehicle cyber hazards. Current solutions usually rely on protocol-specific security techniques rather than providing a comprehensive security framework for in-vehicle communication. Cyber-physical systems (CPSs) are emergent systems that use a cyber-communication infrastructure to enable efficient real-time control and collaboration (C&C) of physical components, such as actuators, sensors, control systems, and the surrounding environment. This study analyses how smart cities are transported using machine learning models in 6G networks to analyse cyber security through vehicle-to-vehicle communication. In this case, vehicle-to-vehicle communication uses 6G networks that are built on the Internet of Things. Subsequently, reinforcement quantile spatial convolutional neural networks (RQSCNN) are used to perform the cyber security analysis. Throughput, Quality of Service (QoS), latency, computational cost, data transfer rate are all considered in experimental investigation. As a result, the suggested model can be applied in high-speed, high-throughput internal communication contexts of automobiles and accurately characterise both the nature and presence or absence of attacks.
引用
收藏
页数:19
相关论文