Cloud-based Sybil Attack Detection Scheme for Connected Vehicles

被引:0
|
作者
Anwar, Anika [1 ]
Halabi, Talal [1 ]
Zulkernine, Mohammad [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
关键词
cloud; connected vehicle; security; Sybil attack; DEFENSE;
D O I
10.1109/csnet47905.2019.9108923
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automated and connected vehicle technologies are among the most heavily researched automotive technologies. As a part of an Intelligent Transportation System (ITS), connected vehicles provide useful information to drivers and the infrastructure to help make safer and more informed decisions. However, vehicle connectivity has made the ITS more vulnerable to security attacks that can endanger vehicle's security as well as driver's safety. Sybil attack is a very common attack, considered dangerous in a distributed network with no centralized authority. When launched against connected vehicles, it consists of controlling a set of vehicles with forged or fake identities to try to alter the measurements and data collected by the ITS, leading to sub-optimal decisions. In this paper, we provide a cloud-based detection scheme for connected vehicles against such an attack. Contrary to the previous distributed solutions in the literature, this paper presents a cloud-based solution that integrates a cloud-based authorization unit to authenticate legitimate nodes using symmetric cryptography and real-time location tracking. As a centralized authentication system, cloud computing is more reliable and secure in managing the vehicle as a device than any other infrastructure in the vehicular network and can provide real-time visibility. A trust evaluation approach is also integrated into the scheme to drive the decisions of the vehicles concerning potential collaborations. The performed experiment and security analysis show the efficacy of our proposed cloud-based solution in terms of detection rate, complexity and system requirements.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] An Auditing Scheme for Cloud-Based Checkout Systems
    Chang, Tao-Ku
    Lu, Cheng-Yen
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 423 - 437
  • [32] An Auditing Scheme for Cloud-based Checkout Systems
    Chang, Tao-Ku
    Lu, Cheng-Yen
    Journal of Computers (Taiwan), 2019, 30 (06) : 252 - 262
  • [33] A Cloud-based Architecture for Network Attack Signature Learning
    Hamdi, Omessaad
    Mbaye, Maissa
    Krief, Francine
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [34] Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning
    Loukas, George
    Tuan Vuong
    Heartfield, Ryan
    Sakellari, Georgia
    Yoon, Yongpil
    Gan, Diane
    IEEE ACCESS, 2018, 6 : 3491 - 3508
  • [35] Semantic Point Cloud-Based Adaptive Multiple Object Detection and Tracking for Autonomous Vehicles
    Kim, Soyeong
    Ha, Jinsu
    Jo, Kichun
    IEEE ACCESS, 2021, 9 : 157550 - 157562
  • [36] Sybil Attack Detection Based on Signal Clustering in Vehicular Networks
    Tulay, Halit Bugra
    Emre Koksal, Can
    IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 753 - 765
  • [37] Sybil Attack Detection in Urban Vanets Based on RSU Support
    Hamed, Hamid
    Keshavarz-Haddad, Alireza
    Haghighi, Shapour Golbahar
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 602 - 606
  • [38] Lightweight Sybil Attack Detection in MANETs
    Abbas, Sohail
    Merabti, Madjid
    Llewellyn-Jones, David
    Kifayat, Kashif
    IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 236 - 248
  • [39] Sybil Attack Detection Based on RSSI for Wireless Sensor Network
    Wang, Jiangtao
    Yang, Geng
    Sun, Yuan
    Chen, Shengshou
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2684 - 2687
  • [40] Sybil Attack Detection Method Based on Geographic Information in ZigBee
    Huang, Mei-gen
    Yu, Bin
    Kong, Zhi-yin
    Zhou, Wei-wei
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 336 - 341