Credibility Enhanced Temporal Graph Convolutional Network Based Sybil Attack Detection On Edge Computing Servers

被引:12
作者
Luo, Baiting [1 ]
Liu, Xiangguo [1 ]
Zhu, Qi [1 ]
机构
[1] Northwestern Univ, Dept Elect & Comp Engn, Evanston, IL 60201 USA
来源
2021 32ND IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV) | 2021年
关键词
INTRUSION DETECTION; VANETS; TRUST;
D O I
10.1109/IV48863.2021.9575361
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The emerging vehicular edge computing (VEC) technology has the potential to bring revolutionary development to vehicular ad hoc network (VANET). However, the edge computing servers (ECSs) are subjected to a variety of security threats. One of the most dangerous types of security attacks is the Sybil attack, which can create fabricated virtual vehicles (called Sybil vehicles) to significantly overload ECSs' limited computation resources and thus disrupt legitimate vehicles' edge computing applications. In this paper, we present a novel Sybil attack detection system on ECSs that is based on the design of a credibility enhanced temporal graph convolutional network. Our approach can identify the malicious vehicles in a dynamic traffic environment while preserving the legitimate vehicles' privacy, particularly their local position information. We evaluate our proposed approach in the SUMO simulator. The results demonstrate that our proposed detection system can accurately identify most Sybil vehicles while maintaining a low error rate.
引用
收藏
页码:524 / 531
页数:8
相关论文
共 30 条
[1]  
[Anonymous], 2017, 2017 IEEE WIR COMM N, P1
[2]  
[Anonymous], 2008, ADV DATA MINING TECH
[3]   Smart Handoff Technique for Internet of Vehicles Communication using Dynamic Edge-Backup Node [J].
Awan, Khalid Mahmood ;
Nadeem, Malik ;
Sadiq, Ali Safaa ;
Alghushami, Abdullah ;
Khan, Imran ;
Rabie, Khaled .
ELECTRONICS, 2020, 9 (03)
[4]  
Cho K., 2014, ARXIV14061078, DOI [DOI 10.3115/V1/D14-1179, 10.3115/v1/D14-1179]
[5]  
Gao H., 2019, PR MACH LEARN RES
[6]  
Grover Jyoti., 2011, P 4 INT C SECURITY I, P151, DOI [10.1145/2070425.2070450, DOI 10.1145/2070425.2070450]
[7]  
Grover Jyoti., 2010, Proceedings of the 3rd international conference on Security of information and networks, P249
[8]  
Gu PWL, 2017, PROCEEDINGS OF THE 2017 THIRD INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)
[9]  
Hao Y, 2011, GLOB TELECOMM CONF
[10]  
Kipf T. N., 2017, INT C LEARN REPR ICL, DOI [10.1051/0004-6361/201527329, DOI 10.48550/ARXIV.1609.02907]