Secure Transmission Scheme Based on Joint Radar and Communication in Mobile Vehicular Networks

被引:52
|
作者
Yao, Yu [1 ,2 ]
Shu, Feng [2 ,3 ]
Li, Zeqing [1 ]
Cheng, Xu [4 ]
Wu, Lenan [5 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engn, Nanchang 330013, Peoples R China
[2] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[4] Sun Yat Sen Univ, Sch Elect & Commun Engn, Shenzhen 518000, Peoples R China
[5] Southeast Univ, Sch Informat Sci & Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
Radar; Vehicle dynamics; Covariance matrices; Target tracking; Millimeter wave radar; Eavesdropping; Switches; V2V communication; anti-eavesdropping; cognitive risk control; joint radar communication; multi-armed bandit; reinforcement learning; WIRELESS INFORMATION; POWER ALLOCATION;
D O I
10.1109/TITS.2023.3271452
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security and privacy since all types of possible breaches are common in connected and autonomous vehicles (CAVs) networks. As an inheritance from conventional wireless services, potential eavesdropping is one of the main threats to V2V communications. In our work, the anti-eavesdropping scheme in CAVs networks is developed through the use of cognitive risk control (CRC)-based vehicular joint radar-communication (JRC) system. In particular, the supplement of off-board measurements acquired using V2V links to the perceptual information has presented the potential to enhance the traffic target positioning precision. Then, transmission power control is performed utilizing reinforcement learning, the result of which is determined by a task switcher. Based on the threat evaluation, a multiple armed bandit problem is designed to implement the secret key switching procedure when it is needed. Through constant perception-execution loops (PELs), the security and confidentiality is improved for the authorized vehicles in their behavioral interactions with the illegal eavesdropper. Numerical experiments have presented that the developed approach has anticipated performance in terms of some risk assessment indicators.
引用
收藏
页码:10027 / 10037
页数:11
相关论文
共 50 条
  • [41] Overlay Ring Based Secure Group Communication Scheme for Mobile Agents
    Jang, Hyunsu
    Ko, Kwang Sun
    Jung, Young-woo
    Eom, Young Ik
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 302 - +
  • [42] RSSI and Public Key Infrastructure based Secure Communication in Autonomous Vehicular Networks
    Balan, K.
    Khan, A. S.
    Julaihi, A. A.
    Tarmizi, S.
    Pillay, K. S.
    Abdulrazak, L. F.
    Sallehudin, H.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (12) : 298 - 304
  • [43] IEEE 802.11ad-Based Radar: An Approach to Joint Vehicular Communication-Radar System
    Kumari, Preeti
    Choi, Junil
    Gonzalez-Prelcic, Nuria
    Heath, Robert W., Jr.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (04) : 3012 - 3027
  • [44] Perceptive Mobile Networks: Cellular Networks With Radio Vision via Joint Communication and Radar Sensing
    Zhang, J. Andrew
    Rahman, Md. Lushanur
    Huang, Xiaojing
    Chen, Shanzhi
    Guo, Yingjie Jay
    Heath, Robert W., Jr.
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2021, 16 (02): : 20 - 30
  • [45] An Efficient Cross-Layer Authentication Scheme for Secure Communication in Vehicular Ad-Hoc Networks
    Shawky, Mahmoud A.
    Bottarelli, Mirko
    Epiphaniou, Gregory
    Karadimas, Petros
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (07) : 8738 - 8754
  • [46] Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks
    Chung, Youngseok
    Choi, Seokjin
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT IV, 2016, 9789 : 289 - 301
  • [47] Secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    COMPUTER COMMUNICATIONS, 2008, 31 (12) : 2803 - 2814
  • [48] Secure Transmission in Integrated Communication-Radar Systems
    Yang, Lanxin
    Wang, Mingjing
    Bai, Yechao
    Lou, Mengting
    Tang, Lan
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 4102 - 4113
  • [49] R-Comm: A Traffic Based Approach for Joint Vehicular Radar-Communication
    Singh, Rohit
    Saluja, Deepak
    Kumar, Suman
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2022, 7 (01): : 83 - 92
  • [50] Secure Lattice-Based Aggregate Signature Scheme for Vehicular Ad Hoc Networks
    Prajapat, Sunil
    Gautam, Deepika
    Kumar, Pankaj
    Jangirala, Srinivas
    Das, Ashok Kumar
    Park, Youngho
    Lorenz, Pascal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 12370 - 12384