Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach

被引:14
|
作者
Shoukry, Yasser [1 ]
Mishra, Shaunak
Luo, Zutian [2 ]
Diggavi, Suhas [2 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Calif Los Angeles, Dept Elect & Comp Engn, Los Angeles, CA USA
来源
2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018) | 2018年
基金
美国国家科学基金会;
关键词
Secure Smart transportation systems; Sybil attacks; resilient routing; EXTENDED KALMAN FILTER; STATE ESTIMATION; SYSTEMS;
D O I
10.1109/ICCPS.2018.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a crowdsourcing aided road traffic estimation setup, where a fraction of users (vehicles) are malicious, and report wrong sensory information, or even worse, report the presence of Sybil (ghost) vehicles that do not physically exist. The motivation for such attacks lies in the possibility of creating a "virtual" congestion that can influence routing algorithms, leading to "actual" congestion and chaos. We propose a Sybil attack-resilient traffic estimation and routing algorithm that is resilient against such attacks. In particular, our algorithm leverages noisy information from legacy sensing infrastructure, along with the dynamics and proximity graph of vehicles inferred from crowdsourced data. Furthermore, the scalability of our algorithm is based on efficient Boolean Satisfiability (SAT) solvers. We validated our algorithm using real traffic data from the Italian city of Bologna. Our algorithm led to a significant reduction in average travel time in the presence of Sybil attacks, including cases where the travel time was reduced from about an hour to a few minutes.
引用
收藏
页码:43 / 54
页数:12
相关论文
共 50 条
  • [1] Resilient Physics-Based Traffic Congestion Control
    Rastgoftar, Hossein
    Girard, Anouck
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 4120 - 4125
  • [2] Trust-Aware Sybil Attack Detection for Resilient Vehicular Communication
    Morton, Thomas L.
    Borah, Abinash
    Paranjothi, Anirudh
    INTERNET TECHNOLOGY LETTERS, 2024,
  • [3] A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs
    Ayaida, Marwane
    Messai, Nadhir
    Najeh, Sameh
    Ndjore, Kouame Boris
    AD HOC NETWORKS, 2019, 90
  • [4] An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
    Hussain, Muhammad Zunnurain
    Hanapi, Zurina Mohd
    Abdullah, Azizol
    Hussin, Masnida
    Ninggal, Mohd Izuan Hafez
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [5] An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
    Hussain, Muhammad Zunnurain
    Hanapi, Zurina Mohd
    Abdullah, Azizol
    Hussin, Masnida
    Ninggal, Mohd Izuan Hafez
    PeerJ Computer Science, 2024, 10
  • [6] Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    2015 IEEE 12TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2015, : 91 - 95
  • [7] An approach to mitigating Sybil attack in wireless networks using ZigBee
    Lee, Gunhee
    Lim, Jaesung
    Kim, Dong-Kyoo
    Yang, SungHyun
    Yoon, MyungHyun
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1005 - +
  • [8] An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks
    Cheng, Chunling
    Qian, Yaqiu
    Zhang, Dengyin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [9] DTMS: A Dual Trust-Based Multi-level Sybil Attack Detection Approach in WSNs
    Khan, Tayyab
    Singh, Karan
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (03) : 1389 - 1420
  • [10] An improved localization approach based on Sybil attack for WSN
    Zheng, Luping
    PHYSICAL COMMUNICATION, 2024, 63