Malicious attack detection based on traffic-flow information fusion

被引:0
作者
Chen, Ye [1 ]
Lai, Yingxu [1 ]
Zhang, Zhaoyi [1 ]
Li, Hanmei [1 ]
Wang, Yuhang [1 ]
机构
[1] Beijing Univ Technol, Beijing, Peoples R China
来源
2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) | 2022年
基金
国家重点研发计划;
关键词
Vehicular networks; Attack detection; Sybil attacks; Traffic flow characterization; Information fusion; MISBEHAVIOR DETECTION; INTERNET; SCHEME;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While vehicle-to-everything communication technology enables information sharing and cooperative control for vehicles, it also poses a significant threat to the vehicles' driving security owing to cyber-attacks. In particular, Sybil malicious attacks hidden in the vehicle broadcast information flow are challenging to detect, thereby becoming an urgent issue requiring attention. Several researchers have considered this problem and proposed different detection schemes. However, the detection performance of existing schemes based on plausibility checks and neighboring observers is affected by the traffic and attacker densities. In this study, we propose a malicious attack detection scheme based on traffic-flow information fusion, which enables the detection of Sybil attacks without neighboring observer nodes. Our solution is based on the basic safety message, which is broadcast by vehicles periodically. It first constructs the basic features of traffic flow to reflect the traffic state, subsequently fuses it with the road detector information to add the road fusion features, and then classifies them using machine learning algorithms to identify malicious attacks. The experimental results demonstrate that our scheme achieves the detection of Sybil attacks with an accuracy greater than 90% at different traffic and attacker densities. Our solutions provide security for achieving a usable vehicle communication network.
引用
收藏
页数:9
相关论文
共 29 条
[1]  
Alzahrani Mohammed, 2021, 2021 International Conference on Data Science and Its Applications (ICoDSA), P54, DOI 10.1109/ICoDSA53588.2021.9617502
[2]   PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks [J].
Boualouache, Abdelwahab ;
Senouci, Sidi-Mohammed ;
Moussaoui, Samira .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (08) :3209-3218
[3]  
Dayal A, 2021, 2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING), DOI [10.23919/IFIPNetworking52078.2021.9472822, 10.23919/IFIPNETWORKING52078.2021.9472822]
[4]  
Ercan Secil., 2021, ICC 2021-IEEE International Conference on Communications, P1
[5]   Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network [J].
Ghaleb, Fuad A. ;
Maarof, Mohd Aizaini ;
Zainal, Anazida ;
Al-Rimy, Bander Ali Saleh ;
Saeed, Faisal ;
Al-Hadhrami, Tawfik .
IEEE ACCESS, 2019, 7 :159119-159140
[6]   Security issues and challenges in V2X: A Survey [J].
Ghosal, Amrita ;
Conti, Mauro .
COMPUTER NETWORKS, 2020, 169
[7]   A Privacy-Preserving Misbehavior Detection System in Vehicular Communication Networks [J].
Gyawali, Sohan ;
Qian, Yi ;
Hu, Rose Qingyang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) :6147-6158
[8]  
Gyawali S, 2019, IEEE ICC
[9]   Machine Learning and Reputation Based Misbehavior Detection in Vehicular Communication Networks [J].
Gyawali, Sohan ;
Qian, Yi ;
Hu, Rose Qingyang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) :8871-8885
[10]  
Hawlader F., 2021, 2021 IEEE INT C COMM, P1