Cloud-based Sybil Attack Detection Scheme for Connected Vehicles

被引:0
|
作者
Anwar, Anika [1 ]
Halabi, Talal [1 ]
Zulkernine, Mohammad [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
关键词
cloud; connected vehicle; security; Sybil attack; DEFENSE;
D O I
10.1109/csnet47905.2019.9108923
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automated and connected vehicle technologies are among the most heavily researched automotive technologies. As a part of an Intelligent Transportation System (ITS), connected vehicles provide useful information to drivers and the infrastructure to help make safer and more informed decisions. However, vehicle connectivity has made the ITS more vulnerable to security attacks that can endanger vehicle's security as well as driver's safety. Sybil attack is a very common attack, considered dangerous in a distributed network with no centralized authority. When launched against connected vehicles, it consists of controlling a set of vehicles with forged or fake identities to try to alter the measurements and data collected by the ITS, leading to sub-optimal decisions. In this paper, we provide a cloud-based detection scheme for connected vehicles against such an attack. Contrary to the previous distributed solutions in the literature, this paper presents a cloud-based solution that integrates a cloud-based authorization unit to authenticate legitimate nodes using symmetric cryptography and real-time location tracking. As a centralized authentication system, cloud computing is more reliable and secure in managing the vehicle as a device than any other infrastructure in the vehicular network and can provide real-time visibility. A trust evaluation approach is also integrated into the scheme to drive the decisions of the vehicles concerning potential collaborations. The performed experiment and security analysis show the efficacy of our proposed cloud-based solution in terms of detection rate, complexity and system requirements.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] A Mobile Cloud-Based eHealth Scheme
    Liu, Yihe
    Abbasi, Aaqif Afzaal
    Aghaei, Atefeh
    Abbasi, Almas
    Mosavi, Amir
    Shamshirbane, Shahaboddin
    Al-qaness, Mohammed A. A.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (01): : 31 - 39
  • [22] A Cloud-Based Trajectory Index Scheme
    Chu, Shih-Tsun
    Yeh, Chao-Chun
    Huang, Chun-Lung
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 602 - 607
  • [23] On the Sybil attack detection in VANET
    Guette, Gilles
    Ducourthial, Bertrand
    2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, : 1053 - 1058
  • [24] Sybil Attack Type Detection in Wireless Sensor Networks based on Received Signal Strength Indicator detection scheme
    Marian, Salavat
    Mircea, Popa
    2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 121 - 124
  • [25] Vehicle Driving Pattern Based Sybil Attack Detection
    Gu, Pengwenlong
    Khatoun, Rida
    Begriche, Youcef
    Serhrouchni, Ahmed
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1282 - 1288
  • [26] Real-Time, Cloud-based Object Detection for Unmanned Aerial Vehicles
    Lee, Jangwon
    Wang, Jingya
    Crandall, David
    Sabanovic, Selma
    Fox, Geoffrey
    2017 FIRST IEEE INTERNATIONAL CONFERENCE ON ROBOTIC COMPUTING (IRC), 2017, : 36 - 43
  • [27] DoS Attack Detection in Internet-Connected Vehicles
    Soryal, Joseph
    Saadawi, Tarek
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 7 - 13
  • [28] A Sybil Attack Detection Scheme for Privacy-Preserving Mobile Social Networks
    Li, Pengfei
    Lu, Rongxing
    2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [29] A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
    Wang, Hui
    Ma, Li
    Bai, Hong-ying
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 752 - 756
  • [30] RCA-IDS: A Novel Real-time Cloud-based Adversarial IDS for Connected Vehicles
    Pooranian, Zahra
    Shojafar, Mohammad
    Asef, Pedram
    Robinson, Matthew
    Lees, Harry
    Longden, Mark
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 495 - 503