2020
DOI: 10.1109/tvt.2020.2967026
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcement Learning Based PHY Authentication for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 78 publications
(31 citation statements)
references
References 38 publications
0
23
0
Order By: Relevance
“…Recently, some solutions based on trust, certificates and physical identity authentication have been proposed to deal with GPS spoofing in the VANETs. They applies deep reinforcement learning (RL) to optimize the authentication policy, 17 which effectively solve the problem of limited computing resources, and is suitable for edge computing in many mobile ad hoc networks. However, due to the continuous expansion of the application area of the UAV, the adjustment of parameters can only target a specific business environment, there is no uniform standard for designing and evaluating an authentication model based on RL.…”
Section: Methods Based On Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, some solutions based on trust, certificates and physical identity authentication have been proposed to deal with GPS spoofing in the VANETs. They applies deep reinforcement learning (RL) to optimize the authentication policy, 17 which effectively solve the problem of limited computing resources, and is suitable for edge computing in many mobile ad hoc networks. However, due to the continuous expansion of the application area of the UAV, the adjustment of parameters can only target a specific business environment, there is no uniform standard for designing and evaluating an authentication model based on RL.…”
Section: Methods Based On Cryptographymentioning
confidence: 99%
“…In practice, only observed values with measurement errors can be obtained, let d𝜏 om = ΔT oAm − NT rm , and according to the nonlinear measurement equation in Equation ( 5), thus we can obtain the Equation (17).…”
Section: Single Uavmentioning
confidence: 99%
“…For performance evaluation of suggested system and for comparison with existing systems, we utilized the software simulator tool named NS-2 [51]; in Table 2, the suggested system is evaluated with different significant challenges such as CH duration, Average, Stability convergence, cluster member, control overhand by speed and vehicle, energy consumption and throughput of various parameters. Secure Stable-CA [51][52][53][54][55][56][57] and Moth-Flame-CA [58] were used to perform the comparison of stab Trust. Once the operation on different elements of trust, the value of stab Trust is between 0.0 to 1.0.…”
Section: Experimental and Evaluationmentioning
confidence: 99%
“…It facilitates light weightiness communication authentication and vehicle animosity and resists any attack on the data centre. In [ 25 , 26 ], proposed a mechanism for authentication based on edge computing-based smart grid blockchains. This mechanism provides reasonable assistance and security.…”
Section: Related Workmentioning
confidence: 99%