You are on page 1of 16

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

Future Intelligent and Secure


Vehicular Network Toward
6G: Machine-Learning
Approaches

By F ENGXIAO TANG , Member IEEE, Y UICHI K AWAMOTO , Member IEEE,


N EI K ATO , Fellow IEEE, AND J IAJIA L IU , Senior Member IEEE

ABSTRACT | As a powerful tool, the vehicular network has been KEYWORDS | 6G; deep learning; intelligent radio (IR); intelli-
built to connect human communication and transportation gentization; Internet of Vehicles (IoV); machine learning (ML);
around the world for many years to come. However, with the resource allocation; routing; security; space–air–ground; traffic
rapid growth of vehicles, the vehicular network becomes het- control; vehicle-to-everything (V2X); vehicle-to-vehicle (V2V);
erogeneous, dynamic, and large scaled, which makes it difficult vehicular network.
to meet the strict requirements, such as ultralow latency, high
reliability, high security, and massive connections of the next-
I. I N T R O D U C T I O N
generation (6G) network. Recently, machine learning (ML) has
emerged as a powerful artificial intelligence (AI) technique After the fifth-generation (5G) network is competitively
to make both the vehicle and wireless communication highly deployed around the world, the artificial intelligence (AI)-
efficient and adaptable. Naturally, employing ML into vehicular enabled next-generation (6G) network will be proposed
communication and network becomes a hot topic and is being for future evolution of network intelligentization [1].
widely studied in both academia and industry, paving the way Recently, the new generation vehicle-related works, such
for the future intelligentization in 6G vehicular networks. In this as autonomous driving, cooperative vehicular networks,
article, we provide a survey on various ML techniques applied Internet of Vehicles (IoV) [2], vehicular ad hoc networks
to communication, networking, and security parts in vehicular (VANETs), air-to-ground (A2G) networks, and space–air–
networks and envision the ways of enabling AI toward a future ground integrated networks (SAGINs) [3], have attracted
6G vehicular network, including the evolution of intelligent considerable attention from researchers in both academia
radio (IR), network intelligentization, and self-learning with and industry [4]. The AI-enabled future vehicular network
proactive exploration. that benefited from those vehicle-related works paves the
way for future intelligent transport system (ITS) and intel-
ligent vehicle-to-everything (V2X) communications in 6G.
Manuscript received June 12, 2019; revised October 14, 2019; accepted The 6G vehicular network aims to develop a highly
November 17, 2019. (Corresponding author: Fengxiao Tang.)
dynamic and intelligent system, which enables the net-
F. Tang, Y. Kawamoto, and N. Kato are with the Graduate School of
Information Sciences (GSIS), Tohoku University, Sendai 980-8579, Japan (e-mail: works to change the environment to satisfy various appli-
fengxiao.tang@it.is.tohoku.ac.jp; youpsan@it.is.tohoku.ac.jp; cation requirements and service types, such as enhanced
kato@it.is.tohoku.ac.jp).
J. Liu is with the School of Cyberspace Security, Northwestern Polytechnical mobile broadband (eMBB), ultrareliable and low-latency
University, Xi’an 710072, China (e-mail: liujiajia@nwpu.edu.cn). communications (uRLLCs), and massive machine-type
Digital Object Identifier 10.1109/JPROC.2019.2954595 communications (mMTC) adaptively. As shown in Fig. 1,

0018-9219 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

P ROCEEDINGS OF THE IEEE 1


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

intelligentization and propose some open issues of evolv-


ing the conventional vehicular network toward 6G from
CR to IR, from virtualization to intelligentization, and
from reactive to proactive. We organize the ML-enabled
evolution for vehicular networks in terms of communica-
tion, networking, and security aspects. In the first part,
we illustrate the current state and emerging challenges
of vehicular networks. Then, the potential ML-technology-
based intelligent solutions for 6G vehicular networks
are surveyed individually for conquering the mentioned
challenges in communication, networking, and security
aspects. To guide the possible research directions, we high-
light some open research issues and challenges in the final
part. The summarized flow of this article is shown in Fig. 2.
The remainder of this article is organized as follows.
Section II surveys the state and challenges of communi-
Fig. 1. Architecture of the heterogeneous vehicular network in 6G.
cation, networking, and security in vehicular networks.
In Section III, we describe the applications of ML in the
vehicular network for solving communication challenges.
there are various evolutions that should be addressed. Then, we investigate the ML-based approaches and pro-
Different from conventional vehicular networks that pose open research issues for intelligent vehicular network-
mainly focus on vehicle-to-vehicle (V2V) and vehicle-to- ing of resource allocation and traffic control in Section IV.
infrastructure (V2I) communications, the 6G vehicular The survey and the open issue of ML for vehicular network
network has been constructed with better heterogeneous security are discussed in Section V. Finally, in Section VI,
structure with space–air–ground even underwater vehi- this article is concluded.
cles. Furthermore, the 6G AI-enabled vehicular networks
can have a positive impact not only on transportation but II. S T A T E A N D C H A L L E N G E S I N
also on the interaction between humans and the world, VEHICULAR NETWORK
such as smart grid, smart living, and human socializa-
In this section, we survey the technologies of a vehicu-
tion. The dynamic adaptivity-enabling self-optimization,
lar network in terms of communication, networking, and
the secure communication, as well as the rapid response
secure aspects. The current state and challenges of the
capability improving transmission quality of service (QoS)
vehicular communication and networking depending on
and reducing end-to-end delay are essential to such large-
different techniques and research directions are investi-
scaled 6G vehicular networks [5]. To achieve the goal,
gated, respectively.
some advanced techniques, such as network function
virtualization (NFV), cognitive radio (CR), and reactive
vehicular network control, are proposed in 5G. However, A. Challenges of Vehicular Communication
the new key performance indicators (KPIs) of the 6G net- To support the vehicular network, the communication
work require further evolution to network intelligentiza- technology between vehicles, as well as between vehicles
tion, intelligent radio (IR), and self-learning with proactive and other equipments, has been widely researched for
exploration. many years. In the early stage, typical communication
Machine learning (ML) is the promising AI technology, techniques with unlicensed spectrums, such as Bluetooth,
which brings intelligence to various widely used systems Wi-Fi [9], and WiMax, were exploited to support the
and has been proven to be efficient in various areas, vehicular communications extended from cellular net-
such as pattern recognition [6], natural language process- works. However, the existing techniques do not satisfy
ing [7], and autonomous driving and game AI [8]. The the distinctive requirements, such as high flexibility and
current ML technologies develop efficient approaches to sensitive collision avoidance ability of vehicular networks.
data recognition and fast correlation recovering and can be To solve the problem, the unique vehicular communi-
potential tools to satisfy the high requirements of dynamic cation technique, dedicated short-range communications
adaptation, secure communication, and rapid response (DSRC) for V2V and V2I communications, was proposed
toward the 6G intelligent vehicular network. To the best of in 1999 and quickly became the most commonly used
the authors’ knowledge, the potential applications for ML wireless communication technique for short-range connec-
in vehicular networks include fast channel equalization, tion in a vehicular network. Besides, the long-term evolu-
adaptive resource allocation, intelligent traffic control, tion (LTE) is the primary broadband technology based on
mobile computing, intrusion detection, and so forth. orthogonal frequency-division multiplexing (OFDM) [10]
In this article, we give a comprehensive survey of the and was developed by 3GPP to increase the capacity and
employment of ML technologies for vehicular network speed of an old generation wireless network. Recently,

2 P ROCEEDINGS OF THE IEEE


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

Fig. 2. Perspectives of ML in a vehicular network that we focus on in this article.

3GPP extended the LTE standard to the so-called LTE-V mobility of vehicles, the high Doppler spread causes
for supporting heterogeneous vehicular network for all extremely fast channel fading and hinders the accu-
V2V, V2I, vehicle-to-pedestrian (V2P), and vehicle-to- racy of channel estimation. The simple CSI estimation
network (V2N) communications [11]. To support the high- based only on linear models is not fulfilled in the high-
frequency bandwidth of the new generation network (i.e., dynamic environment. Moreover, conventional meth-
5G and beyond), new radio allocation and access tech- ods first estimate the CSI and then recover the signal
niques, such as multiple-input–multiple-output (MIMO), of the transmitter-based estimated channel, which is
time division duplex (TDD), OFDM, CR, beamforming, time consuming and causes unexpected latency [14],
and nonorthogonal multiple access (NOMA), have been [15]. In summary, the conventional multiradio access
widely researched, which is also being used in the new methods cannot satisfy the ultralow-delay and high-
version DSRC, LTE-V, and so forth. However, to satisfy throughput requirement of future vehicular commu-
the high flexibility and rapid response capability of future nication. How to intelligently schedule the multira-
6G vehicular networks, there are still many challenges in dio access for dynamic vehicular communication is a
those mentioned techniques. In the remaining part of this big challenge.
section, we illustrate the challenges following the radio 2) Radio Configuration Challenge: The conventional com-
access flow. munication system considers the radio configuration
1) Multiradio Access Challenge: In the dynamic envi- as different blocks, such as decoding space–time
ronment, the rapid and precise channel division codes, channel equalization, and signal modulation.
and multiple-radio access are essential for the high- The communication blocks are sliced with isolated
mobility users. Recently, the time-, power-, and communication functions, and the radio is configured
frequency-based channel division technology, such step-by-step as a functions chain [16]. For example,
as TDD, OFDM, and NOMA, have been widely the channel resource allocation algorithm should be
researched for the new generation dynamic network designed depending on the different modulation of
and supported by WiFi, DSRC, WiMax, and LTE in signals. Such a kind of radio configuration is time con-
a vehicular network. Furthermore, the space-based suming and not feasible for the high-dynamic vehic-
multiplexing of MIMO and massive MIMO to enable ular network. How to make the radio configuration
multiple antennas has been considered as the core in a more feasible way and to intelligently allocate
technique in a high-density vehicular network in 5G. resources with low latency should be an emerging
The mentioned multiradio access technologies pro- topic in the future 6G vehicular network.
vide intelligent multiple access to a future vehicu- 3) Beamforming Challenge: In the future vehicular com-
lar network and are mainly based on the channel munication, the mmWave will be widely used. Both
state information (CSI), which can be predicted with the beamforming and massive MIMO technologies for
probed feedback (e.g., pilot) from environment [12]. specific high-dynamic vehicular communications are
In a conventional wireless communication, the chan- desired. As shown in Fig. 3, the mutative vehicular
nel estimation and signal detection are widely used location and high overhead of frequent beam training
to improve the spectrum utilization, in which the are the critical drawback to develop the mmWave
channel estimation and signal detection accuracy in high-mobility vehicular communication systems.
depend primarily on the stability of the transmitter Recent works [17], [18] show that the conventional
and the receiver [13]. However, because of the high beamforming methods provide high overload for the

P ROCEEDINGS OF THE IEEE 3


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

1) Rapid Response: In the high-dynamic vehicular net-


work, the mobility of vehicles causes quick handoffs
of wireless links, and the immediate resource alloca-
tion when environment is changing is critical.
2) Accurate Environment Modeling: For various kinds
of criteria and requirements in the heterogeneous
vehicular network, creating an accurate mathematical
model to measure all resources in the complex envi-
ronment is challenging.
3) Self-Adaptivity: The environment is spatial–temporal
changing in the mutative vehicular network, and to
adjust to the changing topology and requirements,
the resource allocation scheme should be evolved
with proactive exploration and self-adaptive ability.
Fig. 3. Illustration of dynamic beamforming in vehicular network. To solve the mentioned challenges, some dynamic
resource allocation algorithms have been proposed. For
example, Yang et al. [20] tried to address the challenge
of accurate environment modeling in a heterogeneous
mmWave in the dynamic vehicular communication vehicular network and employed the graph coloring theory
and are not intelligent to adapt to frequently changing to model the joint resources’ allocation problem in cellular-
vehicular scenario. In order to make the mmWave and VANET heterogeneous networks. However, the proposal
the corresponding beamforming strategy intelligent, is time-consuming and not self-adaptive for the dynamic
the novel intelligent ML technology might be a poten- environment. Misra et al. [21] addressed the self-adaptivity
tial solution. challenge by using learning automata (LA) to explore the
radio resource reusability and power consumption level
B. Challenges of Vehicular Networking and adaptively assigned radio resources to nodes with the
The future intelligent 6G vehicular network can provide corresponding requirement. Although the proposal is adap-
communications from V2X, which includes heterogeneous tive, both the signaling overhead and the response speed
communications of V2V, V2I, V2P, and V2N. The feasible are not suitable for the high-dynamic vehicular network.
and heterogeneous structure of a vehicular network leads After this, various methods, such as game theory [22]
to new requirements for the networking algorithms. In this and Markov chain [23], have been proposed to address
section, we introduce the challenges in intelligent vehic- the dynamic resource allocation problems in vehicular
ular networking from resource allocation and network networks. However, those conventional methods are still
traffic control aspects. not intelligent enough to deal with all three challenges.
The intelligent ML technologies have emerged recently
1) Network Resource Allocation: The wireless network
and are considered to be the potential solution to address
resources, such as channels, power level, computing ability,
the challenges in the future vehicular network, which are
and time slots, are unevenly distributed in networks, and
introduced in detail in Section IV-A.
the requirements of users in the network are different.
How to allocate suitable resources in a wireless network 2) Network Traffic Control: The network traffic con-
is a classical problem in the wireless network [19]. Many trol, including network routing, congestion avoidance, and
resource allocation algorithms based on the greedy algo- traffic offloading, has been widely researched in conven-
rithm, auction theory, and game theory are widely pro- tional wireless networks. In a vehicular network, con-
posed to deal with the resource allocation problem. Dif- sidering the dynamics of network topology, the traffic
ferent from conventional wireless networks, the vehicular control strategy becomes more complex. Instead of con-
network involves unique characteristics of high-mobility ventional routing protocols such as open shortest path
nodes, heterogeneous structure, and high QoS require- first (OSPF), intermediate system-to-intermediate system
ments from passengers. Conventional static resource allo- (IS-IS), and routing information protocol (RIP), the loca-
cation methods are insufficient for such complex vehicular tion information and network topology emerge as impor-
networks. For example, a dynamic radio resource alloca- tant parameters involved in the routing protocol design
tion problem in a vehicular network is shown in Fig. 4. for the high-dynamic vehicular network. By involving
Considering that the vehicles are dynamically moving, the location and topology information, some classical
the radio resources in power, spectrum, and time domain routing protocols, such as destination-sequenced distance-
should be jointly considered to fit the mutative scenario. vector routing (DSDV) [24], stability-based adaptive
To summarize, there are three main challenges for routing (SSA) [25], dynamic source routing (DSR) [26],
employing a resource allocation algorithm in the vehicular proactive source routing (PSR) [27], and optimized link-
networks: state routing protocol (OLSR) [28] for dynamic network,

4 P ROCEEDINGS OF THE IEEE


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

Fig. 4. Illustration of dynamic radio resource allocation in vehicular network.

have been proposed. However, those routing algorithms constraints of the vehicular network can be introduced as
still do not satisfy the high requirements, such as ultralow follows.
delay (≤10 ms), high capacity (≥100 Mb/s), and high
security of future vehicular networks. To achieve the intel- 1) High Mobility: The most important characteristic of
ligent networking and high-quality end-to-end communi- the vehicular network is the high dynamics of vehicle
cation in a future vehicular network, we summarize three nodes. Links between vehicles are frequently broken
main challenges of network traffic control as follows. and it is hard to deploy the conventional reputation-
based secure system [29]. The network traffic sharply
1) Future State Prediction: To adjust to the sharply chang-
waving with topology changing affects both secure
ing environment, the traffic control based on the
packets routing and intrusion detection [30]. Further-
future state (e.g., network topology, network traffic
more, the high mobility leads to the unpredictable
load, and radio conditions) prediction using historical
movement of nodes, which hinders the real-time
information is critical in the future intelligent vehicu-
transmission of secure information.
lar network.
2) Heterogeneous Structure: The vehicular network is
2) Correlation Recovering: The complete global informa-
constructed with various devices and technologies,
tion of the heterogeneous vehicular network is hard
which is embedded with different resource capacity.
to be collected in real time, and recovering informa-
How to balance the various resources between nodes
tion from incomplete information in the distributed
to ensure the security strategy emerges as a big
system is essential in the future large-scale vehicular
challenge. For example, in the power, computation-,
networks.
and storage-constrained vehicular network, how
3) Proactive Exploration and Self-learning: In the high-
to maximize secure applicability can be treated
dynamic vehicular network, frequently changing the
as a fuzzy game and is hard to be solved
traffic control strategy with human interface is
optimally [31].
time-consuming and consumptive, and an emerging
3) Large Scaled: The scale of the vehicular network
research direction of enabling intelligence for future
increases fast. Millions of vehicles are expected to
6G vehicular network is to make the traffic control
be connected to the big network in 2020 [32].
system proactively exploring the changing environ-
However, no existing global authority and standard
ment and self-evaluation from explored information.
provide security for the big network. Furthermore,
the increasing scale of the network increases both
the computation and communication overhead of the
C. Challenges of Network Security
security algorithm, which increases both response
The cyber-physical security is the standard research latency and detection error rate.
topic in the cyber system, which is also a serious issue in 4) Privacy Requirement: There is always a tradeoff
vehicular networks. The attack and malicious behaviors of between security and privacy in the cyber sys-
vehicular users cause serious consequences that not only tem [33]. In a vehicular network, the authorization
affect the network but also threaten personnel safety in and information accuracy provided by vehicle drivers
vehicles, and the vehicular networks require more strict directly affect the network security. Without the guar-
demands in ML-based security algorithms. The specific antee of information accuracy, the secure algorithm

P ROCEEDINGS OF THE IEEE 5


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

Table 1 Applications of ML in Vehicular Communication

consumes many more resources to detect and distin- III. M L I N V E H I C U L A R


guish error and anomaly from fuzzy information [34]. C O M M U N I C AT I O N S
5) Real-Time Requirement: Different from conventional Network intelligentization is the primary goal of the future
networks, the vehicular network requires immediate vehicular network in 6G. As powerful intelligence enabling
decisions to deal with the real-time situation, such technology, ML is recently being utilized in the wireless
as help information broadcast, accident avoidance, system to address the challenges and paves the way for
and quick rescue. The real-time requirement of the future vehicular communications. In this section, we sur-
vehicular network desires low-delay transmission as vey the applications of ML in vehicular communications to
well as fast attack prevention mechanisms [35]. conquer the challenges listed in Section II-B and propose
In order to conquer the abovementioned challenges, the potential directions of using ML for future IR in 6G
a series of methods have been proposed over the years. vehicular networks. The used ML structures and targeting
Jamming and eavesdropping are two primary attacks in tasks are listed in Table 1.
networks, and the vehicular public key infrastructure (PKI)
and elliptic curve digital signature algorithm (ECDSA)
have been proposed to be the two main security architec- A. ML for Intelligent Multiradio Access
tures to ensure the confidential communication from mali- Channel estimation-based configurations of multiradio
cious attacks [36], [37]. However, the malicious attacks access, such as TDD, OFDM, NOMA, and MIMO, are widely
include the sybil attack, the denial-of-service (DoS) attack, researched in wireless networks. However, as we men-
the blackhole attack, the wormhole attack, the bogus infor- tioned in Section II-B, due to the high dynamics of the
mation attack, and the replay attack that can forge identity, vehicular network, conventional configuration methods for
transmit spam messages, and hijack normal nodes to break multiradio access do not easily meet the strict requirement
through the PKI and ECDSA security [38]. To detect and of the vehicular network. Recently, ML has been widely
prevent the intrusions, many malicious behavior detection researched to enable intelligence in those multiradio access
methods have been proposed [39]–[42]. Some researchers techniques.
propose that leakages and intrusions can be traced with Chen et al. [53] considered using supervised
data mining methods from dynamic network traffic pat- multilayer perceptron (MLP) to equalize channels by
terns [43], [44]. The intrusion detection algorithms for intelligently reconstructing the transmitted symbols.
conventional networks are mostly achieved by defining Sebald and Bucklew [47] proposed a support vector
the normal state from static training data. In the highly machine (SVM)-based nonlinear equalization algorithm
dynamic vehicular network, the existing training data are in the wireless communication where the temporal
not efficient for novel intrusions in the changing envi- correlation exists in the collected intersymbol interference
ronment. Then, Kurosawa et al. [45], [46] proposed a (ISI) data. However, those ML-based algorithms consider
dynamic attack detection algorithm for AODV routing- only single transmission without considering the space
based MANET. The conventional data mining technologies, diversity in a multipath transmission environment.
such as association rules, autoregressive, and classifica- Sánchez-Fernández et al. [48] proposed the SVM-based
tion, are widely used in the abovementioned works for multiregression algorithm for channel estimation in an
intrusion detection. Recently, ML has proposed to be the MIMO environment. In the proposal, the SVM-based
promising data mining tool for improving both the data algorithm can achieve fast convergence and shows
encryption and intrusion detection performance in vehicu- higher estimation accuracy than classical minimum
lar networks. mean-square-error (mmse) or maximum-likelihood-based

6 P ROCEEDINGS OF THE IEEE


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

channel estimation algorithms [13], [74]. Innovated from Technology Conference in 2017, they presented a prelimi-
SVM, Feng and Chang [49] proposed an ML algorithm nary result, which showed that the deep learning achieves
based on parallel hierarchical SVM (H-SVM) to estimate outstanding performance for learning the channel states
the channel noise of wireless network. However, the in a complex environment [62]. Then, Felix et al. [63]
SVM-based algorithms depend on two assumptions: no ISI presented the deep learning that can be employed as an
is presented in the channel model, and the channel fading autoencoder for OFDM and can adaptively configure the
is slow. However, because of the high dynamic in the channel without the conventional signal processing block.
vehicular network, both the ISI and the fast fading should Gui et al. [68] modeled the conventional user activity/data
be considered. Besides SVM, Prasad and Murthy [56] and detection as an unknown nonlinear mapping problem and
Prasad et al. [57] proposed the sparse Bayesian learning correspondingly proposed an approximation algorithm to
(SBL)-based channel estimation algorithm for considering solve it by using long short-term memory (LSTM) to model
the OFDM with sparse nonzero components in the channel the spatial–temporal relationship between the input sig-
model. Considering the sparse feature, Wen et al. [55] nals and the sharply changing channel conditions. Besides
found that the link signal in the massive MIMO wireless the supervised deep-learning algorithms, reinforcement
network is approximately sparse and the corresponding learning is also being studied for radio configuration. Con-
channel condition can be accurately estimated by sidering the jamming attacks, Xiao et al. [70] proposed an
using Bayesian learning. Huang et al. [75] compared intelligent scheme using the deep reinforcement learning
the sparse recovery algorithms for channel estimation (DRL) to adaptively allocate power in NOMA without
considering the similar sparse channel model of OFDM in being aware of the jamming and radio channel parameters.
an underwater environment. As the promising multiradio
access technology, the sparse code multiple access (SCMA) C. ML for Adaptive Tracking and Beamforming
developed from NOMA has been widely researched to As we mentioned in the intelligent multiradio access
improve spectral efficiency. Wang et al. [59] proposed part, the environment parameters, as well as channel
an SBL-based user detection and channel estimation and interference model, are hard to be modeled with
for SCMA uplink systems to reduce the requirement of certain formulas. The ML is a powerful tool to treat
pilot overhead. Also, considering SCMA, Kim et al. [67] the unknown model as a black box and extract the fea-
proposed a deep-learning method using the deep belief tures and build the connection between the input data
network (DBN) to improve the NOMA efficiency in density and the output data. Gaudes et al. [51] constructed the
environment. With powerful deep learning, training minimum-variance distortionless response (MVDR) beam-
the decoding can be done in a single shot to improve former designed as a complex-valued constrained opti-
the computational time, and the changing channel can mization problem. With the supervised SVM, the valued
be efficiently learned to minimize the transmission bit constrained optimization achieves quick convergence, and
error rate (BER). the performance is better than in the conventional mmse-
based algorithms. Ramon et al. [52] also reformulated
B. ML for IR Configuration the configuration of beamforming as a variance mini-
As per the challenges mentioned in Section II-B, mization problem. By incorporating additional inequality
the blocked communication functions make the radio con- constraints penalizing sidelobe levels and considering the
figuration slow and stiff. In order to address the challenges, certain error in the desired signal direction, the variance
the researchers proposed some ML-based adaptive con- minimization problem becomes nonlinear and is creatively
figuration algorithms to jointly optimize communication solved with the proposed SVM learning algorithm. How-
function cross blocks. For example, Daniels et al. [60] ever, the considered environment is still ideal, such as the
proposed a K -nearest neighbor (KNN)-based supervised specific Gaussian noise model that is assumed. Further-
learning strategy for adaptive OFDM configuration, includ- more, those works do not consider the high dynamics of
ing modulation, convolutional coding, and bit interleaving. vehicular communications.
In this proposal, the approximated channel model, such For high-dynamic vehicular communications, extra
as ideal interleaving and wireless channel distribution, information, such as out-of-band measurements and vehi-
is not needed, and the adaptive OFDM configuration can cles’ positions, restrains the best beam pair selection time.
be made in one slot instead of the step-by-step calculation. Klautau et al. [18] proposed a deep-learning-based beam
Rico-Alvario and Heath [138] further extended the ML- selection algorithm in a high-dynamic 5G MIMO-enabled
based adaptive OFDM configuration to multiuser access V2I network. In this article, various ML algorithms are
scenario. This article also considers using as few assump- studied in both supervised-learning-based feature classi-
tions as possible on the mathematical model of the physical fication and reinforcement-learning-based action making
layer so that channel approximations can be avoided [60]. process for beamforming. The results demonstrate that
The deep learning is proposed to be a better solution for the deep-learning structure outperforms shallow ones in
dealing with the challenges in OFDM [61]. Ye et al. [14] terms of accuracy for classification and root-mean-squared
considered all physical models as the black box and pro- error (RMSE) for regression. Then, Alkhateeb et al. [65]
posed a DBN-based deep-learning algorithm for channel further considered that the training overhead should
estimation and signal detection. At the IEEE 86th Vehicular be reasonable, and a novel deep-learning coordinated
P ROCEEDINGS OF THE IEEE 7
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

beamforming algorithm is proposed for the specific high- in CR for task classification, such as SVM for signal
mobility mmWave system. The results show that the classification [50] and MLP for transmission parameter
intelligent deep-learning-based beamforming can achieve optimization [54]. The abovementioned works all focus
reliable coverage, low latency, and negligible training on using supervised or reinforcement learning to opti-
overhead in the high-mobility mmWave system. Besides, mize one aspect of CR. Thilina et al. [73] jointly con-
Asadi et al. [66] proposed that the coarse user location can sidered the supervised and unsupervised learning in the
be involved in dynamic beam selection, and with the online CR system. In this article, the unsupervised learning of
ML algorithm for sensing the changing environment, both K -means algorithm is used to cluster the channel features,
the network performance and communication stability can and the supervised learning of SVM and KNN is used to
be improved under guaranteed convergence. approximate the relation function between the channel
vectors and to separate hyperplanes. Recently, the deep
D. Open Issue: From CR to IR structure of ML (i.e., deep learning) has been proven to be
To enable the intelligence to the dynamic communica- a powerful tool in various areas including being employed
tion system, the concept of CR is proposed as the adaption in the CR configuration. Zhu et al. [69] employed the
tool to be aware of and learn from the environment. How- deep Q-learning for solving the HMM-based transmission
ever, due to the highly heterogeneous and dynamic vehic- scheduling of CR. Mendis et al. [64] proposed a supervised
ular network, the degrees of freedom of a wireless system DBN NN for automated modulation classification for CR.
increase the complexity of the environment. In such a com- Some other works about using NNs and HMM to solve
plicated case, several parameters and policies in isolated the CR problem are surveyed in [78]. However, all those
blocks need to be adjusted simultaneously (e.g., transmit CR algorithms employ the cutting-edge ML techniques for
power, coding scheme, modulation scheme, sensing algo- specific function optimization, which is hard to integrate
rithm, communication protocol, and sensing policy), and the interactions between various hardware components in
no simple formula may be able to determine these setup the heterogeneous vehicular network. The CR embedded
parameters simultaneously [76]. Recently, the concept of with ML based on the virtualized network to achieve IR
IR has been proposed as one of the core techniques in 6G, might be considered as a future research direction.
which is an intelligentized extension of CR-enabling deep
neural networks (NNs) for replacing blocked functions IV. A P P L I C A T I O N S O F M L I N
in the communication system. From CR to IR, there is VEHICULAR NETWORKING
still a long distance, and the first step is to adapt CR
Toward the future vehicular networking in 6G, the ML
to the complex environment and perform intelligent CR
algorithms are widely used for network radio resource
configuration for simultaneous multiple actions.
assignment, transmit power control, transmit scheduling,
To achieve this goal, many ML-based CR configura-
dynamic routing, traffic offloading, computing assistant,
tion algorithms are proposed. The spectrum sensing is
and so on. In this section, we survey the related works,
the basic of the CR system. Gong et al. [58] proposed
especially for the proposals of exploiting ML for vehicular
a Bayesian-learning-based adaptive algorithm to set up
networking that have been presented recently.
the cooperation relationship between the local nodes.
In this approach, adaptive learning is used to find the
optimal decision threshold, which can be treated as the A. ML in Resource Allocation
classification problem with supervised learning. However, Different from the conventional wireless network where
the Gaussian noise model is assumed in this article, which resource allocations are widely researched, the vehicular
may not satisfy the real complex wireless system in a high- network has special constraints and requirements for the
dynamic vehicular network. To consider the problem to intelligent resource allocation strategies. For conquering
be more real, Galindo-Serrano and Giupponi [71] con- the three main requirements of resource allocation in the
sidered the channel and interference as a black box and vehicular network as mentioned in Section II-B1, the intel-
modeled the channel adaption and environment changing ligent ML-based resource allocation has attracted much
as the Markov decision process (MDP). In this article, attention recently.
the Q-learning method is proposed to learn the environ- A novel reinforcement-learning-based dynamic chan-
ment and solve the MDP problem in an online manner. nel assignment algorithm was proposed by Nie and
By further considering the transfer policy in MDP that Haykin [79] to solve the radio resource allocation problem
is unknown, Choi and Hossain [72] modeled the CR in a mobile communication environment. Instead of the
system as a hidden Markov model (HMM) and proposed conventional radio resource allocation algorithm which
an expectation–maximization (EM) algorithm to estimate mainly depends on a single criterion such as channel inter-
the primary user parameters in the learning part of the ference or traffic conditions, the authors presented that
cognition cycle. Assra et al. [77] further exploited the the efficient radio allocation should consider various condi-
EM algorithm to cooperatively detect the spectrum in tions, including homogeneous and inhomogeneous traffic
multiantenna CR networks. Besides reinforcement learn- distributions, time-varying traffic patterns, and channel
ing, the supervised learning algorithms are widely used failures. The joint optimization for such multiple tasks is

8 P ROCEEDINGS OF THE IEEE


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

can avoid potential congestion. Furthermore, the super-


vised channel assignment algorithm integrates the channel
negotiations into one slot, accelerates the channel allo-
cation process, and reduces signaling overhead. Besides
ground vehicles, Kawamoto et al. [85] studied the resource
allocation problem between high-dynamic unmanned aer-
ial vehicles (UAVs) where both the propagation environ-
ment and the communication demand are dynamically
changing. The simulation results in the study show that the
Fig. 5. Q-learning-based dynamic radio resource allocation.
proposed Q-learning-based intelligent resource allocation
of UAVs can adapt to various propagation environments.
Xiao et al. [86] considered the power allocation in a coop-
erative sensing scenario in a vehicular network and pro-
hard to be solved as the problem in most cases is NP-hard. posed a Q-learning-based mobile crowdsensing strategy
Therefore, the authors considered the complex resource for efficient power control. Atallah et al. [139] proposed
allocation problem as a large-scale constrained dynamic an energy-efficient radio resource scheduling algorithm for
optimization problem and used a real-time reinforcement V2I in vehicular networks. Also considering the vehicular
learning (Q-learning) to solve it. The intelligent decision network, for optimal channel and power selection with-
strategy is shown in Fig. 5. The resource allocation is out requiring/waiting for global information, a DRL-based
based on the reflection (i.e., reward) from the changing algorithm for V2V was proposed in [87].
environment, which is adaptive for the high-dynamic envi- To summarize, the ML methods have been recently
ronment. Due to the limitation of computation and depth (the last two years) widely exploited in dynamic resource
of the ML algorithm, the ML-based resource allocation allocation in vehicular networks. Both supervised learning
methods in dynamic networks do not attract much atten- and reinforcement learning are studied for fast making
tion until the powerful deep-learning methods emerge. decision and response, state estimation and modeling,
He et al. [80], [81] proposed employing DRL to solve and recovering and self-adaption of resource allocation
the joint resource allocation problem in next-generation in high-dynamic vehicular networks. We foresee that the
vehicular networks. In this article, the authors considered mentioned directions may attract more attention in the
the complex environment and resources, including not next few years.
only radio but also networking, caching, and computing
resources. Depending on the function virtualization and B. ML in Network Traffic Control
centralization ability of software-defined network (SDN)
The mobility of vehicles significantly affects both the
and information-centric networking (ICN), the multiple
communication connectivity and the routing scheduling in
global task-targeted joint resource allocation is enabled.
the vehicular network. Recently, ML has been employed to
In such a system, the authors formulate the resource allo-
improve mobility prediction, efficient connection, dynamic
cation strategy in this framework as a multiple tasks’ joint
routing, quick handoff, and potential congestion avoidance
optimization problem that is similar to the large-scale con-
for vehicular network intelligent traffic control. We sum-
strained dynamic optimization problem mentioned in [79],
marize the proposals in Table 2 and review those proposals
and a corresponding DRL-based (deep Q-learning) alloca-
by classifying them depending on targeting different chal-
tion algorithm is proposed. Besides DRL, supervised deep
lenges.
learning is also being used in resource allocation in a
high-dynamic network. The high mobility of the vehicu- 1) Intelligent Prediction-Based Network Traffic Control:
lar network causes dynamic channel interface and bursty The built connections and routing paths may frequently be
traffic patterns. In [82], the deep convolutional NN (CNN) broken due to the high vehicle mobility. To establish and
was proposed to predict the bursty traffic and intelligently maintain end-to-end connections in vehicular networks,
assign the channel to links adaptively. In the proposal, involving the vehicle mobility and vehicular traffic change
two deep-learning structures of CNN and DBN were jointly trends in the dynamic network routing problem in a
used. The first CNN structure is used to extract the features vehicular network, is an essential solution. The function
of traffic patterns online and train the system to predict the approximation ability makes the supervised ML efficient
future traffic load levels of nodes. Based on the predicted for information recovering in spectrum and space domain,
load level, the DBN structure, which is offline pretrained and state prediction in the time domain. To predict the
with the existing data set collected from a static channel vehicles’ motion and to schedule network traffic, two
allocation algorithm, is employed to intelligently allocate kinds of ML-based prediction approaches are proposed:
channels after the CNN part. The enhanced algorithms one is the historical coordinates and velocity-based vehi-
with SDN and dynamic online learning were introduced cles’ location prediction, and the other is the historical
in [83] and [84]. With the deep-learning algorithm, intel- vehicles’ flow-based future traffic load prediction. For the
ligent channel allocation based on future traffic prediction first approach, the time-series-based ML algorithms, such

P ROCEEDINGS OF THE IEEE 9


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

Table 2 Applications of Using ML for Vehicular Network Traffic Control

as an artificial neural network (ANN) and HMM, are used learning, the traffic control system can get rid of labeled
for vehicle motion and location prediction [111], [112]. data and efficiently integrate the state prediction and
Besides the vehicle-motion-based location prediction only action selection into one step. In the related works,
for single/small amount of vehicles, the traffic flow the typical learning algorithms, such as Q-learning,
prediction-based network traffic control methods show a collaborative reinforcement learning (CRL), and combined
significant performance improvement in the complex and Q-learning and transfer learning [104]–[106], are
large-scale vehicle network. The spatial–temporal feature employed. Another application of reinforcement learning
extraction-enabled ML, such as DBN, recurrent neural in the vehicular networks is to predict the traffic
network (RNN), stacked autoencoders (SAEs), and CNN, load of different blocks and automatically offload the
is widely used in [88]–[90]. network traffic to balance overheads between the
The ML-based vehicle mobility prediction points toward blocks [101]. In the related works, the unsupervised-
the possible direction of the network traffic control based learning is exploited for the clustering of the blocks in
on time-series estimation. Some researchers propose that the vehicular network [107]. The unsupervised-learning-
the time-series models can be used in the Internet traffic based clustering for vehicles, packets, and infrastructures
flow forecasting, which reflects both the dynamic topology is widely researched in conventional networks. However,
change in the spatial domain and the network resource due to the distinctive features of the vehicular network,
change in the temporal domain [113]. With the network the conventional algorithms with high communication
traffic flow prediction, the advance traffic control actions overhead and low congestion speed are not efficient in the
can be made to offload traffic and avoid potential con- high-dynamic environment. Some enhanced unsupervised
gestion based on the predicted traffic flow. As the traffic learning algorithms with high-dynamic compatibility, such
flows in the vehicular network are sophisticated and large as the Hebb neural network (Hebb-NN), the K-harmonic
scaled, ML methods with deep structure, such as ANN, means (KHM), and the adaptive K-harmonic means
RNN, and CNN, which are capable of high-dimensional (AKHM), are proposed to improve the clustering-based
data, have been employed in the recent works [91]–[94], traffic control in vehicular networks [108]–[110].
[103], [114]. Besides the simple V2V and V2I scenarios,
by considering the advanced vehicular network that is het- 2) Correlation Recovering-Based Network Traffic Control:
erogeneous with various devices and equipment, the deep- Another application of ML in network traffic control is to
learning-based network traffic control for complex vehicu- recover information from incomplete data. In the wire-
lar environment, including high-speed UAVs, long-distance less network, the exchanged signaling, such as beacons,
roadside unit (RSU), and satellite communication, is fur- causes high overload to channels. For the vehicular net-
ther researched in [95] and [96]. work, signaling, including safety information and location
Besides supervised learning, reinforcement learning information, is more frequent and easy to be congested.
is proposed to deal with the network traffic prediction Furthermore, because of the high-dynamic topology of the
and adaptive strategy decision process by learning from vehicular network, vehicles in remote areas are difficult
continued actions and feedback. With reinforcement to get complete global information timely. Kato et al. [98]

10 P ROCEEDINGS OF THE IEEE


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

proposed that the deep learning can be used in a network that the network entities are hard to fit for the diverse
for intelligent traffic control by recovering the routing requirements, such as resource allocation, traffic control,
information from historical traffic patterns collected only and cloud computing synchronously. Furthermore, the vir-
from edge nodes. The correlations between traffic pat- tualization should embrace new radio access interfaces,
terns and routing decisions are hidden in the collected such as terahertz communications and intelligent surfaces
data. To find the hidden correlation, the DBN NN that in 6G [1].
enables each router recovering the correlation and estimat-
ing the traffic situation of the whole network can make V. A P P L I C A T I O N S OF ML FOR
the routing decision adaptively. Then, a GPU-accelerated SECURITY IN VEHICULAR NETWORK
deep-learning algorithm for traffic control is introduced
ML has been widely used in network security for many
for a software-defined router (SDR)-enabled dynamic net-
years. Both the classification ability of supervised learn-
work [97], [115].
ing and the clustering ability of unsupervised learning
Besides recovering incomplete data, deep learning is
are suitable for anomaly detection in a wireless network.
also good at recovering related information from mixed
Besides, the reinforcement learning is proposed to be
data filled with redundant information. To choose the
the potential coordination tool to balance the tradeoff
optimal action for intelligent traffic control, we should
between security and network performance [133]. The
first understand the correlation between massive parame-
vehicular network advanced from wireless network inher-
ters (e.g., node density, spatial distribution pattern, and
its ML-based security algorithms but also brings many new
wireless channel conditions), which is conventionally mod-
challenges. The first challenge is that the instruction in
eled with nonlinear equations and solved with heuristic
the vehicular network focuses not only on the network
algorithms. To simplify such a problem, the ML-based
environment but also on the physical environment, such
algorithm is employed for processing the correlation
as malicious vehicle behaviors. Second, the vehicular net-
understanding and corresponding decision in one slot. For
work has some distinctive network structures, such as the
example, Slavik and Mahgoub [99] proposed using super-
clustered vehicles, which cause the group behaviors in the
vised ML to optimize the parameters in multihop broadcast
cluster to be additionally considered. Besides, the vehicle
protocols for vehicular networks. In [100], the vehicles are
is a sophisticated equipment, which has complex security
considered as the relay nodes to disseminate sharing con-
issue itself [134]. Finally, there are five distinctive features
tent data. In order to ensure the minimum delay and high
as mentioned in Section II-C, and the ML-based security
data availability of data dissemination process, the CNN-
algorithms should satisfy the specific requirement of the
based scheme is proposed to model the correlation of
vehicular network.
social attributes and mobility among vehicles, with gradi-
The cybersecurity intrusion detection methods are
ent descent process, and the optimal vehicle dissemination
mainly divided into three types: the misuse-based detec-
strategy can be approximated [100], [102].
tion, the anomaly-based detection, and the hybrid detec-
tion. In this section, we introduce the ML-based vehicular
C. Open Issue: From Network Virtualization to security methods in terms of the three detection types. The
Intelligentization detailed characteristics are shown in Table 3.

The heterogeneous and large-scale structure makes the


future vehicular network hard to be embedded with effi- A. ML for Misuse Detection in Vehicular Network
cient ML algorithms. For many years, the ML-based net- The misuse detection is a classical attack detection
work functions have been designed, which have been approach, which can detect the known attacks by using
distributed to adapt to the sliced network requirement the recorded signatures of the existing attacks. Such a kind
and local features of various subnetworks. The interac- of searching and marching process is well addressed by ML
tions between distributed network functions are time- algorithms.
consuming and high cost. The SDN/NFV is proposed Almost 30 years ago, the NN was already used for
to enable software network functions and networking misuse detection in cyber-physical systems [118]. By com-
slicing for virtualizing various heterogeneous networks. paring the current activity against the expected actions
For example, He et al. [116] proposed the software- of an intruder, the NN extracts the features from the
defined vehicular network (SDVN), which enables future node’s behavior patterns and searches for the existing
rapid network innovation. Liu et al. [117] proposed that feature map to clarify the maliciousness of the node. With
the SDN can be embedded with mobile-edge computing deep learning emerging as a promising technique of ML
(MEC) to enable scalable and quick response for the and showing much better performance than the shallow
heterogeneous vehicular network. Given the virtualization ML, Kang and Kang [121] proposed a DNN-based mali-
to the vehicular network, the NFV is expected to be a cious attack detection mechanism that uses probability-
potential approach for future intelligentization in a 6G based feature vectors to train the deep NN and detect
vehicular network. However, one big challenge of the misuse in the in-vehicle network. Besides, Anzer and
existing SDN and network virtualization technologies is Elhadef [131] proposed an intrusion detection system in

P ROCEEDINGS OF THE IEEE 11


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

Table 3 ML-Based Security Methods in Vehicular Network

in-vehicle network security using deep learning, which control layer of a vehicular platoon to improve the
achieves comparatively lower rate of false positives. Fad- network reliability, robustness, and security. However, this
lullah et al. [135] proposed that the QoS and security proposal does not consider the dynamics of the vehicular
can be modeled as a stochastic game in the dynamic network. Scalabrin et al. [129] analyzed the automated
and heterogeneous network. To deal with the case of and runtime of moving vehicular data and proposed a
multiagent cooperative attack, Xu et al. [119] modeled Bayesian-prediction-based anomaly detection framework
the eavesdropping and jamming attacks and the corre- for the dynamic vehicular network. By further considering
sponding secure strategy selection as a stochastic game. both the high mobility and limited resources of vehicles,
By analyzing the existence and convergence of NE in the Wahab et al. [123] proposed a VSM-based multidecision
stochastic game, a Q-learning-based intelligent selection intelligent malicious attacks’ detection system for the clus-
algorithm of secure strategy is proposed in the dynamic tered vehicular network. In the proposal, the VSM is
radio environments. employed in the vehicle cluster to classify the cooper-
ative/malicious vehicles in an online manner, with the
cooperative vehicles clustering mechanism, and both the
B. ML for Anomaly and Hybrid Detection in
overhead and detection accuracy can be improved. In
Vehicular Network
addition, Grover et al. [127], [128] proposed that different
Misuse-based detection algorithms depending on the ML algorithms, such as Bayes learning, random forest (RF),
existing signatures of attacks cannot detect the novel and Ada Boost, can be employed in VANET for malicious
attacks, which has no signature in the database. In order to nodes’ detection. With the experiments, the ML-based
conquer the novel attack issue, the anomaly-based detec- malicious detection algorithms show consistent perfor-
tion algorithm is proposed, which models behaviors as a mance in the various high-dynamic vehicular networks.
benchmark and identifies anomalies as deviations from The abovementioned methods detect anomaly by using
normal behavior. Without the signature updating process, supervised learning to identify the abnormal behavior.
the anomaly detection can deal with the novel attacks and However, the anomaly detection process is computation
handle the changing environment in real time. Further- and time consuming, which causes inaccurate detection
more, the detected results can be labeled with signatures in a dynamic environment. Furthermore, the training and
for misuse detection, which saves human resources and detection process based on the existing labeled data is not
leads to quick hybrid detection. capable of dynamic changing attacks. Thus, Sequeira and
Considering the excellent performance of using Bayes Zaki [124] proposed an unsupervised-learning-based (e.g.,
learning in the filtering algorithm, Benferhat et al. [120] K -means) anomaly detection algorithm, which does not
proposed a Bayes-learning-based alert correlation algo- need the labeled data and can detect dynamic intrusions
rithm to detect complex and coordinated attacks. To detect in real time by using semi-incremental techniques. Also
the fault data injection attacks in the vehicular network, considering the unsupervised approach, Maglaras [132]
Sargolzaei et al. [122] proposed an NN-based intelli- proposed a distributed intrusion detection system for the
gent security system on the cooperative adaptive cruise vehicular network, which is based on the recursive

12 P ROCEEDINGS OF THE IEEE


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

K -means clustering module and can detect the The proactive exploration-based detection always leads to
dynamic intrusions recursively. Besides, Sedjelmaci and high signaling and communication cost [137]. To balance
Senouci [130] proposed an unsupervised-clustering-based the communication QoS and security, the existing security
collaborative intrusion detection framework on securing approaches mainly depend on reactive detection that can
vehicular networks, and the proposal based on the stable relatively save the communication cost. The 6G network
vehicles clustering is suitable for specific characteristics, with ultralow delay and super-high network capacity,
such as frequent changing topology and high vehicle where the communication resources are unlimited,
mobility of VANET. The abovementioned methods focus is expected to be the new paradigm for the proactive
either on the misuse detection or on anomaly detection, exploration-based security approaches. Furthermore,
which is not practical for real scenarios where both proactive ML, such as reinforcement learning and imitative
the existing and novel attacks are jointly employed. learning, is proposed as the new intelligent tool for
Thus, the researchers further proposed the RF-based improving the performance of proactive detection [133].
hybrid detection for both misuse and anomaly in the As such, the ML-based proactive security methods are
network [125], [126]. In summary, the ML algorithms with expected to be a worthy research direction toward the
supervised, unsupervised, and reinforcement manners can 6G vehicular network.
be effectively employed for intrusion detection by suiting
for the very characteristics of the vehicular network. VI. C O N C L U S I O N
ML, especially deep-learning technology, has proved to
be the potential solution for paving the way to future
C. Open Issue: From Reactive to Proactive intelligence in various systems. In this article, we investi-
The 6G network with global intelligentization requires gated the applications of ML technologies in the vehicular
more strict constraints of security. For a communication network toward the future 6G intelligentized network. The
system, there are four main security requirements of survey focused on the distinctive challenges in the exist-
confidentiality, integrity, authenticity, and availability that ing vehicular communication, networking, and security,
need to be satisfied [136]. However, in the conventional and investigated the corresponding ML-based solutions.
vehicular network, the promotion of security is always In addition, we listed some worthy works topics, which
accompanied by an increase in the communication costs. might be interesting for the next studies.

REFERENCES
[1] K. B. Letaief, W. Chen, Y. Shi, J. Zhang, and Y.-J. A. [12] Y. Li, N. Seshadri, and S. Ariyavisitakul, “Channel [21] S. Misra, P. V. Krishna, and V. Saritha, “LACAV:
Zhang, “The roadmap to 6G—AI empowered estimation for OFDM systems with transmitter An energy-efficient channel assignment mechanism
wireless networks,” 2019, arXiv:1904.11686. diversity in mobile wireless channels,” IEEE J. Sel. for vehicular ad hoc networks,” J. Supercomput.,
[Online]. Available: Areas Commun., vol. 17, no. 3, pp. 461–471, vol. 62, no. 3, pp. 1241–1262, Dec. 2012.
https://arxiv.org/abs/1904.11686 Mar. 1999. [22] J. Tao, Z. Zhang, F. Feng, J. He, and Y. Xu,
[2] F. Yang, S. Wang, J. Li, Z. Liu, and Q. Sun, [13] Y. Li, L. J. Cimini, and N. R. Sollenberger, “Robust “Non-cooperative resource allocation scheme for
“An overview of Internet of vehicles,” China channel estimation for OFDM systems with rapid data access in VANET cloud environment,” in Proc.
Commun., vol. 11, no. 10, pp. 1–15, Oct. 2014. dispersive fading channels,” IEEE Trans. Commun., 3rd Int. Conf. Adv. Cloud Big Data, Oct./Nov. 2015,
[3] T. Brown, B. Argrow, C. Dixon, S. Doshi, vol. 46, no. 7, pp. 902–915, Jul. 1998. pp. 190–196.
R.-G. Thekkekunnel, and D. Henkel, “Ad hoc UAV [14] H. Ye, G. Y. Li, and B.-H. Juang, “Power of deep [23] N. Cheng, N. Zhang, N. Lu, X. Shen, J. W. Mark,
ground network (AUGNet),” in Proc. AIAA 3rd learning for channel estimation and signal and F. Liu, “Opportunistic spectrum access for
Unmanned Unlimited Tech. Conf., Workshop Exhibit, detection in OFDM systems,” IEEE Wireless CR-VANETs: A game-theoretic approach,” IEEE
2004, p. 6321. Commun. Lett., vol. 7, no. 1, pp. 114–117, Trans. Veh. Technol., vol. 63, no. 1, pp. 237–251,
[4] J. Wang, J. Liu, and N. Kato, “Networking and Feb. 2018. Jan. 2014.
communications in autonomous driving: A survey,” [15] Z. Gong, F. Jiang, and C. Li, “Angle domain channel [24] C. E. Perkins and P. Bhagwat, “Highly dynamic
IEEE Commun. Surveys Tuts., vol. 21, no. 2, tracking with large antenna array for high mobility destination-sequenced distance-vector routing
pp. 1243–1274, 2nd Quart., 2019. V2I millimeter wave communications,” (DSDV) for mobile computers,” in Proc. Conf.
[5] E. C. Strinati et al., “6G: The next frontier: From IEEE J. Sel. Topics Signal Process., vol. 13, Commun. Archit., Protocols Appl. (SIGCOMM),
holographic messaging to artificial intelligence no. 5, pp. 1077–1089, New York, NY, USA, 1994, pp. 234–244.
using subterahertz and visible light Sep. 2019. [25] R. Dube, C. D. Rais, K.-Y. Wang, and S. K. Tripathi,
communication,” IEEE Veh. Technol. Mag., vol. 14, [16] T. O’Shea and J. Hoydis, “An introduction to deep “Signal stability-based adaptive routing (SSA) for
no. 3, pp. 42–50, Sep. 2019. learning for the physical layer,” IEEE Trans. Cogn. ad hoc mobile networks,” IEEE Pers. Commun.,
[6] C. M. Bishop, Pattern Recognition and Machine Commun. Netw., vol. 3, no. 4, pp. 563–575, vol. 4, no. 1, pp. 36–45, Feb. 1997.
Learning. Berlin, Germany: Springer, 2006. Dec. 2017. [26] D. B. Johnson and D. A. Maltz, “Dynamic source
[7] I. Bisio, C. Garibotto, A. Grattarola, F. Lavagetto, [17] V. Va, T. Shimizu, G. Bansal, and R. W. Heath, Jr., routing in ad hoc wireless networks,” in Mobile
and A. Sciarrone, “Smart and robust speaker “Position-aided millimeter wave V2I beam Computing. Boston, MA, USA: Springer, 1996,
recognition for context-aware in-vehicle alignment: A learning-to-rank approach,” in Proc. pp. 153–181.
applications,” IEEE Trans. Veh. Technol., vol. 67, IEEE Int. Symp. Pers., Indoor Mobile Radio Commun. [27] Z. Wang, Y. Chen, and C. Li, “PSR: A lightweight
no. 9, pp. 8808–8821, Sep. 2018. (PIMRC), Oct. 2017, pp. 1–5. proactive source routing protocol for mobile ad hoc
[8] L. Galway, D. Charles, and M. Black, “Machine [18] A. Klautau, P. Batista, N. González-Prelcic, Y. Wang, networks,” IEEE Trans. Veh. Technol., vol. 63, no. 2,
learning in digital games: A survey,” Artif. Intell. and R. W. Heath, Jr., “5G MIMO data for machine pp. 859–868, Feb. 2014.
Rev., vol. 29, no. 2, pp. 123–161, Apr. 2008. learning: Application to beam-selection using deep [28] P. Jacquet et al., “Optimized link state routing
[9] I. Bisio, C. Garibotto, A. Sciarrone, and F. learning,” in Proc. Inf. Theory Appl. Workshop (ITA), protocol for ad hoc networks,” in Proc. IEEE INMIC,
Lavagetto, “Blind detection: Advanced techniques Feb. 2018, pp. 1–9. Lahore, Pakistan, Dec. 2001, pp. 62–68.
for WiFi-based drone surveillance,” IEEE Trans. Veh. [19] Y. Zhang, C. Lee, D. Niyato, and P. Wang, “Auction [29] Q. He, D. Wu, and P. Khosla, “SORI: A secure and
Technol., vol. 68, no. 1, pp. 938–946, Jan. 2019. approaches for resource allocation in wireless objective reputation-based incentive
[10] A. Ghosh, R. Ratasuk, B. Mondal, N. Mangalvedhe, systems: A survey,” IEEE Commun. Surveys Tuts., scheme for ad-hoc networks,” in Proc. IEEE Wireless
and T. Thomas, “LTE-advanced: Next-generation vol. 15, no. 3, pp. 1020–1041, 3rd Quart., Commun. Netw. Conf., vol. 2,
wireless broadband technology,” IEEE Wireless 2013. Mar. 2004, pp. 825–830.
Commun., vol. 17, no. 3, pp. 10–22, Jun. 2010. [20] T. Yang, R. Zhang, X. Cheng, and L. Yang, “A graph [30] Y. Uchiyama, Y. Waizumi, N. Kato, and Y. Nemoto,
[11] Study on LTE Support for Vehicle-to-Everything (V2X) coloring resource sharing scheme for full-duplex “Detecting and tracing DDoS attacks in the traffic
Services, document TR 22.885, 3GPP, v14.0.0, 2015. cellular-VANET heterogeneous networks,” in Proc. analysis using auto regressive model,” IEICE Trans.
Accessed: May 2019. [Online]. Available: Int. Conf. Comput., Netw. Commun. (ICNC), Inf. Syst., vol. E87-D, no. 12, pp. 2635–2643,
http://www.3gpp.org/DynaReport/22885.htm Feb. 2016, pp. 1–5. Dec. 2004.

P ROCEEDINGS OF THE IEEE 13


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

[31] T. Alpcan and S. Buchegger, “Security games for [51] C. C. Gaudes, I. Santamaria, J. Via, E. M. Gomez, [70] L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor,
vehicular networks,” IEEE Trans. Mobile Comput., and T. S. Paules, “Robust array beamforming with “Reinforcement learning-based NOMA power
vol. 10, no. 2, pp. 280–290, Feb. 2011. sidelobe control using support vector machines,” allocation in the presence of smart jamming,” IEEE
[32] F. Sakiz and S. Sen, “A survey of attacks and IEEE Trans. Signal Process., vol. 55, no. 2, Trans. Veh. Technol., vol. 67, no. 4, pp. 3377–3389,
detection mechanisms on intelligent transportation pp. 574–584, Feb. 2007. Apr. 2018.
systems: VANETs and IoV,” Ad Hoc Netw., vol. 61, [52] M. M. Ramon, N. Xu, and C. G. Christodoulou, [71] A. Galindo-Serrano and L. Giupponi, “Distributed
pp. 33–50, Jun. 2017. “Beamforming using support vector machines,” Q-learning for aggregated interference control in
[33] A. D. Miyazaki and A. Fernandez, “Internet privacy IEEE Antennas Wireless Propag. Lett., vol. 4, cognitive radio networks,” IEEE Trans. Veh.
and security: An examination of online retailer pp. 439–442, 2005. Technol., vol. 59, no. 4, pp. 1823–1834,
disclosures,” J. Public Policy Marketing, vol. 19, [53] S. Chen, G. J. Gibson, C. F. N. Cowan, and May 2010.
no. 1, pp. 54–61, 2000. P. M. Grant, “Adaptive equalization of finite [72] K. W. Choi and E. Hossain, “Estimation of primary
[34] Y. Sun et al., “Security and privacy in the Internet of non-linear channels using multilayer perceptrons,” user parameters in cognitive radio systems via
vehicles,” in Proc. Int. Conf. Identificat., Inf., Knowl. Signal Process., vol. 20, no. 2, pp. 107–119, hidden Markov model,” IEEE Trans. Signal Process.,
Internet Things (IIKI), Oct. 2015, 1990. vol. 61, no. 3, pp. 782–795, Feb. 2013.
pp. 116–121. [54] X. Dong, Y. Li, C. Wu, and Y. Cai, “A learner based [73] K. Thilina, K. W. Choi, N. Saquib, and E. Hossain,
[35] B. Parno and A. Perrig, “Challenges in securing on neural network for cognitive radio,” in Proc. “Machine learning techniques for cooperative
vehicular networks,” in Proc. Workshop Hot Topics IEEE 12th Int. Conf. Commun. Technol., Nov. 2010, spectrum sensing in cognitive radio networks,”
Netw. (HotNets-IV), Baltimore, MD, USA, 2005, pp. 893–896. IEEE J. Sel. Areas Commun., vol. 31, no. 11,
pp. 1–6. [55] C.-K. Wen, S. Jin, K.-K. Wong, J.-C. Chen, and pp. 2209–2221, Nov. 2013.
[36] W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn, P. Ting, “Channel estimation for massive MIMO [74] J.-J. van de Beek, O. Edfors, M. Sandell,
“A security credential management system for V2V using Gaussian-mixture Bayesian learning,” IEEE S. K. Wilson, and P. O. Borjesson, “On channel
communications,” in Proc. IEEE Veh. Netw. Conf. Trans. Wireless Commun., vol. 14, no. 3, estimation in OFDM systems,” in Proc. IEEE 45th
(VNC), Dec. 2013, pp. 1–8. pp. 1356–1368, Mar. 2015. Veh. Technol. Conf., vol. 2, Jul. 1995, pp. 815–819.
[37] R. van der Heijden, “Security architectures in V2V [56] R. Prasad and C. R. Murthy, “Bayesian learning for [75] Y. Huang, L. Wan, S. Zhou, Z. Wang, and J. Huang,
and V2I communication,” in Proc. 20th Student joint sparse OFDM channel estimation and data “Comparison of sparse recovery algorithms for
Conf. IT, 2010, pp. 1–10. detection,” in Proc. IEEE Global Telecommun. Conf. channel estimation in underwater acoustic OFDM
[38] Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, (GLOBECOM), Dec. 2010, pp. 1–6. with data-driven sparsity learning,” Phys. Commun.,
and H.-H. Chen, “Physical layer security in wireless [57] R. Prasad, C. R. Murthy, and B. D. Rao, “Joint vol. 13, pp. 156–167, Dec. 2014.
networks: A tutorial,” IEEE Wireless Commun., approximately sparse channel estimation and data [76] M. Bkassiny, Y. Li, and S. K. Jayaweera, “A survey
vol. 18, no. 2, pp. 66–74, Apr. 2011. detection in OFDM systems using sparse Bayesian on machine-learning techniques in cognitive
[39] W. Li and H. Song, “ART: An attack-resistant trust learning,” IEEE Trans. Signal Process., vol. 62, radios,” IEEE Commun. Surveys Tuts., vol. 15, no. 3,
management scheme for securing vehicular ad hoc no. 14, pp. 3591–3603, Jul. 2014. pp. 1136–1159, 3rd Quart., 2013.
networks,” IEEE Trans. Intell. Transp. Syst., vol. 17, [58] S. Gong, W. Liu, W. Yuan, W. Cheng, and S. Wang, [77] A. Assra, J. Yang, and B. Champagne, “An EM
no. 4, pp. 960–969, Apr. 2016. “Threshold-learning in local spectrum sensing of approach for cooperative spectrum sensing in
[40] T. Zhou, R. R. Choudhury, P. Ning, and cognitive radio,” in Proc. IEEE 69th Veh. Technol. multiantenna CR networks,” IEEE Trans. Veh.
K. Chakrabarty, “P2DAP—Sybil attacks detection in Conf.-VTC Spring, Apr. 2009, pp. 1–6. Technol., vol. 65, no. 3, pp. 1229–1243, Mar. 2016.
vehicular ad hoc networks,” IEEE J. Sel. Areas [59] Y. Wang, S. Zhou, L. Xiao, X. Zhang, and J. Lian, [78] A. He et al., “A survey of artificial intelligence for
Commun., vol. 29, no. 3, pp. 582–594, “Sparse Bayesian learning based user detection and cognitive radios,” IEEE Trans. Veh. Technol., vol. 59,
Mar. 2011. channel estimation for SCMA uplink systems,” in no. 4, pp. 1578–1592, May 2010.
[41] H. Hasrouny, A. E. Samhat, C. Bassil, and Proc. Int. Conf. Wireless Commun. Signal Process. [79] J. Nie and S. Haykin, “A Q-learning-based dynamic
A. Laouiti, “VANet security challenges and (WCSP), Oct. 2015, pp. 1–5. channel assignment technique for mobile
solutions: A survey,” Veh. Commun., vol. 7, [60] R. C. Daniels, C. M. Caramanis, and communication systems,” IEEE Trans. Veh. Technol.,
pp. 7–20, Jan. 2017. R. W. Heath, Jr., “Adaptation in convolutionally vol. 48, no. 5, pp. 1676–1687, Sep. 1999.
[42] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, coded MIMO-OFDM wireless systems through [80] Y. He, F. R. Yu, N. Zhao, H. Yin, and A. Boukerche,
and A. Jamalipour, “A survey of routing attacks in supervised learning and SNR ordering,” IEEE Trans. “Deep reinforcement learning (DRL)-based
mobile ad hoc networks,” IEEE Wireless Commun., Veh. Technol., vol. 59, no. 1, pp. 114–126, resource management in software-defined and
vol. 14, no. 5, pp. 85–91, Oct. 2007. Jan. 2010. virtualized vehicular ad hoc networks,” in Proc. 6th
[43] H. Nakayama, A. Jamalipour, and N. Kato, [61] T. Wang, C.-K. Wen, H. Wang, F. Gao, T. Jiang, and ACM Symp. Develop. Anal. Intell. Veh. Netw. Appl.
“Network-based traitor-tracing technique using S. Jin, “Deep learning for wireless physical layer: (DIVANet), New York, NY, USA, 2017,
traffic pattern,” IEEE Trans. Inf. Forensics Security, Opportunities and challenges,” China Commun., pp. 47–54.
vol. 5, no. 2, pp. 300–313, Jun. 2010. vol. 14, no. 11, pp. 92–111, 2017. [81] T. He, N. Zhao, and H. Yin, “Integrated networking,
[44] H. Nishiyama, D. Fomo, Z. Md Fadlullah, and [62] G. J. Mendis, J. Wei, and A. Madanayake, “Deep caching, and computing for connected vehicles:
N. Kato, “Traffic pattern-based content leakage learning-based automated modulation classification A deep reinforcement learning approach,” IEEE
detection for trusted content delivery networks,” for cognitive radio,” in Proc. IEEE Int. Conf. Trans. Veh. Technol., vol. 67, no. 1, pp. 44–55,
IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, Commun. Syst. (ICCS), Dec. 2016, pp. 1–6. Jan. 2018.
pp. 301–309, Feb. 2014. [63] A. Felix, S. Cammerer, S. Dörner, J. Hoydis, and [82] F. Tang, Z. M. Fadlullah, B. Mao, and N. Kato,
[45] S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, S. ten Brink, “OFDM-autoencoder for end-to-end “An intelligent traffic load prediction-based
and Y. Nemoto, “Detecting blackhole attack on learning of communications systems,” in Proc. IEEE adaptive channel assignment algorithm in SDN-IoT:
AODV-based mobile ad hoc networks by dynamic Int. Workshop Signal Proc. Adv. Wireless Commun. A deep learning approach,” IEEE Internet Things J.,
learning method,” Int. J. Netw. Secur., vol. 5, no. 3, (SPAWC), Jun. 2018, pp. 1–5. vol. 5, no. 6, pp. 5141–5154, Dec. 2018.
pp. 338–346, 2007. [64] G. J. Mendis, J. Wei, and A. Madanayake, “Deep [83] F. Tang, B. Mao, Z. M. Fadlullah, and N. Kato, “On a
[46] H. Nakayama, S. Kurosawa, A. Jamalipour, learning-based automated modulation classification novel deep-learning-based intelligent partially
Y. Nemoto, and N. Kato, “A dynamic anomaly for cognitive radio,” in Proc. IEEE Int. Conf. overlapping channel assignment in SDN-IoT,” IEEE
detection scheme for AODV-based mobile ad hoc Commun. Syst. (ICCS), Dec. 2016, pp. 1–6. Commun. Mag., vol. 56, no. 9, pp. 80–86,
networks,” IEEE Trans. Veh. Technol., vol. 58, no. 5, [65] A. Alkhateeb, S. Alex, P. Varkey, Y. Li, Q. Qu, and Sep. 2018.
pp. 2471–2481, Jun. 2009. D. Tujkovic, “Deep learning coordinated [84] F. Tang, B. Mao, Z. M. Fadlullah, and N. Kato,
[47] D. J. Sebald and J. A. Bucklew, “Support vector beamforming for highly-mobile millimeter wave “Deep spatiotemporal partially overlapping channel
machine techniques for nonlinear equalization,” systems,” IEEE Access, vol. 6, pp. 37328–37348, allocation: Joint CNN and activity vector
IEEE Trans. Signal Process., vol. 48, no. 11, 2018. approach,” in Proc. IEEE Global Commun. Conf.
pp. 3217–3226, Nov. 2000. [66] A. Asadi and S. Müller, G. H. Sim, A. Klein, and (GLOBECOM), Dec. 2018, pp. 1–6.
[48] M. Sánchez-Fernández, M. de Prado-Cumplido, M. Hollick, “FML: Fast machine learning for 5G [85] Y. Kawamoto, H. Takagi, H. Nishiyama, and
J. Arenas-García, and F. Pérez-Cruz, “SVM mmWave vehicular communications,” in Proc. IEEE N. Kato, “Efficient resource allocation utilizing
multiregression for nonlinear channel estimation in Conf. Comput. Commun., Apr. 2018, Q-learning in multiple UA communications,” IEEE
multiple-input multiple-output systems,” IEEE pp. 1961–1969. Trans. Netw. Sci. Eng., vol. 6, no. 3, pp. 293–302,
Trans. Signal Process., vol. 52, no. 8, [67] M. Kim, N.-I. Kim, W. Lee, and D.-H. Cho, “Deep Jul./Sep. 2018.
pp. 2298–2307, Aug. 2004. learning-aided SCMA,” IEEE Commun. Lett., vol. 22, [86] L. Xiao, T. Chen, C. Xie, H. Dai, and H. V. Poor,
[49] V. S. Feng and S. Y. Chang, “Determination of no. 4, pp. 720–723, Apr. 2018. “Mobile crowdsensing games in vehicular
wireless networks parameters through parallel [68] G. Gui, H. Huang, Y. Song, and H. Sari, “Deep networks,” IEEE Trans. Veh. Technol., vol. 67, no. 2,
hierarchical support vector machines,” IEEE Trans. learning for an effective nonorthogonal multiple pp. 1535–1545, Feb. 2018.
Parallel Distrib. Syst., vol. 23, no. 3, pp. 505–512, access scheme,” IEEE Trans. Veh. Technol., vol. 67, [87] H. Ye, G. Y. Li, and B.-H. F. Juang, “Deep
Mar. 2012. no. 9, pp. 8440–8450, Sep. 2018. reinforcement learning based resource allocation
[50] M. M. Ramón, T. Atwood, S. Barbin, and [69] J. Zhu, Y. Song, D. Jiang, and H. Song, “A new for V2V communications,” IEEE Trans. Veh. Technol.,
C. G. Christodoulou, “Signal classification with an deep-Q-learning-based transmission scheduling vol. 68, no. 4, pp. 3163–3173, Apr. 2019.
SVM-FFT approach for feature extraction in mechanism for the cognitive Internet of Things,” [88] W. Huang, G. Song, H. Hong, and K. Xie, “Deep
cognitive radio,” in IEEE MTT-S Int. Microw. Symp. IEEE Internet Things J., vol. 5, no. 4, architecture for traffic flow prediction: Deep belief
Dig., Nov. 2009, pp. 286–289. pp. 2375–2385, Aug. 2018. networks with multitask learning,” IEEE

14 P ROCEEDINGS OF THE IEEE


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

Trans. Intell. Transp. Syst., vol. 15, no. 5, A, Syst. Humans, vol. 35, no. 3, pp. 360–372, [124] K. Sequeira and M. Zaki, “ADMIT: Anomaly-based
pp. 2191–2201, Oct. 2014. May 2005. data mining for intrusions,” in Proc. 8th ACM
[89] Y. Lv, Y. Duan, W. Kang, Z. Li, and F.-Y. Wang, [106] C. Wu, Y. Ji, F. Liu, S. Ohzahata, and T. Kato, SIGKDD Int. Conf. Knowl. Discovery Data Mining
“Traffic flow prediction with big data: A deep “Toward practical and intelligent routing in (KDD), New York, NY, USA, 2002,
learning approach,” IEEE Trans. Intell. Transp. Syst., vehicular ad hoc networks,” IEEE Trans. Veh. pp. 386–395.
vol. 16, no. 2, pp. 865–873, Apr. 2015. Technol., vol. 64, no. 12, pp. 5503–5519, Dec. 2015. [125] J. Zhang, M. Zulkernine, and A. Haque,
[90] J. Li et al., “An end-to-end load balancer based on [107] N. Taherkhani and S. Pierre, “Centralized and “Random-forests-based network intrusion detection
deep learning for vehicular network traffic control,” localized data congestion control strategy for systems,” IEEE Trans. Syst., Man, Cybern. C, Appl.
IEEE Internet Things J., vol. 6, no. 1, pp. 953–966, vehicular ad hoc networks using a machine Rev., vol. 38, no. 5, pp. 649–659, Sep. 2008.
Feb. 2019. learning clustering algorithm,” IEEE Trans. Intell. [126] H. Zhang, S. Dai, Y. Li, and W. Zhang, “Real-time
[91] H. Feng and Y. Shu, “Study on network traffic Transp. Syst., vol. 17, no. 11, pp. 3275–3285, distributed-random-forest-based network intrusion
prediction techniques,” in Proc. Int. Conf. Wireless Nov. 2016. detection system using Apache spark,” in Proc. IEEE
Commun., Netw. Mobile Comput., vol. 2, Sep. 2005, [108] D. Tian, Y. Wang, H. Xia, and F. Cai, “Clustering 37th Int. Perform. Comput. Commun. Conf. (IPCCC),
pp. 1041–1044. multi-hop information dissemination method in Nov. 2018, pp. 1–7.
[92] V. Alarcon-Aquino and J. A. Barria, “Multiresolution vehicular ad hoc networks,” IET Intell. Transp. Syst., [127] J. Grover, N. K. Prajapati, V. Laxmi, and
FIR neural-network-based learning algorithm vol. 7, no. 4, pp. 464–472, Dec. 2013. M. S. Gaur, “Machine learning approach for
applied to network traffic prediction,” IEEE Trans. [109] W. Song, F. Zeng, J. Hu, Z. Wang, and X. Mao, multiple misbehavior detection in VANET,” in
Syst., Man, Cybern. C, Appl. Rev., vol. 36, no. 2, “An unsupervised-learning-based method for Advances in Computing and Communications,
pp. 208–220, Mar. 2006. multi-hop wireless broadcast relay selection in A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki, and
[93] M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, urban vehicular networks,” in Proc. IEEE Veh. S. M. Thampi, Eds. Berlin, Germany: Springer,
and J. Lloret, “Network traffic classifier with Technol. Conf. (VTC Spring), Jun. 2017, pp. 1–5. 2011, pp. 644–653.
convolutional and recurrent neural networks for [110] R. Chai, X. Ge, and Q. Chen, “Adaptive [128] J. Grover, V. Laxmi, and M. S. Gaur, “Misbehavior
Internet of Things,” IEEE Access, vol. 5, K-harmonic means clustering algorithm for detection based on ensemble learning in VANET,” in
pp. 18042–18050, 2017. VANETs,” in Proc. 14th Int. Symp. Commun. Inf. Advanced Computing, Networking and Security,
[94] Z. M. Fadlullah, F. Tang, B. Mao, J. Liu, and Technol. (ISCIT), Sep. 2014, pp. 233–237. P. S. Thilagam, A. R. Pais, K. Chandrasekaran, and
N. Kato, “On intelligent traffic control for [111] C. Ide et al., “LTE connectivity and vehicular N. Balakrishnan, Eds. Berlin, Germany: Springer,
large-scale heterogeneous networks: A value traffic prediction based on machine learning 2012, pp. 602–611.
matrix-based deep learning approach,” IEEE approaches,” in Proc. IEEE 82nd Veh. Technol. Conf. [129] M. Scalabrin, M. Gadaleta, R. Bonetto, and
Commun. Lett., vol. 22, no. 12, pp. 2479–2482, (VTC-Fall), Sep. 2015, pp. 1–5. M. Rossi, “A Bayesian forecasting and anomaly
Dec. 2018. [112] D. Vasquez, T. Fraichard, and C. Laugier, “Growing detection framework for vehicular monitoring
[95] M. Sangare, S. Banerjee, P. Muhlethaler, and hidden Markov models: An incremental tool for networks,” in Proc. IEEE 27th Int. Workshop Mach.
S. Bouzefrane, “Predicting transmission success learning and predicting human and vehicle Learn. Signal Process. (MLSP), Sep. 2017,
with machine-learning and support vector machine motion,” Int. J. Robot. Res., vol. 28, nos. 11–12, pp. 1–6.
in VANETs,” in Proc. 7th IFIP/IEEE Int. Conf. pp. 1486–1506, 2009. [130] H. Sedjelmaci and S. M. Senouci, “An accurate
Perform. Eval. Modeling Wired Wireless Netw. [113] S. Basu, A. Mukherjee, and S. Klivansky, “Time and efficient collaborative intrusion detection
(PEMWN), Toulouse, France, Sep. 2018, pp. 1–7. series models for Internet traffic,” in Proc. IEEE framework to secure vehicular networks,” Comput.
[96] N. Kato et al., “Optimizing space-air-ground 15th Int. Conf. Comput. Commun. (INFOCOM), Elect. Eng., vol. 43, pp. 33–47, Apr. 2015.
integrated networks by artificial intelligence,” IEEE vol. 2, Mar. 1996, pp. 611–620. [131] A. Anzer and M. Elhadef, “Deep learning-based
Wireless Commun., vol. 26, no. 4, pp. 140–147, [114] F. Tang, B. Mao, Z. M. Fadlullah, J. Liu, and intrusion detection systems for intelligent vehicular
Aug. 2019. N. Kato, “ST-DeLTA: A novel spatial-temporal value ad hoc networks,” in Advanced Multimedia and
[97] B. Mao et al., “Routing or computing? The network aided deep learning based intelligent Ubiquitous Engineering, J. J. Park, V. Loia, K.-K. R.
paradigm shift towards intelligent computer network traffic control system,” IEEE Trans. Sustain. Choo, and G. Yi, Eds. Singapore: Springer, 2019,
network packet transmission based on deep Comput., to be published. pp. 109–116.
learning,” IEEE Trans. Comput., vol. 66, no. 11, [115] B. Mao, Z. M. Fadlullah, F. Tang, N. Kato, [132] L. A. Maglaras, “A novel distributed intrusion
pp. 1946–1960, Nov. 2017. O. Akashi, T. Inoue, and K. Mizutani, “A tensor detection system for vehicular ad hoc networks,”
[98] N. Kato et al., “The deep learning vision for based deep learning technique for intelligent Int. J. Adv. Comput. Sci. Appl., vol. 6, no. 4,
heterogeneous network traffic control: Proposal, packet routing,” in Proc. IEEE Global Commun. Conf. pp. 101–106, 2015.
challenges, and future perspective,” IEEE Wireless (GLOBECOM), Dec. 2017, pp. 1–6. [133] Y. Xu, J. Xia, H. Wu, and L. Fan, “Q-learning based
Commun., vol. 24, no. 3, pp. 146–153, Jun. 2017. [116] Z. He, J. Cao, and X. Liu, “SDVN: Enabling rapid physical-layer secure game against multiagent
[99] M. Slavik and I. Mahgoub, “Applying machine network innovation for heterogeneous vehicular attacks,” IEEE Access, vol. 7, pp. 49212–49222,
learning to the design of multi-hop broadcast communication,” IEEE Netw., vol. 30, no. 4, 2019.
protocols for VANET,” in Proc. 7th Int. Wireless pp. 10–15, Jul. 2016. [134] M.-J. Kang and J.-W. Kang, “Intrusion detection
Commun. Mobile Comput. Conf., Jul. 2011, [117] J. Liu, J. Wan, B. Zeng, Q. Wang, H. Song, and system using deep neural network for in-vehicle
pp. 1742–1747. M. Qiu, “A scalable and quick-response software network security,” PLOS ONE, vol. 11, no. 6,
[100] A. Gulati, G. S. Aujla, R. Chaudhary, N. Kumar, defined vehicular network assisted by mobile edge pp. 1–17, 2016.
and M. S. Obaidat, “Deep learning-based content computing,” IEEE Commun. Mag., vol. 55, no. 7, [135] Z. M. Fadlullah, C. Wei, Z. Shi, and N. Kato,
centric data dissemination scheme for Internet of pp. 94–100, Jul. 2017. “GT-QoSec: A game-theoretic joint optimization of
vehicles,” in Proc. IEEE Int. Conf. Commun. (ICC), [118] J. Cannady, “Artificial neural networks for misuse QoS and security for differentiated services in next
May 2018, pp. 1–6. detection,” in Proc. Nat. Inf. Syst. Secur. Conf., generation heterogeneous networks,” IEEE Trans.
[101] W. Liu, G. Qin, Y. He, and F. Jiang, “Distributed Baltimore, MD, USA, vol. 26, 1998, pp. 1–14. Wireless Commun., vol. 16, no. 2, pp. 1037–1050,
cooperative reinforcement learning-based traffic [119] Y. Xu, J. Xia, H. Wu, and L. Fan, “Q-learning based Feb. 2017.
signal control that integrates V2X networks’ physical-layer secure game against multiagent [136] K. Bian, G. Zhang, and L. Song, “Toward secure
dynamic clustering,” IEEE Trans. Veh. Technol., attacks,” IEEE Access, vol. 7, pp. 49212–49222, crowd sensing in vehicle-to-everything networks,”
vol. 66, no. 10, pp. 8667–8681, Oct. 2017. 2019. IEEE Netw., vol. 32, no. 2, pp. 126–131,
[102] L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, and [120] S. Benferhat, T. Kenaza, and A. Mokhtari, “A naive Mar./Apr. 2018.
W. Zhuang, “UAV relay in VANETs against smart Bayes approach for detecting coordinated attacks,” [137] J. B. D. Cabrera et al., “Proactive detection of
jamming with reinforcement learning,” IEEE Trans. in Proc. 32nd Annu. IEEE Int. Comput. Softw. Appl. distributed denial of service attacks using MIB
Veh. Technol., vol. 67, no. 5, pp. 4087–4097, Conf., Jul. 2008, pp. 704–709. traffic variables—A feasibility study,” in Proc.
May 2018. [121] M.-J. Kang and J.-W. Kang, “Intrusion detection IEEE/IFIP Int. Symp. Integr. Netw. Manage.,
[103] F. Tang et al., “On removing routing protocol from system using deep neural network for in-vehicle May 2001, pp. 609–622.
future wireless networks: A real-time deep learning network security,” PLoS ONE, vol. 11, no. 6, [138] A. Rico-Alvariño and R. W. Heath, Jr.,
approach for intelligent traffic control,” IEEE pp. 1–17, Jun. 2016. “Learning-based adaptive transmission for limited
Wireless Commun., vol. 25, no. 1, pp. 154–160, [122] A. Sargolzaei, C. D. Crane, A. Abbaspour, and feedback multiuser MIMO-OFDM,” IEEE Trans.
Feb. 2018. S. Noei, “A machine learning approach for fault Wireless Commun., vol. 13, no. 7, pp. 3806–3820,
[104] Y. Zeng, K. Xiang, D. Li, and A. V. Vasilakos, detection in vehicular cyber-physical systems,” in Jul. 2014, doi: 10.1109/TWC.2014.
“Directional routing and scheduling for green Proc. 15th IEEE Int. Conf. Mach. Learn. Appl., 2314104.
vehicular delay tolerant networks,” Wireless Netw., Dec. 2016, pp. 636–640. [139] R. F. Atallah, C. M. Assi and J. Y. Yu, “A
vol. 19, no. 2, pp. 161–173, 2013. [123] O. A. Wahab, A. Mourad, H. Otrok, and reinforcement learning technique for optimizing
[105] J. Dowling, E. Curran, R. Cunningham, and J. Bentahar, “CEAP: SVM-based intelligent downlink scheduling in an energy-limited vehicular
V. Cahill, “Using feedback in collaborative detection model for clustered vehicular ad hoc network,” IEEE Trans. Veh. Technol., vol. 66, no. 6,
reinforcement learning to adaptively optimize networks,” Expert Syst. Appl., vol. 50, pp. 40–54, pp. 4592–4601, Jun. 2017, doi:
MANET routing,” IEEE Trans. Syst., Man, Cybern. May 2016. 10.1109/TVT.2016.2622180.

P ROCEEDINGS OF THE IEEE 15


This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Tang et al.: Future Intelligent and Secure Vehicular Network Toward 6G: ML Approaches

Fengxiao Tang (Member, IEEE) received for Electrical Communications Diffusion in 2008, the IEICE Network
the B.E. degree in measurement and con- System Research Award in 2009, the IEICE Satellite Communi-
trol technology and instrument from the cations Research Award in 2011, the KDDI Foundation Excellent
Wuhan University of Technology, Wuhan, Research Award in 2012, the IEICE Communications Society Distin-
China, in 2012, the M.S. degree in software guished Service Award in 2012, the IEICE Communications Soci-
engineering from Central South University, ety Best Paper Award in 2012, the Distinguished Contributions
Changsha, China, in 2015, and the Ph.D. to Disaster-Resilient Networks R&D Award from the Ministry of
degree from the Graduate School of Infor- Internal Affairs and Communications, Japan, in 2014, the Outstand-
mation Sciences (GSIS), Tohoku University, ing Service and Leadership Recognition Award in 2016 from the
Sendai, Japan, in 2019. IEEE Communications Society Ad Hoc & Sensor Networks Technical
He is currently an Assistant Professor with GSIS, Tohoku Univer- Committee, the Radio Achievements Award from the Ministry of
sity. His research interests are unmanned aerial vehicles system, Internal Affairs and Communications, Japan, in 2016, the IEEE Com-
Internet-of-Things (IoT) security, game theory optimization, and munications Society Asia–Pacific Outstanding Paper Award in 2017,
machine-learning algorithm. the Prize for Science and Technology from the Minister of Edu-
Dr. Tang was a recipient of the prestigious Dean’s and President’s cation, Culture, Sports, Science and Technology, Japan, in 2018,
Awards from Tohoku University in 2019 and several best paper the Award from the Tohoku Bureau of Telecommunications from the
awards at conferences, including IEEE International Conference on Ministry of Internal Affairs and Communications, Japan, in 2018,
Network Infrastructure and Digital Content (IC-NIDC) 2018 and IEEE and the Best Paper Awards from IEEE ICC/IEEE Global Commu-
Global Communications Conference (GLOBECOM) 2017/2018. nications Conference (GLOBECOM)/IEEE Wireless Communications
and Networking Conference (WCNC)/VTC. He was the Chair of the
Yuichi Kawamoto (Member, IEEE) received IEEE Communications Society Sendai Chapter. He has served as
the M.S. and Ph.D. degrees in information the Editor-in-Chief of the IEEE Network Magazine from 2015 to
science from Tohoku University, Japan, in 2017, a Member-at-Large on the Board of Governors of the IEEE
2013 and 2016, respectively. Communications Society from 2014 to 2016, and the Vice Chair of
He is currently an Associate Professor the Fellow Committee of the IEEE Computer Society in 2016. He
with the Graduate School of Information Sci- has also served as the Chair of Satellite and Space Communications
ences (GSIS), Tohoku University. He has pub- Technical Committee from 2010 to 2012 and the Ad Hoc & Sensor
lished more than 60 peer-reviewed articles, Networks Technical Committee of the IEEE Communications Society
including several high quality publications in from 2014 to 2015. He has been the Editor-in-Chief of the IEEE
prestigious IEEE journals and conferences. His research interests TRANSACTIONS ON VEHICULAR TECHNOLOGY since 2017. He is also
cover a wide range of areas, including satellite communications, a Distinguished Lecturer of the IEEE Communications Society and
unmanned aircraft system (UAS) networks, wireless and mobile the Vehicular Technology Society.
networks, ad hoc and sensor networks, green networking, and
network security.
Dr. Kawamoto received the best paper awards at many inter- Jiajia Liu (Senior Member, IEEE) received
national conferences, including IEEE Flagship Events, such as the the B.S. degree in computer science from
IEEE Global Communications Conference in 2013 (GLOBECOM’13), the Harbin Institute of Technology, Harbin,
the IEEE Wireless Communications and Networking Conference China, in 2004, the M.S. degree in computer
in 2014 (WCNC’14), and the IEEE International Conference on science from Xidian University, Xi’an, China,
Communications in 2018 (ICC’18). He was also a recipient of the in 2009, and the Ph.D. degree in information
prestigious Dean’s and President’s Award from Tohoku University in sciences from Tohoku University, Sendai,
2016. He is a member of the Institute of Electronics, Information, Japan, in 2012.
and Communication Engineers (IEICE). He was a Full Professor with the School of
Cyber Engineering, Xidian University, from 2013 to 2018, where
he was the Director of the Internet of Things Security Research
Nei Kato (Fellow, IEEE) is currently a Full Center from 2016 to 2018. Since January 2019, he has been a
Professor (Deputy Dean) with the Gradu- Full Professor with the School of Cyberspace Security, Northwestern
ate School of Information Sciences (GSIS) Polytechnical University, Xi’an. He was selected into the prestigious
and the Director of Research Organization Huashan Scholars Program by Xidian University in 2015. He has
of Electrical Communication (ROEC), Tohoku published around 130 peer-reviewed articles in many high-quality
University, Sendai, Japan. He has published publications, including the prestigious IEEE journals and confer-
more than 400 articles in prestigious peer- ences. His research interests cover a wide range of areas, including
reviewed journals and conferences. He has load balancing, wireless and mobile ad hoc networks, fiber-wireless
been engaged in research on computer net- networks, the Internet of Things, cloud computing and storage,
working, wireless mobile communications, satellite communica- network security, LTE-A and 5G, SDN, and NFV.
tions, ad hoc and sensor and mesh networks, smart grid, artificial Dr. Liu received the IEEE ComSoc Asia–Pacific Outstanding Young
intelligence (AI), Internet of Things (IoT), big data, and pattern Researcher Award in 2017, the IEEE TVT Top Editor Award in 2017,
recognition. the Best Paper Awards from many international conferences, includ-
Dr. Kato is a Fellow of The Engineering Academy of Japan and ing IEEE flagship events, such as the IEEE GLOBECOM in 2016,
Institute of Electronics, Information and Communication Engineers the IEEE Wireless Communications and Networking Conference
(IEICE). He is also the Vice-President (Member & Global Activities) (WCNC) in 2012 and 2014, and the IEEE International Conference
of the IEEE Communications Society from 2018 to 2019. He was on Network Infrastructure and Digital Content (IC-NIDC) in 2018. He
a member of the IEEE Communications Society Award Committee was a recipient of the prestigious 2012 Niwa Yasujiro Outstanding
from 2015 to 2017. His awards include the Minoru Ishida Foundation Paper Award due to his exceptional contribution to the analytics
Research Encouragement Prize in 2003, the Distinguished Contri- modeling of two-hop ad hoc mobile networks, which has been
butions to Satellite Communications Award from the IEEE Com- regarded by the award committees as the theoretical foundation for
munications Society of the Satellite and Space Communications analytical evaluation techniques of future ad hoc mobile networks.
Technical Committee in 2005, the FUNAI information Science Award He is also a Distinguished Lecturer of the IEEE Communications
in 2007, the TELCOM System Technology Award from Foundation Society.

16 P ROCEEDINGS OF THE IEEE

You might also like