论文标题

5G启用了自动驾驶汽车的移动边缘计算安全性

5G enabled Mobile Edge Computing security for Autonomous Vehicles

论文作者

D'Costa, Daryll Ralph, Abbas, Robert

论文摘要

通过部署5G通信基础设施,世界正在进入一个新时代。许多新的开发项目以这项技术为中心。这样的进步是5G沟通的5G工具。该技术可用于应用程序,例如无人驾驶交付的商品,即时对紧急情况的响应以及提高交通效率。智能运输系统(ITS)的概念围绕着完全自治的系统构建。本文研究了通过5G网络进行的分布式拒绝服务(DDOS)攻击,并分析了安全攻击,尤其是DDOS攻击。目的是实施能够对不同类型的DDOS攻击进行分类并预测5G潜伏期的质量的机器学习模型。实现的初始步骤涉及将5G参数添加到数据集中。随后,数据被标记为编码,并且对少数族裔类进行了超采样以匹配其他类别。最后,随着培训和测试的使用,将数据分开,并应用了机器学习模型。尽管该论文产生了预测DDOS攻击的模型,但该数据集获得了明显缺乏相关信息。此外,5G分类模型需要进行更多修改。该研究基于模拟环境中的很大程度上定量研究方法。因此,这项研究的最大限制是缺乏资源来收集数据,并且唯一依赖在线数据集。理想情况下,所有设备(V2X)项目的车辆将从启用与移动边缘云连接的自动驾驶5G的车辆中受益匪浅。但是,该项目仅在单个PC上在线进行,这进一步限制了结果。尽管模型表现不佳,但本文可以用作智能运输系统开发中未来研究的框架。

The world is moving into a new era with the deployment of 5G communication infrastructure. Many new developments are deployed centred around this technology. One such advancement is 5G Vehicle to Everything communication. This technology can be used for applications such as driverless delivery of goods, immediate response to emergencies and improving traffic efficiency. The concept of Intelligent Transport Systems (ITS) is built around this system which is completely autonomous. This paper studies the Distributed Denial of Service (DDoS) attack carried out over a 5G network and analyses security attacks, particularly the DDoS attack. The aim is to implement a machine learning model capable of classifying different types of DDoS attacks and predicting the quality of 5G latency. The initial steps of implementation involved the synthetic addition of 5G parameters into the dataset. Subsequently, the data was label encoded, and minority classes were oversampled to match the other classes. Finally, the data was split as training and testing, and machine learning models were applied. Although the paper resulted in a model that predicted DDoS attacks, the dataset acquired significantly lacked 5G related information. Furthermore, the 5G classification model needed more modification. The research was based on largely quantitative research methods in a simulated environment. Hence, the biggest limitation of this research has been the lack of resources for data collection and sole reliance on online data sets. Ideally, a Vehicle to Everything (V2X) project would greatly benefit from an autonomous 5G enabled vehicle connected to a mobile edge cloud. However, this project was conducted solely online on a single PC which further limits the outcomes. Although the model underperformed, this paper can be used as a framework for future research in Intelligent Transport System development.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源