Deep reinforcement learning approach for autonomous vehicle systems for maintaining security and safety using LSTM-GAN

Abstract The success of autonomous vehicles ( A V h s ) depends upon the effectiveness of sensors being used and the accuracy of communication links and technologies being employed. But these sensors and communication links have great security and safety concerns as they can be attacked by an adversary to take the control of an autonomous vehicle by influencing their data. Especially during the state estimation process for monitoring of autonomous vehicles' dynamics system, these concerns require immediate and effective solution. In this paper we present a new adversarial deep reinforcement learning algorithm (NDRL) that can be used to maximize the robustness of autonomous vehicle dynamics in the presence of these attacks. In this approach the adversary tries to insert defective data to the autonomous vehicle's sensor readings so that it can disrupt the safe and optimal distance between the autonomous vehicles traveling on the road. The attacker tries to make sure that there is no more safe and optimal distance between the autonomous vehicles, thus it may lead to the road accidents. Further attacker can also add fake data in such a way that it leads to reduced traffic flow on the road. On the other hand, autonomous vehicle will try to defend itself from these types of attacks by maintaining the safe and optimal distance i.e. by minimizing the deviation so that adversary does not succeed in its mission. This attacker-autonomous vehicle action reaction can be studied through the game theory formulation with incorporating the deep learning tools. Each autonomous vehicle will use Long-Short-Term-Memory (LSTM)-Generative Adversarial Network (GAN) models to find out the anticipated distance variation resulting from its actions and input this to the new deep reinforcement learning algorithm (NDRL) which attempts to reduce the variation in distance. Whereas attacker also chooses deep reinforcement learning algorithm (NDRL) and wants to maximize the distance variation between the autonomous vehicles.

[1]  Theodore Bohn,et al.  Security concerns of a plug-in vehicle , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[2]  Jonathan P. How,et al.  Robust Opponent Modeling via Adversarial Ensemble Reinforcement Learning in Asymmetric Imperfect-Information Games , 2019, ArXiv.

[3]  David Silver,et al.  Deep Reinforcement Learning from Self-Play in Imperfect-Information Games , 2016, ArXiv.

[4]  Xin Zhang,et al.  VANET alert endorsement using multi-source filters , 2010, VANET '10.

[5]  Yi Yu,et al.  Conditional LSTM-GAN for Melody Generation from Lyrics , 2019, ACM Trans. Multim. Comput. Commun. Appl..

[6]  Walid Saad,et al.  A colonel blotto game for interdependence-aware cyber-physical systems security in smart cities , 2017, SCOPE@CPSWeek.

[7]  F. Lewis,et al.  A Unified Strategy for Solution Seeking in Graphical $N$-Coalition Noncooperative Games , 2017, IEEE Transactions on Automatic Control.

[8]  Liam Kilmartin,et al.  Intra-Vehicle Networks: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.

[9]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[10]  Mike McDonald,et al.  Car-following: a historical review , 1999 .

[11]  M. Pirani,et al.  A systems and control perspective of CPS security , 2019, Annu. Rev. Control..

[12]  Ming Li,et al.  A data trust framework for VANETs enabling false data detection and secure vehicle tracking , 2017, CNS.

[13]  Jin Cui,et al.  A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.

[14]  Jerry den Hartog,et al.  Security and privacy for innovative automotive applications: A survey , 2018, Comput. Commun..

[15]  C. Maple,et al.  Key Security Challenges for Cloud-assisted Connected and Autonomous Vehicles , 2019, Living in the Internet of Things (IoT 2019).

[16]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[17]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[18]  Zhu Han,et al.  Stackelberg Differential Game Based Charging Control of Electric Vehicles in Smart Grid , 2018, Game Theory for Networking Applications.

[19]  Yves Deswarte,et al.  Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[20]  Constantinos Antoniou,et al.  Dynamic Car–Following Model Calibration Using SPSA and ISRES Algorithms , 2018 .

[21]  Geoffrey E. Hinton,et al.  Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  Ákos Zarándy,et al.  Intraframe Scene Capturing and Speed Measurement Based on Superimposed Image: New Sensor Concept for Vehicle Speed Measurement , 2016, J. Sensors.

[23]  Stefania Santini,et al.  A collaborative approach for improving the security of vehicular scenarios: The case of platooning , 2018, Comput. Commun..

[24]  Walid Saad,et al.  Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).

[25]  Tomas Olovsson,et al.  Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[26]  Sepp Hochreiter,et al.  GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium , 2017, NIPS.

[27]  Jeffrey H. Reed,et al.  Artificial Intelligence Defined 5G Radio Access Networks , 2018, IEEE Communications Magazine.

[28]  Iftikhar Rasheed Basics of 5G , 2016 .

[29]  Dipak Ghosal,et al.  Security vulnerabilities of connected vehicle streams and their impact on cooperative driving , 2015, IEEE Communications Magazine.

[30]  Lars Grüne,et al.  Noncooperative Model Predictive Control for Affine‐Quadratic Games , 2018, PAMM.

[31]  Xiaojiang Du,et al.  Millimeter-Wave Propagation Modeling and Measurements for 5G Mobile Networks , 2019, IEEE Wireless Communications.

[32]  Naresh K. Sinha,et al.  Modern Control Systems , 1981, IEEE Transactions on Systems, Man, and Cybernetics.

[33]  Rita Cucchiara,et al.  Predicting Human Eye Fixations via an LSTM-Based Saliency Attentive Model , 2016, IEEE Transactions on Image Processing.

[34]  Fei Hu,et al.  Intelligent Vehicle Network Routing With Adaptive 3D Beam Alignment for mmWave 5G-Based V2X Communications , 2020, IEEE Transactions on Intelligent Transportation Systems.

[35]  Raj Gautam Dutta,et al.  Security of Autonomous Systems under Physical Attacks: With application to Self-Driving Cars , 2018 .

[36]  Andrey Koucheryavy,et al.  Distributed Edge Computing to Assist Ultra-Low-Latency VANET Applications , 2019, Future Internet.

[37]  D. Dowson,et al.  The Fréchet distance between multivariate normal distributions , 1982 .

[38]  Dong Hoon Lee,et al.  A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.