A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game

被引:1
|
作者
Li, Fushuai [1 ]
Lin, Ruiquan [1 ]
Wang, Jun [1 ]
Hu, Jinsong [2 ]
Shu, Feng [3 ,4 ]
Wu, Liang [5 ]
机构
[1] Fuzhou Univ, Coll Elect Engn & Automat, Fuzhou 350108, Peoples R China
[2] Fuzhou Univ, Coll Phys & Informat Engn, Fuzhou 350108, Peoples R China
[3] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Peoples R China
[4] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[5] Southeast Univ, Frontiers Sci Ctr Mobile Informat Commun & Secur, Natl Mobile Commun Res Lab, Nanjing 210006, Peoples R China
基金
中国国家自然科学基金;
关键词
Sensors; Blockchains; Games; Fading channels; Data mining; Smart contracts; Signal to noise ratio; Cognitive internet of vehicles (CIoV); evolutionary game; spectrum sensing data falsification (SSDF); blockchain; COGNITIVE RADIO NETWORKS; BYZANTINE ATTACK; SPECTRUM;
D O I
10.1109/LCOMM.2023.3331360
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This letter investigates the problem for Spectrum Sensing Data Falsification (SSDF) attacks in the Cognitive Internet of Vehicles (CIoV) network. The high-speed movement of Vehicle Users (VUs) leads to rapid changes in Channel State Information (CSI) and location. This leads to unstable detection probabilities and unstable probabilities of reporting errors. These unstable probabilities increase the error rate of traditional methods to identify VUs as Malicious Vehicle Users (MVUs). And high-speed movement makes it difficult to detect MVUs, which may result in massive MVUs' attacks. To address the above problems, this letter establishes the Cooperative Spectrum Sensing (CSS) and spectrum access process under a Directed Acyclic Graph (DAG) blockchain framework, models MVUs' attack strategy selection which is determined by revenue as an evolutionary game, and proposes a smart contract that changes the mining difficulty of VUs based on the correctness of local spectrum sensing decisions to influence VUs' revenue. Finally, the simulation results verify the theoretical analysis and prove that the proposed method is superior to the traditional method.
引用
收藏
页码:3171 / 3175
页数:5
相关论文
共 24 条
  • [1] Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game
    Li, Fushuai
    Lin, Ruiquan
    Chen, Wencheng
    Wang, Jun
    Shu, Feng
    Chen, Riqing
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 2233 - 2250
  • [2] A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles
    Lin, Ruiquan
    Li, Fushuai
    Wang, Jun
    Hu, Jinsong
    Zhang, Zaichen
    Wu, Liang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (05) : 6954 - 6967
  • [3] Defending Against SSDF Attacks From Randomly Appearing Intelligent Malicious Vehicle Users in the CIoV Network by Bayesian Stackelberg Game
    Li, Fushuai
    Lin, Ruiquan
    Chen, Wencheng
    Wang, Jun
    Hu, Jinsong
    Shu, Feng
    IEEE SENSORS JOURNAL, 2024, 24 (19) : 31310 - 31323
  • [4] Proof of Reputation: A Blockchain-Based Countermeasure to Defend Against Massive SSDF in Cognitive Radio Networks
    Yang, Ning
    Jiang, Hao
    Guo, Daoxing
    Liu, Yuan
    Ding, Guoru
    Chen, Zhen
    Yang, Zhaohui
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (11) : 2693 - 2697
  • [5] ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks
    Patnaik, Milan (milanpatn@gmail.com), 1600, Institute of Electrical and Electronics Engineers Inc., United States (02):
  • [6] Introducing a Fair Tax Method to Harden Industrial Blockchain Applications against Network Attacks: A Game Theory Approach
    Stodt, Fatemeh
    Reich, Christoph
    COMPUTERS, 2023, 12 (03)
  • [7] A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks
    Huang, Zhao
    Gao, Xin
    Liu, Xiao
    Fan, Lu
    Wang, Junjun
    Wang, Quan
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 299 - 304
  • [8] An Optimal Reputation-based Detection against SSDF Attacks in Industrial Cognitive Radio Network
    Wang, Pujue
    Chen, Cailian
    Zhu, Shanying
    Lyu, Ling
    Zhang, Weidong
    Guan, Xinping
    2017 13TH IEEE INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2017, : 729 - 734
  • [9] Intelligent Network Element: A Programmable Switch Based on Machine Learning to Defend Against DDoS Attacks
    Yan, Jingfu
    Zhou, Huachun
    Wang, Weilin
    INFORMATION SYSTEMS FRONTIERS, 2025,
  • [10] Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game
    Liu, Xiaohu
    Zhang, Hengwei
    Zhang, Yuchen
    Shao, Lulu
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020