Status | 已发表Published |
Title | Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs |
Creator | |
Date Issued | 2022 |
Source Publication | IEEE Transactions on Cloud Computing
![]() |
ISSN | 2168-7161 |
Volume | 10Issue:2Pages:1215 - 1232 |
Abstract | In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid internal user in VANETs, its behavior is difficult to be detected only through some cryptographic methods. Then the behavior may cause many serious traffic accidents. Based on the available (unencrypted) data only, how to detect out the internal malicious vehicle nodes by some lightweight methods needs to be researched in VANETs. Additionally, fog computing seamlessly integrates heterogeneous computing resources widely distributed in edge networks and then provides stronger computing services for users. Therefore, in this article, we propose a malicious node detection scheme in fog computing-based VANETs, where the fog server uses the reputation calculation to score each suspicious node based on the correlation of acquired data and network topology. In our proposed scheme, we build a reputation mechanism to score each suspicious node according to the correlation between outlier detection of acquired data and influence of nodes. Based on our proposed experiments, our proposed scheme can efficiently and effectively detect out malicious vehicle nodes so that fog server can acquire more true data. |
Keyword | Malicious node fog computing data security reputation VANETs |
DOI | 10.1109/TCC.2020.2985050 |
URL | View source |
Indexed By | SCIE |
Language | 英语English |
WOS Research Area | Computer Science |
WOS Subject | Computer Science, Information SystemsComputer Science, Software EngineeringComputer Science, Theory & Methods |
WOS ID | WOS:000808079500034 |
Scopus ID | 2-s2.0-85132342878 |
Citation statistics | |
Document Type | Journal article |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/9434 |
Collection | Research outside affiliated institution |
Corresponding Author | Gu, Ke |
Affiliation | 1.School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha, China 2.Department of Computer and Information Science, University of Macau, Taipa, Macau, China |
Recommended Citation GB/T 7714 | Gu, Ke,Dong, XinYing,Jia, Weijia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2): 1215 - 1232. |
APA | Gu, Ke, Dong, XinYing, & Jia, Weijia. (2022). Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs. IEEE Transactions on Cloud Computing, 10(2), 1215 - 1232. |
MLA | Gu, Ke,et al."Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs". IEEE Transactions on Cloud Computing 10.2(2022): 1215 - 1232. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment