2022
DOI: 10.1109/tits.2022.3198507
|View full text |Cite
|
Sign up to set email alerts
|

Toward Attack-Resistant Route Mutation for VANETs: An Online and Adaptive Multiagent Reinforcement Learning Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“…Later, the route mutation was exploited in defending the DDoS attack in the vehicle ad hoc network (VANET). For example, Zhang et al proposed a hierarchical routing scheme-based route mutation by choosing a neighbored grid in the communication area in VANET [37]. Te mutation is realized by the multi-agent reinforcement learning based on the observation of nodes in the Markov process.…”
Section: Mtdmentioning
confidence: 99%
See 3 more Smart Citations
“…Later, the route mutation was exploited in defending the DDoS attack in the vehicle ad hoc network (VANET). For example, Zhang et al proposed a hierarchical routing scheme-based route mutation by choosing a neighbored grid in the communication area in VANET [37]. Te mutation is realized by the multi-agent reinforcement learning based on the observation of nodes in the Markov process.…”
Section: Mtdmentioning
confidence: 99%
“…However, those solutions have insufciency in defense against the crossfre attack as follows. (a) Defenses in VANET [37,38] are designed based on ad hoc routes that are suitable for general networks. (b) Te solutions [36][37][38] have not mentioned how to identify the links or hosts under attack.…”
Section: Mtdmentioning
confidence: 99%
See 2 more Smart Citations
“…7 Some researchers have focused on the significance of security. [8][9][10] They have proposed various security strategies for V2X communications using cryptography, 11,12 fuzzy and other traditional security considerations. 13 However, these considerations can either defend against external attacks using authentication or achieve passive defensive strategies like anomaly node detecting.…”
Section: Introductionmentioning
confidence: 99%