科研成果详情

发表状态已发表Published
题名Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs
作者
发表日期2022
发表期刊IEEE Transactions on Network Science and Engineering
ISSN/eISSN2327-4697
卷号9期号:3页码:1245-1263
摘要

In this paper, we propose a cluster-based malicious node detection scheme for false downstream data in fog computing-based VANETs, where the fog servers are used to detect the suspicious data and the malicious cluster head nodes. In our proposed scheme, we further construct a trajectory clustering method among vehicle nodes, in which the cluster head nodes and the corresponding edge monitoring nodes are accurately selected. Also, under our proposed threat model, we analyze the potential security problems in detail. Compared with other related works, our proposed detection scheme can supervise the downstream data forwarded by the cluster head nodes and detect the malicious cluster head nodes. Further, the experimental results show our proposed scheme is efficient for fog computing-based VANETs. Therefore, our scheme may be used as an auxiliary mechanism of some cryptography-based schemes not only to ensure the security of the data forwarding process, but also to effectively and timely monitor the data forwarding process.

关键词Cluster Cryptography False downstream data Fog computing Malicious node detection Monitoring Reliability Routing Security Servers Trajectory VANET
DOI10.1109/TNSE.2021.3139005
URL查看来源
收录类别SCIE
语种英语English
WOS研究方向Engineering ; Mathematics
WOS类目Engineering, Multidisciplinary ; Mathematics, Interdisciplinary Applications
WOS记录号WOS:000800200900028
Scopus入藏号2-s2.0-85122582305
引用统计
被引频次:10[WOS]   [WOS记录]     [WOS相关记录]
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/8282
专题理工科技学院
作者单位
1.School of Computer and Communication Engineering, Changsha University of Science and Technology, 12418 Changsha, Hunan, China, 410114 (e-mail: gk4572@163.com)
2.School of Computer and Communication Engineering, Changsha University of Science and Technology - Yuntang Campus, 12418 Changsha, Hunan, China, (e-mail: 296014320@qq.com)
3.School of Computer Science and Engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan, China, 610054 (e-mail: lixiongzhq@163.com)
4.Department of Computer and Information Science, Beijing Normal University-Hong Kong Baptist University United International College, 125809 Zhuhai, Guangdong, China, (e-mail: jiawei_1950@hotmail.com)
推荐引用方式
GB/T 7714
Gu, Ke,Dong, Xinying,Li, Xionget al. Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs[J]. IEEE Transactions on Network Science and Engineering, 2022, 9(3): 1245-1263.
APA Gu, Ke, Dong, Xinying, Li, Xiong, & Jia, Weijia. (2022). Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs. IEEE Transactions on Network Science and Engineering, 9(3), 1245-1263.
MLA Gu, Ke,et al."Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs". IEEE Transactions on Network Science and Engineering 9.3(2022): 1245-1263.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Gu, Ke]的文章
[Dong, Xinying]的文章
[Li, Xiong]的文章
百度学术
百度学术中相似的文章
[Gu, Ke]的文章
[Dong, Xinying]的文章
[Li, Xiong]的文章
必应学术
必应学术中相似的文章
[Gu, Ke]的文章
[Dong, Xinying]的文章
[Li, Xiong]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。