Malicious Vehicle Detection Scheme Based on Spatio-Temporal Features of Traffic Flow Under Cloud-Fog Computing-Based IoVs

被引:1
|
作者
Gu, Ke [1 ]
Ouyang, Xin [1 ]
Wang, Yi [1 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Peoples R China
关键词
Malicious vehicle detection; Internet of Vehicles; graph attention; gated recurrent unit; reputation; MISBEHAVIOR DETECTION; INTRUSION DETECTION; INTERNET; EFFICIENT; VANETS;
D O I
10.1109/TITS.2024.3369974
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of vehicles (IoVs) is an important information exchange platform for intelligent transportation systems (ITSs) to provide traffic services. However, the appearance of malicious vehicles in IoVs can damage the security and stability of ITSs, which may provide false traffic data to cause serious traffic accidents. Also, many existing cryptography-based malicious vehicle detection scheme can only be used to resist some external attacks, while some internal malicious vehicles are easy to use their legal identities to provide false traffic data for other honest vehicles. In this paper, we propose a malicious vehicle detection scheme based on spatio-temporal features of traffic flow under cloud-fog computing-based IoVs. In our scheme, a traffic subarea division method based on spatial correlation degrees of road intersections is proposed to divide the urban road network into multiple traffic subareas. Based on the divided traffic subareas, an improved subarea-based graph attention model is proposed to extract the spatial features of traffic flow by the fog server. Then a gated recurrent unit method with attention mechanism is constructed to extract the temporal features of traffic flow by the cloud server, and a short-term traffic flow prediction model is built on the extracted spatio-temporal features of traffic flow. Further, a reputation calculation mechanism is established to score each vehicle by the fog server according to the verification of the traffic data uploaded by the vehicle and the traffic data predicted by our constructed prediction model, which is used to judge whether the vehicle is malicious according to its reputation score. Related experimental results show our scheme is effective and efficient to detect malicious vehicles under cloud-fog computing-based IoVs.
引用
收藏
页码:11534 / 11551
页数:18
相关论文
共 12 条
  • [1] Secure and Lightweight Vehicular Privacy Preservation Scheme Under Fog Computing-Based IoVs
    Xia, Zhuoqun
    Zeng, Lingxuan
    Gu, Ke
    Su, Chao
    Hu, Hangyu
    Long, Kejun
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (02): : 4115 - 4129
  • [2] Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
    Gu, Ke
    Dong, XinYing
    Jia, WeiJia
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1215 - 1232
  • [3] Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs
    Xia, Zhuoqun
    Zeng, Lingxuan
    Gu, Ke
    Li, Xiong
    Jia, Weijia
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [4] Location-Aware Reliable Task Cooperative-Computation Scheme Under Fog Computing-Based IoVs
    Gu, Ke
    Liu, Zhenlin
    Jia, Weijia
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (01) : 425 - 442
  • [5] Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
    Du, Ruizhong
    Li, Yun
    Liang, Xiaoyan
    Tian, Junfeng
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01) : 431 - 440
  • [6] Blockchain-Based Data Deduplication and Distributed Audit for Shared Data in Cloud-Fog Computing-Based VANETs
    Gu, Ke
    Wang, Yi
    Qiu, Juan
    Li, Xiong
    Zhang, Jianming
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (05): : 5548 - 5565
  • [7] Anomaly Detection Based on Spatio-Temporal and Sparse Features of Network Traffic in VANETs
    Nie, Laisen
    Wu, Yixuan
    Wang, Huizhi
    Li, Yongkang
    IEEE ACCESS, 2019, 7 : 177954 - 177964
  • [8] Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
    Ruizhong Du
    Yun Li
    Xiaoyan Liang
    Junfeng Tian
    Mobile Networks and Applications, 2022, 27 : 431 - 440
  • [9] Intrusion Detection Method for Internet of Vehicles Based on Parallel Analysis of Spatio-Temporal Features
    Xing, Ling
    Wang, Kun
    Wu, Honghai
    Ma, Huahong
    Zhang, Xiaohui
    SENSORS, 2023, 23 (09)
  • [10] Traffic Flow Prediction Model Based on Spatio-Temporal Dilated Graph Convolution
    Sun, Xiufang
    Li, Jianbo
    Lv, Zhiqiang
    Dong, Chuanhao
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (09): : 3598 - 3614