发表状态 | 已发表Published |
题名 | Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs |
作者 | |
发表日期 | 2022 |
发表期刊 | IEEE Transactions on Network Science and Engineering
![]() |
ISSN/eISSN | 2327-4697 |
卷号 | 9期号:3页码:1245-1263 |
摘要 | In this paper, we propose a cluster-based malicious node detection scheme for false downstream data in fog computing-based VANETs, where the fog servers are used to detect the suspicious data and the malicious cluster head nodes. In our proposed scheme, we further construct a trajectory clustering method among vehicle nodes, in which the cluster head nodes and the corresponding edge monitoring nodes are accurately selected. Also, under our proposed threat model, we analyze the potential security problems in detail. Compared with other related works, our proposed detection scheme can supervise the downstream data forwarded by the cluster head nodes and detect the malicious cluster head nodes. Further, the experimental results show our proposed scheme is efficient for fog computing-based VANETs. Therefore, our scheme may be used as an auxiliary mechanism of some cryptography-based schemes not only to ensure the security of the data forwarding process, but also to effectively and timely monitor the data forwarding process. |
关键词 | Cluster Cryptography False downstream data Fog computing Malicious node detection Monitoring Reliability Routing Security Servers Trajectory VANET |
DOI | 10.1109/TNSE.2021.3139005 |
URL | 查看来源 |
收录类别 | SCIE |
语种 | 英语English |
WOS研究方向 | Engineering ; Mathematics |
WOS类目 | Engineering, Multidisciplinary ; Mathematics, Interdisciplinary Applications |
WOS记录号 | WOS:000800200900028 |
Scopus入藏号 | 2-s2.0-85122582305 |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/8282 |
专题 | 理工科技学院 |
作者单位 | 1.School of Computer and Communication Engineering, Changsha University of Science and Technology, 12418 Changsha, Hunan, China, 410114 (e-mail: gk4572@163.com) 2.School of Computer and Communication Engineering, Changsha University of Science and Technology - Yuntang Campus, 12418 Changsha, Hunan, China, (e-mail: 296014320@qq.com) 3.School of Computer Science and Engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan, China, 610054 (e-mail: lixiongzhq@163.com) 4.Department of Computer and Information Science, Beijing Normal University-Hong Kong Baptist University United International College, 125809 Zhuhai, Guangdong, China, (e-mail: jiawei_1950@hotmail.com) |
推荐引用方式 GB/T 7714 | Gu, Ke,Dong, Xinying,Li, Xionget al. Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs[J]. IEEE Transactions on Network Science and Engineering, 2022, 9(3): 1245-1263. |
APA | Gu, Ke, Dong, Xinying, Li, Xiong, & Jia, Weijia. (2022). Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs. IEEE Transactions on Network Science and Engineering, 9(3), 1245-1263. |
MLA | Gu, Ke,et al."Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs". IEEE Transactions on Network Science and Engineering 9.3(2022): 1245-1263. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
查看访问统计 |
谷歌学术 |
谷歌学术中相似的文章 |
[Gu, Ke]的文章 |
[Dong, Xinying]的文章 |
[Li, Xiong]的文章 |
百度学术 |
百度学术中相似的文章 |
[Gu, Ke]的文章 |
[Dong, Xinying]的文章 |
[Li, Xiong]的文章 |
必应学术 |
必应学术中相似的文章 |
[Gu, Ke]的文章 |
[Dong, Xinying]的文章 |
[Li, Xiong]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论