Abstract
The development of advanced Intelligent Transportation Systems has been made possible by the rapid expansion of autonomous vehicles (AVs) and networking technology (ITS). The in-vehicle users' increased data needs from AVs put the vehicle's trajectory data in danger and make it more susceptible to security threats. In this paper, Autonomous vehicles (AVs) transform the intelligent transportation system by exchanging real-time and seamless data with other AVs and the network (ITS). Transportation that is automated has many advantages for people. However, worries about safety, security, and privacy continue to grow. The AVs need to exchange sensory data with other AVs and with their own for navigation and trajectory planning. When an unreliable sensor-equipped AV or one that is malicious enters connectivity in such circumstances, the results could be disruptive. To effectively detect anomalies and mitigate cyberattacks in AVs, this study suggests the Efficient Anomaly Detection (EAD) method. The EAD technique finds and isolates rogue AVs using the Multi-Agent Reinforcement Learning (MARL) algorithm, which operates over the 6G network to thwart modern cyberattacks and provide a quick and accurate anomaly detection mechanism. The expected outcomes demonstrate the value of EAD and have an accuracy rate that is 8.01% greater than that of the current systems.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Mehran University Research Journal of Engineering and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.