Detecting Malicious Roadside Units in Vehicular Social Networks for Information Service

被引:5
|
作者
Mao, Ming [1 ]
Yi, Peng [1 ]
Zhang, Jianhui [1 ]
Pei, Jinchuan [1 ]
机构
[1] Peoples Liberat Army Informat Engn Univ, Zhengzhou 450002, Peoples R China
关键词
Vehicular social networks; Trust management; Malicious node; Roadside unit; TRUST; SECURITY; MODEL;
D O I
10.1007/s11277-023-10392-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The accurate identification of malicious nodes in vehicular social networks (VSN) can ensure the secure and efficient operation of the mobile network. The roadside unit (RSU) undertakes various tasks in the internet of vehicles (IoV) and processes a large amount of data. It plays an indispensable and crucial role in the IoV. Therefore, the damage and scope of the attack on RSU are more significant. This paper proposes a trust model for detecting malicious RSUs (TMDMR) to realize the trust decision problem of the roadside unit in VSN. The trust management model is constructed by designing two main decision indicators (QoS trust and social trust) in vehicular social networks, and the algorithm is intended to complete the calculation of global trust. Finally, the global trust server implements the trust decision of RSU. The simulation results demonstrate that TMDMR is better than the comparison scheme in terms of Precision and Recall. When the malicious number of nodes is 45% during OA attack, the Precision of TMDMR is 5.3% and 26.2% higher than comparison schemes, and Recall value is also 4.7% and 30.1% higher than them, respectively. When the malicious number is 45%, TMDMR has the lowest packet dropping rate (23.8% and 44.7%) to the comparison schemes. Its end-to-end delay is 42% and 51.3% lower than other two schemes. It also has advantages in terms of response time to complete a round of detection.
引用
收藏
页码:2565 / 2588
页数:24
相关论文
共 50 条
  • [31] The Deployment of Roadside Units in Vehicular Networks Based on the V2I Connection Duration
    Mokhtari, Somayeh
    Mirjalily, Ghasem
    Silva, Cristiano M.
    Sarubbi, Joao Fernando M.
    Silva Nogueira, Jose Marcos
    2020 16TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2020,
  • [32] Delay-bounded Minimal Cost Placement of Roadside Units in Vehicular Ad hoc Networks
    Li, Peng
    Liu, Qin
    Huang, Chuanhe
    Wang, Jinhai
    Jia, Xiaohua
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6589 - 6594
  • [33] Protocols for Roadside-to-Roadside Data Relaying over Vehicular Networks
    Petit, Barath
    Ammar, Mostafa
    Fujimoto, Richard
    2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 294 - 299
  • [34] Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks
    Kotenko, Igor
    Saenko, Igor
    Chechulin, Andrey
    Desnitsky, Vasily
    Vitkova, Lidia
    Pronoza, Anton
    SOCIAL INFORMATICS (SOCINFO 2018), PT II, 2018, 11186 : 159 - 167
  • [35] REVERSE INTERVENTION FOR DEALING WITH MALICIOUS INFORMATION IN ONLINE SOCIAL NETWORKS
    Yuan, Deyu
    Sun, Haichun
    COMPUTING AND INFORMATICS, 2020, 39 (1-2) : 156 - 173
  • [36] Roadside units placement within city-scaled area in vehicular ad-hoc networks
    Ben Brahim, Mohamed
    Drira, Wassim
    Filali, Fethi
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 1010 - 1016
  • [37] A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
    Alkhalidy, Muhsen
    Al-Serhan, Atalla Fahed
    Alsarhan, Ayoub
    Igried, Bashar
    FUTURE INTERNET, 2022, 14 (08):
  • [38] Toward Detecting Malicious Links in Online Social Networks through User Behavior
    Alghamdi, Bandar
    Watson, Jason
    Xu, Yue
    2016 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE WORKSHOPS (WIW 2016), 2016, : 5 - 8
  • [39] Roadside-Aided Routing (RAR) in Vehicular Networks
    Peng, Yanlin
    Abichar, Zakhia
    Chang, J. Morris
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 3602 - 3607
  • [40] Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces
    Perdisci, Roberto
    Corona, Igino
    Dagon, David
    Lee, Wenke
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 311 - +