亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Complex attack detection scheme using history trajectory in internet of vehicles

计算机科学 计算机安全 弹道 互联网 无线 方案(数学) 计算机网络 实时计算 电信 数学分析 物理 数学 天文 万维网
作者
Won-Jin Chung,Taeho Cho
出处
期刊:Egyptian Informatics Journal [Elsevier BV]
卷期号:23 (3): 499-510
标识
DOI:10.1016/j.eij.2022.05.002
摘要

The internet of vehicles technology provides convenience to drivers and prevents traffic accidents via wireless communication between road infrastructure and autonomous vehicles by sharing real-time traffic information. However, attackers can easily penetrate networks by exploiting the vulnerabilities of wireless communications. An attacker can falsify real-time traffic information and transmit it to a vehicle, causing traffic jams or preventing autonomous vehicles from receiving legitimate real-time traffic information. If autonomous vehicles do not receive accurate information, the arrival time at the destination can be affected, and accidents due to incorrect driving can occur. Because traffic accidents can cause casualties, they must be prevented. Various schemes have been proposed to detect attacks that occur on the internet of vehicles, and these security schemes can prevent traffic accidents by detecting attacks at high speeds. However, the existing schemes focus on quickly identifying a single attack but encounter difficulties when attempting to detect complex attacks that occur simultaneously. The proposed scheme uses a history trajectory to detect complex attacks. The proposed scheme stores behavioral information on all vehicles and road infrastructure using a control center. This information becomes a history trajectory that is used to detect attacks. Thereafter, when the vehicle is abnormally driven, the control center analyzes its driving path. When analyzing the vehicle driving process, the control center determines that an attack is being attempted when the road infrastructure or a vehicle makes an erroneous state transition. In addition, the type of attack is analyzed to identify compromised vehicles or road infrastructure and take measures to prevent further problems. Thus, the proposed scheme can detect complex attacks through history trajectory analysis. The experimental results demonstrate that in 80% of attempted attacks, the proposed scheme detects complex attacks with a probability of 97.56%.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
镜湖医庄发布了新的文献求助10
1秒前
19秒前
情怀应助我爱科研采纳,获得10
55秒前
绾妤完成签到 ,获得积分0
59秒前
1分钟前
1分钟前
1分钟前
我爱科研发布了新的文献求助10
1分钟前
1分钟前
隐形曼青应助小小K采纳,获得10
1分钟前
废飞飞发布了新的文献求助10
1分钟前
1分钟前
小小K发布了新的文献求助10
1分钟前
1分钟前
1分钟前
archer01完成签到,获得积分10
1分钟前
archer01发布了新的文献求助10
1分钟前
科研通AI6.2应助废飞飞采纳,获得10
1分钟前
1分钟前
123发布了新的文献求助10
2分钟前
paradox完成签到 ,获得积分10
2分钟前
2分钟前
2分钟前
2分钟前
RSU发布了新的文献求助10
2分钟前
3分钟前
Riversource完成签到,获得积分10
3分钟前
KINGAZX完成签到 ,获得积分10
3分钟前
3分钟前
babaking发布了新的文献求助10
3分钟前
4分钟前
bagman发布了新的文献求助10
4分钟前
无情的宛菡完成签到 ,获得积分10
4分钟前
babaking完成签到,获得积分10
4分钟前
Tree_QD完成签到 ,获得积分10
4分钟前
牛幻香完成签到,获得积分10
4分钟前
4分钟前
SciGPT应助Sunney采纳,获得10
4分钟前
WWW完成签到 ,获得积分10
4分钟前
4分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Les Mantodea de Guyane Insecta, Polyneoptera 2000
The politics of sentencing reform in the context of U.S. mass incarceration 1000
基于非线性光纤环形镜的全保偏锁模激光器研究 800
Pulse width control of a 3-phase inverter with non sinusoidal phase voltages 777
Signals, Systems, and Signal Processing 610
Research Methods for Applied Linguistics: A Practical Guide 600
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6407700
求助须知:如何正确求助?哪些是违规求助? 8226760
关于积分的说明 17449210
捐赠科研通 5460466
什么是DOI,文献DOI怎么找? 2885499
邀请新用户注册赠送积分活动 1861831
关于科研通互助平台的介绍 1701916