Secure Transmission Scheme Based on Joint Radar and Communication in Mobile Vehicular Networks

被引:52
|
作者
Yao, Yu [1 ,2 ]
Shu, Feng [2 ,3 ]
Li, Zeqing [1 ]
Cheng, Xu [4 ]
Wu, Lenan [5 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engn, Nanchang 330013, Peoples R China
[2] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[4] Sun Yat Sen Univ, Sch Elect & Commun Engn, Shenzhen 518000, Peoples R China
[5] Southeast Univ, Sch Informat Sci & Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
Radar; Vehicle dynamics; Covariance matrices; Target tracking; Millimeter wave radar; Eavesdropping; Switches; V2V communication; anti-eavesdropping; cognitive risk control; joint radar communication; multi-armed bandit; reinforcement learning; WIRELESS INFORMATION; POWER ALLOCATION;
D O I
10.1109/TITS.2023.3271452
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security and privacy since all types of possible breaches are common in connected and autonomous vehicles (CAVs) networks. As an inheritance from conventional wireless services, potential eavesdropping is one of the main threats to V2V communications. In our work, the anti-eavesdropping scheme in CAVs networks is developed through the use of cognitive risk control (CRC)-based vehicular joint radar-communication (JRC) system. In particular, the supplement of off-board measurements acquired using V2V links to the perceptual information has presented the potential to enhance the traffic target positioning precision. Then, transmission power control is performed utilizing reinforcement learning, the result of which is determined by a task switcher. Based on the threat evaluation, a multiple armed bandit problem is designed to implement the secret key switching procedure when it is needed. Through constant perception-execution loops (PELs), the security and confidentiality is improved for the authorized vehicles in their behavioral interactions with the illegal eavesdropper. Numerical experiments have presented that the developed approach has anticipated performance in terms of some risk assessment indicators.
引用
收藏
页码:10027 / 10037
页数:11
相关论文
共 50 条
  • [31] A secure communication scheme for mobile wireless sensor networks using hamming distance
    Lee, Seok-Lae
    Hwang, Bo-Sung
    Song, Joo-Seok
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 900 - +
  • [32] An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks
    Zhang, Xiaojun
    Mu, Liming
    Zhao, Jie
    Xu, Chunxiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (06): : 3280 - 3298
  • [33] Parametrization of Joint OFDM-based Radar and Communication Systems for Vehicular Applications
    Braun, Martin
    Sturm, Christian
    Niethammer, Andreas
    Jondral, Friedrich K.
    2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2009, : 3020 - 3024
  • [34] A Secure Content Sharing Scheme Based on Blockchain in Vehicular Named Data Networks
    Chen, Chen
    Wang, Cong
    Qiu, Tie
    Lv, Ning
    Pei, Qingqi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) : 3278 - 3289
  • [35] A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks
    Fan, Kai
    Pan, Qiang
    Zhang, Kuan
    Bai, Yuhan
    Sun, Shili
    Li, Hui
    Yang, Yintang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5826 - 5835
  • [36] Secure DRM scheme for future mobile networks based on trusted mobile platform
    Zheng, Y
    He, D
    Wang, HX
    Tang, XH
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1164 - 1167
  • [37] Fuzzy Logic Based Handoff Scheme for Heterogeneous Vehicular Mobile Networks
    Kim, Joonho
    Cho, Jun-Dong
    Jeong, Jongpil
    Choi, Jae-Young
    Song, Byung-hun
    Lee, Hyungsu
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 863 - 870
  • [38] Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks (Invited Paper)
    Kong, Qinglei
    Ma, Maode
    Lu, Rongxing
    2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [39] Analysis of a secure conference scheme for mobile communication
    Bao, Feng
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (08) : 1984 - 1986
  • [40] EPMOS BASED SECURE MOBILE COMMUNICATION IN LTE/SAE NETWORKS
    Prakash, Krishna
    Muniyal, Balachandra
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 101 - 105