Artificial intelligence (AI) empowered anomaly detection for autonomous vehicles in 6G-V2X

IF 0.6 Q3 ENGINEERING, MULTIDISCIPLINARY Mehran University Research Journal of Engineering and Technology Pub Date : 2023-07-21 DOI:10.22581/muet1982.2303.09
Irfan Ali Kandhro, F. Ali, Ali Orangzeb Panhwar, Raja Sohail Ahmed Larik, Kanwal Fatima
{"title":"Artificial intelligence (AI) empowered anomaly detection for autonomous vehicles in 6G-V2X","authors":"Irfan Ali Kandhro, F. Ali, Ali Orangzeb Panhwar, Raja Sohail Ahmed Larik, Kanwal Fatima","doi":"10.22581/muet1982.2303.09","DOIUrl":null,"url":null,"abstract":"The development of advanced Intelligent Transportation Systems has been made possible by the rapid expansion of autonomous vehicles (AVs) and networking technology (ITS). The in-vehicle users' increased data needs from AVs put the vehicle's trajectory data in danger and make it more susceptible to security threats. In this paper, Autonomous vehicles (AVs) transform the intelligent transportation system by exchanging real-time and seamless data with other AVs and the network (ITS). Transportation that is automated has many advantages for people. However, worries about safety, security, and privacy continue to grow. The AVs need to exchange sensory data with other AVs and with their own for navigation and trajectory planning. When an unreliable sensor-equipped AV or one that is malicious enters connectivity in such circumstances, the results could be disruptive. To effectively detect anomalies and mitigate cyberattacks in AVs, this study suggests the Efficient Anomaly Detection (EAD) method. The EAD technique finds and isolates rogue AVs using the Multi-Agent Reinforcement Learning (MARL) algorithm, which operates over the 6G network to thwart modern cyberattacks and provide a quick and accurate anomaly detection mechanism. The expected outcomes demonstrate the value of EAD and have an accuracy rate that is 8.01% greater than that of the current systems.","PeriodicalId":44836,"journal":{"name":"Mehran University Research Journal of Engineering and Technology","volume":" ","pages":""},"PeriodicalIF":0.6000,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mehran University Research Journal of Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22581/muet1982.2303.09","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

The development of advanced Intelligent Transportation Systems has been made possible by the rapid expansion of autonomous vehicles (AVs) and networking technology (ITS). The in-vehicle users' increased data needs from AVs put the vehicle's trajectory data in danger and make it more susceptible to security threats. In this paper, Autonomous vehicles (AVs) transform the intelligent transportation system by exchanging real-time and seamless data with other AVs and the network (ITS). Transportation that is automated has many advantages for people. However, worries about safety, security, and privacy continue to grow. The AVs need to exchange sensory data with other AVs and with their own for navigation and trajectory planning. When an unreliable sensor-equipped AV or one that is malicious enters connectivity in such circumstances, the results could be disruptive. To effectively detect anomalies and mitigate cyberattacks in AVs, this study suggests the Efficient Anomaly Detection (EAD) method. The EAD technique finds and isolates rogue AVs using the Multi-Agent Reinforcement Learning (MARL) algorithm, which operates over the 6G network to thwart modern cyberattacks and provide a quick and accurate anomaly detection mechanism. The expected outcomes demonstrate the value of EAD and have an accuracy rate that is 8.01% greater than that of the current systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
人工智能(AI)增强了6G-V2X自动驾驶汽车的异常检测能力
自动驾驶汽车(AV)和网络技术(ITS)的快速发展使先进的智能交通系统的发展成为可能。车载用户对AV数据需求的增加使车辆的轨迹数据处于危险之中,并使其更容易受到安全威胁。在本文中,自动驾驶汽车(AV)通过与其他自动驾驶汽车和网络(ITS)交换实时无缝的数据来改造智能交通系统。自动化交通对人们有很多好处。然而,对安全、安保和隐私的担忧仍在继续。AV需要与其他AV以及它们自己的AV交换感官数据,以进行导航和轨迹规划。当配备不可靠传感器的AV或恶意AV在这种情况下进入连接时,结果可能会造成破坏。为了有效地检测AV中的异常并减轻网络攻击,本研究提出了高效异常检测(EAD)方法。EAD技术使用多代理强化学习(MARL)算法发现并隔离流氓AV,该算法在6G网络上运行,以挫败现代网络攻击,并提供快速准确的异常检测机制。预期结果证明了EAD的价值,准确率比当前系统高8.01%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
76
审稿时长
40 weeks
期刊最新文献
Heat transfer augmentation through engine oil-based hybrid nanofluid inside a trapezoid cavity Sustainable natural dyeing of cellulose with agricultural medicinal plant waste, new shades development with nontoxic sustainable elements Fabrication of low-cost and environmental-friendly EHD printable thin film nanocomposite triboelectric nanogenerator using household recyclable materials Compositional analysis of dark colored particulates homogeneously emitted with combustion gases (dark plumes) from brick making kilns situated in the area of Khyber Pakhtunkhwa, Pakistan Biosorption studies on arsenic (III) removal from industrial wastewater by using fixed and fluidized bed operation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1