Reinforcement Learning Based PHY Authentication for VANETs

Mobile edge computing in vehicular ad hoc networks (VANETs) suffers from rogue edge attacks due to the vehicle mobility and the network scale. In this paper, we present a physical authentication scheme to resist rogue edge attackers whose goal is to send spoofing signals to attack VANETs. This authentication scheme exploits the channel states of the shared ambient radio signals of the mobile device and its serving edge such as the onboard unit during the same moving trace and applies reinforcement learning to select the authentication modes and parameters. By applying transfer learning to save the learning time and applies deep learning to further improve the authentication performance, this scheme enables mobile devices in VANETs to optimize their authentication modes and parameters without being aware of the VANET channel model, the packet generation model, and the spoofing model. We provide the convergence bound such as the mobile device utility, evaluate the computational complexity of the physical authentication scheme, and verify the analysis results via simulations. Simulation and experimental results show that this scheme improves the authentication accuracy with reduced energy consumption against rogue edge attacks.

[1]  Dijiang Huang,et al.  PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.

[2]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[3]  Sonia Aïssa,et al.  Performance modeling of message dissemination in vehicular ad hoc networks , 2010, IEEE 5th International Symposium on Wireless Pervasive Computing 2010.

[4]  Jianying Zhou,et al.  Cyber–Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem , 2014, IEEE Journal on Selected Areas in Communications.

[5]  Yiwei Thomas Hou,et al.  Proximity-Based Security Techniques for Mobile Users in Wireless Networks , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Liang Xiao,et al.  Learning-based VANET Communication and Security Techniques , 2018, Wireless Networks.

[7]  Michael I. Jordan,et al.  Is Q-learning Provably Efficient? , 2018, NeurIPS.

[8]  Xuemin Shen,et al.  DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.

[9]  Falko Dressler,et al.  Using the Right Two-Ray Model ? A Measurement-based Evaluation of PHY Models in VANETs , 2011 .

[10]  Dong Hoon Lee,et al.  A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.

[11]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[12]  Jie Xu,et al.  Transmit Optimization for Symbol-Level Spoofing , 2018, IEEE Transactions on Wireless Communications.

[13]  Zhu Han,et al.  PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead , 2018, IEEE Transactions on Wireless Communications.

[14]  Ke Zhang,et al.  Artificial Intelligence Inspired Transmission Scheduling in Cognitive Vehicular Communications and Networks , 2019, IEEE Internet of Things Journal.

[15]  Huirong Fu,et al.  A multi-priority supported medium access control in Vehicular Ad Hoc Networks , 2014, Comput. Commun..

[16]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[17]  Umberto Mengali,et al.  Channel estimation for ultra-wideband communications , 2002, IEEE J. Sel. Areas Commun..

[18]  Jian Sun,et al.  Convolutional neural networks at constrained time cost , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[19]  Liang Xiao,et al.  Active authentication with reinforcement learning based on ambient radio signals , 2017, Multimedia Tools and Applications.

[20]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[21]  Xuemin Shen,et al.  Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections , 2017, IEEE Transactions on Vehicular Technology.

[22]  Ke Zhang,et al.  Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics , 2019, IEEE Internet of Things Journal.

[23]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[24]  Nicola Laurenti,et al.  On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Liang Xiao,et al.  Learning-Based PHY-Layer Authentication for Underwater Sensor Networks , 2019, IEEE Communications Letters.

[26]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[27]  David Starobinski,et al.  A Robust Load Balancing and Routing Protocol for Intra-Car Hybrid Wired/Wireless Networks , 2019, IEEE Transactions on Mobile Computing.

[28]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[29]  Fengyuan Xu,et al.  VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet , 2014, IEEE Transactions on Vehicular Technology.

[30]  Bahram Javidi,et al.  Scale and rotation Invariant optical ID tags for automatic vehicle identification and authentication , 2005, IEEE Transactions on Vehicular Technology.

[31]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[32]  Jie Xu,et al.  Fundamental Rate Limits of Physical Layer Spoofing , 2017, IEEE Wireless Communications Letters.

[33]  Nei Kato,et al.  Effectively Collecting Data for the Location-Based Authentication in Internet of Things , 2017, IEEE Systems Journal.

[34]  Xuemin Shen,et al.  Edge Computing in Autonomous Vehicular Networks , 2019 .

[35]  Xuemin Shen,et al.  Channel-based physical layer authentication , 2014, 2014 IEEE Global Communications Conference.

[36]  Demis Hassabis,et al.  Neural Episodic Control , 2017, ICML.

[37]  Weihua Zhuang,et al.  Learning-Based Computation Offloading for IoT Devices With Energy Harvesting , 2017, IEEE Transactions on Vehicular Technology.

[38]  Bernhard Walke,et al.  IEEE 802.11s: The WLAN Mesh Standard , 2010, IEEE Wireless Communications.

[39]  Ke Zhang,et al.  Mobile-Edge Computing for Vehicular Networks: A Promising Network Paradigm with Predictive Off-Loading , 2017, IEEE Veh. Technol. Mag..

[40]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[41]  Weihua Zhuang,et al.  SDN/NFV-Empowered Future IoV With Enhanced Communication, Computing, and Caching , 2020, Proceedings of the IEEE.

[42]  Weihua Zhuang,et al.  Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals , 2018, 2018 IEEE International Conference on Communications (ICC).

[43]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.