Trajectory tracking attack for vehicular ad-hoc networks

被引:0
作者
Li, Changrong [1 ]
Li, Zhenfu [1 ]
机构
[1] Dalian Maritime Univ, Coll Transportat Engn, Dalian, Peoples R China
来源
SECURITY AND PRIVACY | 2024年 / 7卷 / 06期
关键词
matrix completion; minimum RSU deployment; trajectory recovering attack; VANETs; VANET; AUTHENTICATION; SECURE;
D O I
10.1002/spy2.433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Maintaining user privacy and security is a critical concern in vehicular ad hoc networks (VANETs). However, prior research has neglected the study of matrix recovery attack methods in VANETs and the challenge of reducing the number of roadside units (RSUs). In this article, we formulate a path recovery strategy using matrix recovery techniques from an adversarial view. Subsequently, the challenge of minimizing RSUs while monitoring all user vehicles in a region is converted into a set cover problem. We introduce a heuristic algorithm that utilizes clustering to address this issue. To minimize matrix recovery errors, a Kalman filter based method is integrated to enhance the performance. This paper also presents an initial deployment of path recovery attacks, maintaining effectiveness even with certain defense mechanisms in place. Furthermore, we conduct simulation experiments to evaluate the effectiveness of the proposed attack strategy. The simulation results demonstrate the performance across various dimensions. Finally, the results show that the success rate of our proposed counter-defense strategy in overcoming user defenses surpasses 50%.
引用
收藏
页数:18
相关论文
共 45 条
[1]   Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET [J].
Abdelmaguid, Mohammed A. ;
Hassanein, Hossam S. ;
Zulkernine, Mohammad .
ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, :3762-3767
[2]  
Adele Gideon, 2024, 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), P0178, DOI 10.1109/CCWC60891.2024.10427979
[3]   Hybrid Algorithm to Detect DDoS Attacks in VANETs [J].
Adhikary, Kaushik ;
Bhushan, Shashi ;
Kumar, Sunil ;
Dutta, Kamlesh .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) :3613-3634
[4]   MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET [J].
Al-Mehdhara, Mohammed ;
Ruan, Na .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[5]   Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions [J].
Almarshoud, Mishri ;
Kiraz, Mehmet Sabir ;
Al-Bayatti, Ali H. .
ACM COMPUTING SURVEYS, 2024, 56 (10)
[6]   FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs [J].
Amaouche, Sara ;
Guezzaz, Azidine ;
Benkirane, Said ;
Azrour, Mourade ;
Khattak, Sohaib Bin Altaf ;
Farman, Haleem ;
Nasralla, Moustafa M. .
APPLIED SCIENCES-BASEL, 2023, 13 (13)
[7]   Highly accurate sybil attack detection in vanet using extreme learning machine with preserved location [J].
Balaram, Allam ;
Nabi, Shaik Abdul ;
Rao, Koppula Srinivas ;
Koppula, Neeraja .
WIRELESS NETWORKS, 2023, 29 (08) :3435-3443
[8]   Detecting Sybil Attacks Using Proofs of Work and Location in VANETs [J].
Baza, Mohamed ;
Nabil, Mahmoud ;
Mahmoud, Mohamed M. E. A. ;
Bewermeier, Niclas ;
Fidan, Kemal ;
Alasmary, Waleed ;
Abdallah, Mohamed .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :39-53
[9]   DUEL: Dempster Uncertainty-Based Enhanced-Trust Level Scheme for VANET [J].
Bhargava, Arpita ;
Verma, Shekhar .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) :15079-15090
[10]   Fast and practical intrusion detection system based on federated learning for VANET [J].
Chen, Xiuzhen ;
Qiu, Weicheng ;
Chen, Lixing ;
Ma, Yinghua ;
Ma, Jin .
COMPUTERS & SECURITY, 2024, 142