Your browser doesn't support javascript.
loading
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.
Zhu, Yaling; Zeng, Jia; Weng, Fangchen; Han, Dan; Yang, Yiyu; Li, Xiaoqi; Zhang, Yuqing.
Afiliação
  • Zhu Y; The School of Cyberspace Security, Hainan University, Haikou 570208, China.
  • Zeng J; The School of Cyberspace Security, Hainan University, Haikou 570208, China.
  • Weng F; The School of Cyberspace Security, Hainan University, Haikou 570208, China.
  • Han D; The School of Cyberspace Security, Hainan University, Haikou 570208, China.
  • Yang Y; The School of Cyberspace Security, Hainan University, Haikou 570208, China.
  • Li X; The National Computer Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408, China.
  • Zhang Y; The School of Cyberspace Security, Hainan University, Haikou 570208, China.
Sensors (Basel) ; 24(7)2024 Mar 27.
Article em En | MEDLINE | ID: mdl-38610364
ABSTRACT
Connected Automobile Vehicles (CAVs) enable cooperative driving and traffic management by sharing traffic information between them and other vehicles and infrastructures. However, malicious vehicles create Sybil vehicles by forging multiple identities and sharing false location information with CAVs, misleading their decisions and behaviors. The existing work on defending against Sybil attacks has almost exclusively focused on detecting Sybil vehicles, ignoring the traceability of malicious vehicles. As a result, they cannot fundamentally alleviate Sybil attacks. In this work, we focus on tracking the attack source of malicious vehicles by using a novel detection mechanism that relies on vehicle broadcast beacon packets. Firstly, the roadside units (RSUs) randomly instruct vehicles to perform customized key broadcasting and listening within communication range. This allows the vehicle to prove its physical presence by broadcasting. Then, RSU analyzes the beacon packets listened to by the vehicle and constructs a neighbor graph between the vehicles based on the customized particular fields in the beacon packets. Finally, the vehicle's credibility is determined by calculating the edge success probability of vehicles in the neighbor graph, ultimately achieving the detection of Sybil vehicles and tracing malicious vehicles. The experimental results demonstrate that our scheme achieves the real-time detection and tracking of Sybil vehicles, with precision and recall rates of 98.53% and 95.93%, respectively, solving the challenge of existing detection schemes failing to combat Sybil attacks from the root.
Palavras-chave

Texto completo: 1 Base de dados: MEDLINE Idioma: En Revista: Sensors (Basel) Ano de publicação: 2024 Tipo de documento: Article País de afiliação: China

Texto completo: 1 Base de dados: MEDLINE Idioma: En Revista: Sensors (Basel) Ano de publicação: 2024 Tipo de documento: Article País de afiliação: China