已入深夜,您辛苦了!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!祝你早点完成任务,早点休息,好梦!

Complex attack detection scheme using history trajectory in internet of vehicles

计算机科学 计算机安全 弹道 互联网 无线 方案(数学) 计算机网络 实时计算 电信 数学分析 物理 数学 天文 万维网
作者
Won-Jin Chung,Taeho Cho
出处
期刊:Egyptian Informatics Journal [Elsevier BV]
卷期号:23 (3): 499-510
标识
DOI:10.1016/j.eij.2022.05.002
摘要

The internet of vehicles technology provides convenience to drivers and prevents traffic accidents via wireless communication between road infrastructure and autonomous vehicles by sharing real-time traffic information. However, attackers can easily penetrate networks by exploiting the vulnerabilities of wireless communications. An attacker can falsify real-time traffic information and transmit it to a vehicle, causing traffic jams or preventing autonomous vehicles from receiving legitimate real-time traffic information. If autonomous vehicles do not receive accurate information, the arrival time at the destination can be affected, and accidents due to incorrect driving can occur. Because traffic accidents can cause casualties, they must be prevented. Various schemes have been proposed to detect attacks that occur on the internet of vehicles, and these security schemes can prevent traffic accidents by detecting attacks at high speeds. However, the existing schemes focus on quickly identifying a single attack but encounter difficulties when attempting to detect complex attacks that occur simultaneously. The proposed scheme uses a history trajectory to detect complex attacks. The proposed scheme stores behavioral information on all vehicles and road infrastructure using a control center. This information becomes a history trajectory that is used to detect attacks. Thereafter, when the vehicle is abnormally driven, the control center analyzes its driving path. When analyzing the vehicle driving process, the control center determines that an attack is being attempted when the road infrastructure or a vehicle makes an erroneous state transition. In addition, the type of attack is analyzed to identify compromised vehicles or road infrastructure and take measures to prevent further problems. Thus, the proposed scheme can detect complex attacks through history trajectory analysis. The experimental results demonstrate that in 80% of attempted attacks, the proposed scheme detects complex attacks with a probability of 97.56%.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
赘婿应助fox采纳,获得10
刚刚
核桃应助vicky采纳,获得20
3秒前
fsznc完成签到 ,获得积分0
3秒前
火火火木完成签到 ,获得积分10
5秒前
雨yu完成签到 ,获得积分10
11秒前
莉莉安完成签到 ,获得积分10
13秒前
酷波er应助nulinuli采纳,获得10
15秒前
咿咿呀呀发布了新的文献求助10
18秒前
19秒前
强健的迎波完成签到,获得积分10
21秒前
22秒前
林声完成签到,获得积分10
23秒前
23秒前
Ava应助名金学南采纳,获得30
26秒前
t忒对完成签到 ,获得积分20
27秒前
未夕晴发布了新的文献求助10
27秒前
Wang发布了新的文献求助10
29秒前
美好的惜天完成签到 ,获得积分10
29秒前
会化蝶发布了新的文献求助10
31秒前
34秒前
35秒前
碗碗发布了新的文献求助10
37秒前
jihenyouai0213完成签到,获得积分10
37秒前
菜菜发布了新的文献求助10
38秒前
俭朴梦菡完成签到,获得积分10
38秒前
40秒前
40秒前
xifanfan完成签到 ,获得积分10
42秒前
吃饱喝足就睡觉完成签到 ,获得积分10
43秒前
44秒前
UU发布了新的文献求助10
46秒前
王SQ完成签到 ,获得积分10
47秒前
48秒前
Lucas应助你好好好采纳,获得10
49秒前
优美的仇天完成签到,获得积分10
50秒前
51秒前
52秒前
53秒前
53秒前
周舟发布了新的文献求助10
54秒前
高分求助中
Les Mantodea de Guyane Insecta, Polyneoptera 2500
One Man Talking: Selected Essays of Shao Xunmei, 1929–1939 (PDF!) 1000
Technologies supporting mass customization of apparel: A pilot project 450
A Field Guide to the Amphibians and Reptiles of Madagascar - Frank Glaw and Miguel Vences - 3rd Edition 400
China Gadabouts: New Frontiers of Humanitarian Nursing, 1941–51 400
The Healthy Socialist Life in Maoist China, 1949–1980 400
Walking a Tightrope: Memories of Wu Jieping, Personal Physician to China's Leaders 400
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 纳米技术 计算机科学 化学工程 内科学 复合材料 物理化学 电极 遗传学 量子力学 基因 冶金 催化作用
热门帖子
关注 科研通微信公众号,转发送积分 3788098
求助须知:如何正确求助?哪些是违规求助? 3333579
关于积分的说明 10262519
捐赠科研通 3049385
什么是DOI,文献DOI怎么找? 1673537
邀请新用户注册赠送积分活动 802042
科研通“疑难数据库(出版商)”最低求助积分说明 760477