Reinforcement learning in VANET penetration testing

Phillip Garrad, Saritha Unnikrishnan

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The recent popularity of Connected and Autonomous Vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks are instigated by white-coat hackers, and cyber-criminals. As Connected Vehicles move towards full autonomy the impact of these cyber-attacks also grows. The current research highlights challenges faced in cybersecurity testing of CAV, including access, the cost of representative test setup and the lack of experts in the field. Possible solutions of how these challenges can be overcome are reviewed and discussed. From these findings a software simulated Vehicular Ad Hoc NETwork (VANET) is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects, in penetration testing in other industries. In this research a Reinforcement Learning model, called Q-Learning, is applied to automate the software simulation. The expectation from this implementation is to see improvements in runtime and efficiency for the VANET model. The results show this approach to be promising and using AI in penetration testing for VANET to improve efficiency in most cases. Each case is reviewed in detail before discussing possible ways to improve the implementation and get a truer reflection of the real-world application.

Original languageEnglish
Article number100970
JournalResults in Engineering
Volume17
DOIs
Publication statusPublished - Mar 2023

Keywords

  • Artificial intelligence
  • Connected vehicles
  • Cybersecurity
  • Penetration testing
  • Software simulation

Fingerprint

Dive into the research topics of 'Reinforcement learning in VANET penetration testing'. Together they form a unique fingerprint.

Cite this