Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach

被引:14
|
作者
Shoukry, Yasser [1 ]
Mishra, Shaunak
Luo, Zutian [2 ]
Diggavi, Suhas [2 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Calif Los Angeles, Dept Elect & Comp Engn, Los Angeles, CA USA
来源
2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018) | 2018年
基金
美国国家科学基金会;
关键词
Secure Smart transportation systems; Sybil attacks; resilient routing; EXTENDED KALMAN FILTER; STATE ESTIMATION; SYSTEMS;
D O I
10.1109/ICCPS.2018.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a crowdsourcing aided road traffic estimation setup, where a fraction of users (vehicles) are malicious, and report wrong sensory information, or even worse, report the presence of Sybil (ghost) vehicles that do not physically exist. The motivation for such attacks lies in the possibility of creating a "virtual" congestion that can influence routing algorithms, leading to "actual" congestion and chaos. We propose a Sybil attack-resilient traffic estimation and routing algorithm that is resilient against such attacks. In particular, our algorithm leverages noisy information from legacy sensing infrastructure, along with the dynamics and proximity graph of vehicles inferred from crowdsourced data. Furthermore, the scalability of our algorithm is based on efficient Boolean Satisfiability (SAT) solvers. We validated our algorithm using real traffic data from the Italian city of Bologna. Our algorithm led to a significant reduction in average travel time in the presence of Sybil attacks, including cases where the travel time was reduced from about an hour to a few minutes.
引用
收藏
页码:43 / 54
页数:12
相关论文
共 50 条
  • [41] Signal Strength Based Sybil Attack Detection in Wireless Ad hoc Networks
    Abbas, S.
    Merabti, M.
    Llewellyn-Jones, D.
    2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2009, : 190 - 195
  • [42] Physics-based Electromigration Assessment for Power Grid Networks
    Huang, Xin
    Yu, Tan
    Sukharev, Valeriy
    Tan, Sheldon X. -D.
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [43] An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks
    Triki, Bayrem
    Rekhis, Slim
    Boudriga, Noureddine
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [44] Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks
    Saxena, Sweety
    Sejwar, Vikas
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 15 - 30
  • [45] Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
    Gu, Pengwenlong
    Khatoun, Rida
    Begriche, Youcef
    Serhrouchni, Ahmed
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [46] A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
    Arshad, Akashah
    Hanapi, Zurina Mohd
    Subramaniam, Shamala
    Latip, Rohaya
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 33
  • [47] Detecting Sybil Attack based on State Information in Underwater Wireless Sensor Networks
    Li, Xun
    Han, Guangjie
    Qian, Aihua
    Shu, Lei
    Rodrigues, Joel
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 116 - 120
  • [48] Similarity-Based and Sybil Attack Defended Community Detection for Social Networks
    Jiang, Zhongyuan
    Li, Jing
    Ma, Jianfeng
    Yu, Philip S.
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3487 - 3491
  • [49] Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks
    Dogan-Tusha, Seda
    Althunibat, Saud
    Qaraqe, Marwa
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1136 - 1147
  • [50] Event-Triggered Fixed-Time Resilient Control for Mobile Sensor Networks with a Sybil Attack and Input Delay
    Zhou, Ding
    He, Lei
    Cao, Zhigang
    Zhang, An
    Han, Xiaopeng
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2025, 35 (01) : 129 - 142