• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于车联网中信标数据包的女巫攻击检测与溯源机制

Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.

作者信息

Zhu Yaling, Zeng Jia, Weng Fangchen, Han Dan, Yang Yiyu, Li Xiaoqi, Zhang Yuqing

机构信息

The School of Cyberspace Security, Hainan University, Haikou 570208, China.

The National Computer Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408, China.

出版信息

Sensors (Basel). 2024 Mar 27;24(7):2153. doi: 10.3390/s24072153.

DOI:10.3390/s24072153
PMID:38610364
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11014042/
Abstract

Connected Automobile Vehicles (CAVs) enable cooperative driving and traffic management by sharing traffic information between them and other vehicles and infrastructures. However, malicious vehicles create Sybil vehicles by forging multiple identities and sharing false location information with CAVs, misleading their decisions and behaviors. The existing work on defending against Sybil attacks has almost exclusively focused on detecting Sybil vehicles, ignoring the traceability of malicious vehicles. As a result, they cannot fundamentally alleviate Sybil attacks. In this work, we focus on tracking the attack source of malicious vehicles by using a novel detection mechanism that relies on vehicle broadcast beacon packets. Firstly, the roadside units (RSUs) randomly instruct vehicles to perform customized key broadcasting and listening within communication range. This allows the vehicle to prove its physical presence by broadcasting. Then, RSU analyzes the beacon packets listened to by the vehicle and constructs a neighbor graph between the vehicles based on the customized particular fields in the beacon packets. Finally, the vehicle's credibility is determined by calculating the edge success probability of vehicles in the neighbor graph, ultimately achieving the detection of Sybil vehicles and tracing malicious vehicles. The experimental results demonstrate that our scheme achieves the real-time detection and tracking of Sybil vehicles, with precision and recall rates of 98.53% and 95.93%, respectively, solving the challenge of existing detection schemes failing to combat Sybil attacks from the root.

摘要

联网汽车(CAV)通过在它们自身以及与其他车辆和基础设施之间共享交通信息,实现协同驾驶和交通管理。然而,恶意车辆通过伪造多个身份并与联网汽车共享虚假位置信息来创建虚拟身份车辆,误导它们的决策和行为。现有的抵御虚拟身份攻击的工作几乎都只专注于检测虚拟身份车辆,而忽略了恶意车辆的可追溯性。因此,它们无法从根本上缓解虚拟身份攻击。在这项工作中,我们专注于通过使用一种依赖车辆广播信标数据包的新型检测机制来追踪恶意车辆的攻击源。首先,路边单元(RSU)随机指示车辆在通信范围内执行定制的密钥广播和监听。这使得车辆能够通过广播来证明其物理存在。然后,RSU分析车辆监听的信标数据包,并根据信标数据包中的定制特定字段构建车辆之间的邻居图。最后,通过计算邻居图中车辆的边成功概率来确定车辆的可信度,最终实现对虚拟身份车辆的检测并追踪恶意车辆。实验结果表明,我们的方案实现了对虚拟身份车辆的实时检测和追踪,精确率和召回率分别为98.53%和95.93%,解决了现有检测方案无法从根本上对抗虚拟身份攻击的挑战。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/d56e1e5d6b68/sensors-24-02153-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/686f95d54057/sensors-24-02153-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/92cd733beba5/sensors-24-02153-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/b52ed5f6737b/sensors-24-02153-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/a49df6e5b03d/sensors-24-02153-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/b9e83b4e830a/sensors-24-02153-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/8ef9e2e48592/sensors-24-02153-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/489edb8c4c07/sensors-24-02153-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/c63716dd5bb8/sensors-24-02153-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/d786c8a048a4/sensors-24-02153-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/58f267189d27/sensors-24-02153-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/8d383eebeb95/sensors-24-02153-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/51543e180817/sensors-24-02153-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/d56e1e5d6b68/sensors-24-02153-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/686f95d54057/sensors-24-02153-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/92cd733beba5/sensors-24-02153-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/b52ed5f6737b/sensors-24-02153-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/a49df6e5b03d/sensors-24-02153-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/b9e83b4e830a/sensors-24-02153-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/8ef9e2e48592/sensors-24-02153-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/489edb8c4c07/sensors-24-02153-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/c63716dd5bb8/sensors-24-02153-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/d786c8a048a4/sensors-24-02153-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/58f267189d27/sensors-24-02153-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/8d383eebeb95/sensors-24-02153-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/51543e180817/sensors-24-02153-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9d0c/11014042/d56e1e5d6b68/sensors-24-02153-g013.jpg

相似文献

1
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.基于车联网中信标数据包的女巫攻击检测与溯源机制
Sensors (Basel). 2024 Mar 27;24(7):2153. doi: 10.3390/s24072153.
2
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs.车联网中支持 Sybil 攻击检测的隐私保护密钥管理方案。
Sensors (Basel). 2021 Feb 4;21(4):1063. doi: 10.3390/s21041063.
3
Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network.针对车载自组织网络中的 Sybil 和虚假攻击的增强行为处理和足迹算法的安全措施。
Sensors (Basel). 2021 May 19;21(10):3538. doi: 10.3390/s21103538.
4
Secure Vehicular Platoon Management against Sybil Attacks.安全的车队管理抵御 Sybil 攻击。
Sensors (Basel). 2022 Nov 21;22(22):9000. doi: 10.3390/s22229000.
5
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.一种基于时分多址接入的自动驾驶车辆外部通信分层检测方法。
PLoS One. 2018 Jan 9;13(1):e0188760. doi: 10.1371/journal.pone.0188760. eCollection 2018.
6
Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.无线传感器网络中的安全数据聚合——针对女巫攻击的藤崎冈本(FO)认证方案
J Med Syst. 2017 Jul;41(7):107. doi: 10.1007/s10916-017-0743-2. Epub 2017 May 26.
7
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.基于细粒度物理信道信息的精确女巫攻击检测
Sensors (Basel). 2018 Mar 15;18(3):878. doi: 10.3390/s18030878.
8
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.
9
Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS).基于协同学习的车联网(VANETS)中的 Sybil 攻击检测。
Sensors (Basel). 2022 Sep 13;22(18):6934. doi: 10.3390/s22186934.
10
An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems.智能交通系统中恶意车辆检测的智能自动化系统。
Sensors (Basel). 2022 Aug 23;22(17):6318. doi: 10.3390/s22176318.

引用本文的文献

1
Securing Cloud-Based Internet of Things: Challenges and Mitigations.保障基于云的物联网安全:挑战与应对措施
Sensors (Basel). 2024 Dec 26;25(1):79. doi: 10.3390/s25010079.

本文引用的文献

1
Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment.保障云辅助联网和自动驾驶车辆安全:深入威胁分析与风险评估
Sensors (Basel). 2023 Dec 31;24(1):241. doi: 10.3390/s24010241.
2
Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study.基于机器学习的车载控制器局域网 (CAN) 总线入侵检测:性能比较研究。
Sensors (Basel). 2023 Mar 30;23(7):3610. doi: 10.3390/s23073610.