Reinforcement Learning Empowered IDPS for Vehicular Networks in Edge Computing

As VANETs have been widely applied in various fields including entertainment and safety- related applications like autonomous driving, malicious intrusions into VANETs may lead to disastrous results. Hence, intrusion detection accuracy as well as efficiency is sensitive to the normal operation of VANETs. Regarding this, in this article we propose an architecture of IDPS for VANETs. One of the highlights of the architecture is that it applies RL throughout the architecture in order to deal with the dynamics of VANETs and to make proper decisions according to current VANETs states, aiming at high detection accuracy. On the other hand, the architecture is deployed in EC in an attempt to obtain low detection latency with high processing efficiency, since VANETs IDPS is sensitive to latency, especially for safety applications. A case study is conducted to assess the validity of the proposed VANETs IDPS in EC, with the results revealing that it holds the capacity to detect and prevent intrusion in VANETs in complex environments.

[1]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[2]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[3]  Jim X. Chen,et al.  The Evolution of Computing: AlphaGo , 2016, Comput. Sci. Eng..

[4]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[5]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[6]  Hai Jin,et al.  A VMM-based intrusion prevention system in cloud computing environment , 2013, The Journal of Supercomputing.

[7]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[8]  Neminath Hubballi,et al.  False alarm minimization techniques in signature-based intrusion detection systems: A survey , 2014, Comput. Commun..

[9]  Jun Zhang,et al.  MADIDS: a novel distributed IDS based on mobile agent , 2003, OPSR.

[10]  Tao Jiang,et al.  Intrusion detection of in-band wormholes in MANETs using advanced statistical methods , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[11]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[12]  Jie Zhang,et al.  FiWi-Enhanced Vehicular Edge Computing Networks: Collaborative Task Offloading , 2019, IEEE Vehicular Technology Magazine.

[13]  Lei Liu,et al.  TMED: A Spider-Web-Like Transmission Mechanism for Emergency Data in Vehicular Ad Hoc Networks , 2018, IEEE Transactions on Vehicular Technology.

[14]  Eyal de Lara,et al.  Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud , 2014, SIGMETRICS '14.