Reinforcement Learning Empowered IDPS for Vehicular Networks in Edge Computing

被引:11
作者
Xiong, Muzhou [1 ]
Li, Yuepeng [2 ]
Gu, Lin [3 ]
Pan, Shengli [1 ]
Zeng, Deze [1 ]
Li, Peng [4 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Beijing, Peoples R China
[2] China Univ Geosci, Beijing, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Hubei, Peoples R China
[4] Univ Aizu, Aizu Wakamatsu, Fukushima, Japan
来源
IEEE NETWORK | 2020年 / 34卷 / 03期
关键词
Vehicular ad hoc networks; Task analysis; Intrusion detection; Monitoring; Servers; Computer architecture; Safety;
D O I
10.1109/MNET.011.1900321
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As VANETs have been widely applied in various fields including entertainment and safety- related applications like autonomous driving, malicious intrusions into VANETs may lead to disastrous results. Hence, intrusion detection accuracy as well as efficiency is sensitive to the normal operation of VANETs. Regarding this, in this article we propose an architecture of IDPS for VANETs. One of the highlights of the architecture is that it applies RL throughout the architecture in order to deal with the dynamics of VANETs and to make proper decisions according to current VANETs states, aiming at high detection accuracy. On the other hand, the architecture is deployed in EC in an attempt to obtain low detection latency with high processing efficiency, since VANETs IDPS is sensitive to latency, especially for safety applications. A case study is conducted to assess the validity of the proposed VANETs IDPS in EC, with the results revealing that it holds the capacity to detect and prevent intrusion in VANETs in complex environments.
引用
收藏
页码:57 / 63
页数:7
相关论文
共 14 条
  • [1] [Anonymous], ACM SIGOPS OPERATING
  • [2] [Anonymous], P IEEE MILCOM 2008
  • [3] The Evolution of Computing: AlphaGo
    Chen, Jim X.
    [J]. COMPUTING IN SCIENCE & ENGINEERING, 2016, 18 (04) : 4 - 7
  • [4] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [5] FiWi ENHANCED VEHICULAR EDGE COMPUTING NETWORKS Collaborative Computation Task Offloading
    Guo, Hongzhi
    Zhang, Jie
    Liu, Jiajia
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2019, 14 (01): : 45 - 53
  • [6] False alarm minimization techniques in signature-based intrusion detection systems: A survey
    Hubballi, Neminath
    Suryanarayanan, Vinoth
    [J]. COMPUTER COMMUNICATIONS, 2014, 49 : 1 - 17
  • [7] A VMM-based intrusion prevention system in cloud computing environment
    Jin, Hai
    Xiang, Guofu
    Zou, Deqing
    Wu, Song
    Zhao, Feng
    Li, Min
    Zheng, Weide
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 66 (03) : 1133 - 1151
  • [8] Intrusion detection system: A comprehensive review
    Liao, Hung-Jen
    Lin, Chun-Hung Richard
    Lin, Ying-Chih
    Tung, Kuang-Yuan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 16 - 24
  • [9] Human-level control through deep reinforcement learning
    Mnih, Volodymyr
    Kavukcuoglu, Koray
    Silver, David
    Rusu, Andrei A.
    Veness, Joel
    Bellemare, Marc G.
    Graves, Alex
    Riedmiller, Martin
    Fidjeland, Andreas K.
    Ostrovski, Georg
    Petersen, Stig
    Beattie, Charles
    Sadik, Amir
    Antonoglou, Ioannis
    King, Helen
    Kumaran, Dharshan
    Wierstra, Daan
    Legg, Shane
    Hassabis, Demis
    [J]. NATURE, 2015, 518 (7540) : 529 - 533
  • [10] TMED: A Spider-Web-Like Transmission Mechanism for Emergency Data in Vehicular Ad Hoc Networks
    Qiu, Tie
    Wang, Xin
    Chen, Chen
    Atiquzzaman, Mohammed
    Liu, Lei
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) : 8682 - 8694