Secure Transmission Scheme Based on Joint Radar and Communication in Mobile Vehicular Networks

被引:59
作者
Yao, Yu [1 ,2 ]
Shu, Feng [2 ,3 ]
Li, Zeqing [1 ]
Cheng, Xu [4 ]
Wu, Lenan [5 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engn, Nanchang 330013, Peoples R China
[2] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[4] Sun Yat Sen Univ, Sch Elect & Commun Engn, Shenzhen 518000, Peoples R China
[5] Southeast Univ, Sch Informat Sci & Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
Radar; Vehicle dynamics; Covariance matrices; Target tracking; Millimeter wave radar; Eavesdropping; Switches; V2V communication; anti-eavesdropping; cognitive risk control; joint radar communication; multi-armed bandit; reinforcement learning; WIRELESS INFORMATION; POWER ALLOCATION;
D O I
10.1109/TITS.2023.3271452
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security and privacy since all types of possible breaches are common in connected and autonomous vehicles (CAVs) networks. As an inheritance from conventional wireless services, potential eavesdropping is one of the main threats to V2V communications. In our work, the anti-eavesdropping scheme in CAVs networks is developed through the use of cognitive risk control (CRC)-based vehicular joint radar-communication (JRC) system. In particular, the supplement of off-board measurements acquired using V2V links to the perceptual information has presented the potential to enhance the traffic target positioning precision. Then, transmission power control is performed utilizing reinforcement learning, the result of which is determined by a task switcher. Based on the threat evaluation, a multiple armed bandit problem is designed to implement the secret key switching procedure when it is needed. Through constant perception-execution loops (PELs), the security and confidentiality is improved for the authorized vehicles in their behavioral interactions with the illegal eavesdropper. Numerical experiments have presented that the developed approach has anticipated performance in terms of some risk assessment indicators.
引用
收藏
页码:10027 / 10037
页数:11
相关论文
共 39 条
[1]  
[Anonymous], 2019, 37885 TR 3GPP, P1
[2]  
[Anonymous], 2010, MIMO OFDM WIRELESS C
[3]   Finite-time analysis of the multiarmed bandit problem [J].
Auer, P ;
Cesa-Bianchi, N ;
Fischer, P .
MACHINE LEARNING, 2002, 47 (2-3) :235-256
[4]   Tools and Methodologies for Autonomous Driving Systems [J].
Bhat, Anand ;
Aoki, Shunsuke ;
Rajkumar, Ragunathan .
PROCEEDINGS OF THE IEEE, 2018, 106 (09) :1700-1716
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]   A Security Credential Management System for V2X Communications [J].
Brecht, Benedikt ;
Therriault, Dean ;
Weimerskirch, Andre ;
Whyte, William ;
Kumar, Virendra ;
Hehn, Thorsten ;
Goudy, Roy .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (12) :3850-3871
[7]   Spread Spectrum-Coded OFDM Chirp Waveform Diversity Design [J].
Cheng, Sheng-Juan ;
Wang, Wen-Qin ;
Shao, Huai-Zong .
IEEE SENSORS JOURNAL, 2015, 15 (10) :5694-5700
[8]   Design Guidelines for Information-Centric Connected and Autonomous Vehicles [J].
Coutinho, Rodolfo W. L. ;
Boukerche, Azzedine ;
Loureiro, Antonio A. F. .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (10) :85-91
[9]   Optimal Power Allocation and Scheduling Under Jamming Attacks [J].
D'Oro, Salvatore ;
Ekici, Eylem ;
Palazzo, Sergio .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) :1310-1323
[10]   A Cognitive Advanced Driver Assistance Systems Architecture for Autonomous-Capable Electrified Vehicles [J].
Divakarla, Kavya Prabha ;
Emadi, Ali ;
Razavi, Saiedeh .
IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, 2019, 5 (01) :48-58