A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game

被引:1
|
作者
Li, Fushuai [1 ]
Lin, Ruiquan [1 ]
Wang, Jun [1 ]
Hu, Jinsong [2 ]
Shu, Feng [3 ,4 ]
Wu, Liang [5 ]
机构
[1] Fuzhou Univ, Coll Elect Engn & Automat, Fuzhou 350108, Peoples R China
[2] Fuzhou Univ, Coll Phys & Informat Engn, Fuzhou 350108, Peoples R China
[3] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Peoples R China
[4] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[5] Southeast Univ, Frontiers Sci Ctr Mobile Informat Commun & Secur, Natl Mobile Commun Res Lab, Nanjing 210006, Peoples R China
基金
中国国家自然科学基金;
关键词
Sensors; Blockchains; Games; Fading channels; Data mining; Smart contracts; Signal to noise ratio; Cognitive internet of vehicles (CIoV); evolutionary game; spectrum sensing data falsification (SSDF); blockchain; COGNITIVE RADIO NETWORKS; BYZANTINE ATTACK; SPECTRUM;
D O I
10.1109/LCOMM.2023.3331360
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This letter investigates the problem for Spectrum Sensing Data Falsification (SSDF) attacks in the Cognitive Internet of Vehicles (CIoV) network. The high-speed movement of Vehicle Users (VUs) leads to rapid changes in Channel State Information (CSI) and location. This leads to unstable detection probabilities and unstable probabilities of reporting errors. These unstable probabilities increase the error rate of traditional methods to identify VUs as Malicious Vehicle Users (MVUs). And high-speed movement makes it difficult to detect MVUs, which may result in massive MVUs' attacks. To address the above problems, this letter establishes the Cooperative Spectrum Sensing (CSS) and spectrum access process under a Directed Acyclic Graph (DAG) blockchain framework, models MVUs' attack strategy selection which is determined by revenue as an evolutionary game, and proposes a smart contract that changes the mining difficulty of VUs based on the correctness of local spectrum sensing decisions to influence VUs' revenue. Finally, the simulation results verify the theoretical analysis and prove that the proposed method is superior to the traditional method.
引用
收藏
页码:3171 / 3175
页数:5
相关论文
共 24 条
  • [21] Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm
    Jin, Hui
    Zhang, Senlei
    Zhang, Bin
    Dong, Shuqin
    Liu, Xiaohu
    Zhang, Hengwei
    Tan, Jinglei
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (03) : 292 - 302
  • [22] A Flexibility Scheduling Method for Distribution Network Based on Robust Graph DRL Against State Adversarial Attacks
    Yin, Ziyang
    Wang, Shouxiang
    Zhao, Qianyu
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2025, 13 (02): : 514 - 526
  • [23] Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model
    Tian, Wen
    Ji, Xiaopeng
    Liu, Weiwei
    Liu, Guangjie
    Lin, Rong
    Zhai, Jiangtao
    Dai, Yuewei
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (01): : 193 - 211
  • [24] A Probabilistic Data Recovery Framework Against Load Redistribution Attacks Based on Bayesian Network and Bias Correction Method
    Khaleghi, Ali
    Ghazizadeh, Mohammad Sadegh
    Aghamohammadi, Mohammad Reza
    Guerrero, Josep M.
    Vasquez, Juan C.
    Guan, Yajuan
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (04) : 5806 - 5817