Contact us


        学院办公室:58908536

    学生工作办公室:58909422

              58909423

研究生工作办公室:58908212

MBA教育中心:58908589(招生咨询)

       EEP教育中心:58902822

【论文】贺娅洁,孔孟蕾,杜春姗,姚丁一,于淼:《Communication Security Analysis of Intelligent Transportation System Using 5G Internet of Things from the Perspective of Big Data》

2022-12-23  Clicks:

贺娅洁,孔孟蕾,杜春姗,姚丁一,于淼 :《Communication Security Analysis of Intelligent Transportation System Using 5G Internet of Things from the Perspective of Big Data》,刊发于《IEEE Transactions on Intelligent Transportation Systems》2022年3月。

摘要:

The transportation system has entered the era of 5G intelligent Internet of things (IoT), which can realize the comprehensive monitoring, perception, and intelligent decision-making of people, vehicles, roads, and the environment. The purpose is to solve the problems in the communication security of intelligent transportation system (ITS) and improve the vulnerability of traditional distributed architecture. The security issues of the Internet of vehicles (IoV) in 5G environment are analyzed from the perspective of big data. An access control mechanism based on risk prediction is proposed aiming at the problems existing in the node access control process. A Wasserstein Distance based Combined Generative Adversarial Network (WCGAN) is proposed. It modifies the loss function to solve the gradient dis appearance problem, and a combination of multiple generators is designed to solve the pattern collapse. The simulation experiment is carried out on the dataset of the intrusion detection evaluation project. The WCGAN model has the smallest prediction error than the other models regarding the node packet transmission rate. Its loss value is close to 0 after 10 iterations, while the loss value of the BP neural network (BPNN) is about 0.28. The prediction accuracy of the WCGAN model can reach 86.3% when the training set is 5000, which is much higher than that of BPNN (77.8%). The reason is that the WCGAN model increases the number of generators according to GAN, which improves the low accuracy caused by pattern collapse. The IoT-based ITS can implement corresponding strategies according to the prediction results and control the access rights of nodes, thus ensuring the security of information resources effectively. The research content reduces the communication delay under ensuring the integrity and confidentiality of information in the process of data transmission, and provides a reference for ensuring the safe communication of IoV.

上一条:【论文】丛颖男,王兆毓,朱金清:《关于法律人工智能数据和算法问题的若干思考》
下一条:【论文】晋鑫,孔孟蕾,胡继晔,邓晓,于淼:《Supply Chain Joint Scheduling and Algorithm Using Continuity of Nonlinear Differential Equation Function》

Close