科研成果详情

发表状态已发表Published
题名Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
作者
发表日期2022
发表期刊IEEE Transactions on Cloud Computing
ISSN/eISSN2168-7161
卷号10期号:2页码:1215 - 1232
摘要

In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid internal user in VANETs, its behavior is difficult to be detected only through some cryptographic methods. Then the behavior may cause many serious traffic accidents. Based on the available (unencrypted) data only, how to detect out the internal malicious vehicle nodes by some lightweight methods needs to be researched in VANETs. Additionally, fog computing seamlessly integrates heterogeneous computing resources widely distributed in edge networks and then provides stronger computing services for users. Therefore, in this article, we propose a malicious node detection scheme in fog computing-based VANETs, where the fog server uses the reputation calculation to score each suspicious node based on the correlation of acquired data and network topology. In our proposed scheme, we build a reputation mechanism to score each suspicious node according to the correlation between outlier detection of acquired data and influence of nodes. Based on our proposed experiments, our proposed scheme can efficiently and effectively detect out malicious vehicle nodes so that fog server can acquire more true data.

关键词Malicious node fog computing data security reputation VANETs
DOI10.1109/TCC.2020.2985050
URL查看来源
收录类别SCIE
语种英语English
WOS研究方向Computer Science
WOS类目Computer Science, Information SystemsComputer Science, Software EngineeringComputer Science, Theory & Methods
WOS记录号WOS:000808079500034
Scopus入藏号2-s2.0-85132342878
引用统计
被引频次:34[WOS]   [WOS记录]     [WOS相关记录]
文献类型期刊论文
条目标识符https://repository.uic.edu.cn/handle/39GCC9TT/9434
专题个人在本单位外知识产出
通讯作者Gu, Ke
作者单位
1.School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha, China
2.Department of Computer and Information Science, University of Macau, Taipa, Macau, China
推荐引用方式
GB/T 7714
Gu, Ke,Dong, XinYing,Jia, Weijia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2): 1215 - 1232.
APA Gu, Ke, Dong, XinYing, & Jia, Weijia. (2022). Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs. IEEE Transactions on Cloud Computing, 10(2), 1215 - 1232.
MLA Gu, Ke,et al."Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs". IEEE Transactions on Cloud Computing 10.2(2022): 1215 - 1232.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Gu, Ke]的文章
[Dong, XinYing]的文章
[Jia, Weijia]的文章
百度学术
百度学术中相似的文章
[Gu, Ke]的文章
[Dong, XinYing]的文章
[Jia, Weijia]的文章
必应学术
必应学术中相似的文章
[Gu, Ke]的文章
[Dong, XinYing]的文章
[Jia, Weijia]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。