Credibility Enhanced Temporal Graph Convolutional Network Based Sybil Attack Detection On Edge Computing Servers

被引:12
作者
Luo, Baiting [1 ]
Liu, Xiangguo [1 ]
Zhu, Qi [1 ]
机构
[1] Northwestern Univ, Dept Elect & Comp Engn, Evanston, IL 60201 USA
来源
2021 32ND IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV) | 2021年
关键词
INTRUSION DETECTION; VANETS; TRUST;
D O I
10.1109/IV48863.2021.9575361
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The emerging vehicular edge computing (VEC) technology has the potential to bring revolutionary development to vehicular ad hoc network (VANET). However, the edge computing servers (ECSs) are subjected to a variety of security threats. One of the most dangerous types of security attacks is the Sybil attack, which can create fabricated virtual vehicles (called Sybil vehicles) to significantly overload ECSs' limited computation resources and thus disrupt legitimate vehicles' edge computing applications. In this paper, we present a novel Sybil attack detection system on ECSs that is based on the design of a credibility enhanced temporal graph convolutional network. Our approach can identify the malicious vehicles in a dynamic traffic environment while preserving the legitimate vehicles' privacy, particularly their local position information. We evaluate our proposed approach in the SUMO simulator. The results demonstrate that our proposed detection system can accurately identify most Sybil vehicles while maintaining a low error rate.
引用
收藏
页码:524 / 531
页数:8
相关论文
共 30 条
[11]   Spam Review Detection with Graph Convolutional Networks [J].
Li, Ao ;
Qin, Zhou ;
Liu, Runshi ;
Yang, Yiqun ;
Li, Dong .
PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, :2703-2711
[12]   A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position [J].
Liang, Junwei ;
Chen, Jianyong ;
Zhu, Yingying ;
Yu, Richard .
APPLIED SOFT COMPUTING, 2019, 75 :712-727
[13]   Edge Computing for Autonomous Driving: Opportunities and Challenges [J].
Liu, Shaoshan ;
Liu, Liangkai ;
Tang, Jie ;
Yu, Bo ;
Wang, Yifan ;
Shi, Weisong .
PROCEEDINGS OF THE IEEE, 2019, 107 (08) :1697-1716
[14]  
Lopez PA, 2018, IEEE INT C INTELL TR, P2575, DOI 10.1109/ITSC.2018.8569938
[15]   Efficient Service Handoff Across Edge Servers via Docker Container Migration [J].
Ma, Lele ;
Yi, Shanhe ;
Li, Qun .
SEC 2017: 2017 THE SECOND ACM/IEEE SYMPOSIUM ON EDGE COMPUTING (SEC'17), 2017,
[16]  
Mohaisen A, 2011, IEEE INFOCOM SER, P1943, DOI 10.1109/INFCOM.2011.5934998
[17]  
Pareja A., 2020, ARXIVABS190210191
[18]  
Pearl J, 1988, PROBABILISTIC REASON, P29, DOI [DOI 10.1016/B978-0-08-051489-5.50008-4, 10.1016/B978-0-08-051489-5.50008-4]
[19]   An Intelligent Mechanism for Sybil Attacks Detection in VANETs [J].
Quevedo, Carlos H. O. O. ;
Quevedo, Ana M. B. C. ;
Campos, Gustavo A. ;
Gomes, Rafael L. ;
Celestino Jr, Joaquim ;
Serhrouchni, Ahmed .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[20]  
Raya M, 2008, IEEE INFOCOM SER, P1912