Residential Collegefalse
Status已發表Published
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
Gu, Ke1; Dong, Xin Ying1; Jia, Wei Jia2
2022-06-07
Source PublicationIEEE Transactions on Cloud Computing
ISSN2168-7161
Volume10Issue:2Pages:1215-1232
Abstract

In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid internal user in VANETs, its behavior is difficult to be detected only through some cryptographic methods. Then the behavior may cause many serious traffic accidents. Based on the available (unencrypted) data only, how to detect out the internal malicious vehicle nodes by some lightweight methods needs to be researched in VANETs. Additionally, fog computing seamlessly integrates heterogeneous computing resources widely distributed in edge networks and then provides stronger computing services for users. Therefore, in this article, we propose a malicious node detection scheme in fog computing-based VANETs, where the fog server uses the reputation calculation to score each suspicious node based on the correlation of acquired data and network topology. In our proposed scheme, we build a reputation mechanism to score each suspicious node according to the correlation between outlier detection of acquired data and influence of nodes. Based on our proposed experiments, our proposed scheme can efficiently and effectively detect out malicious vehicle nodes so that fog server can acquire more true data.

KeywordData Security Fog Computing Malicious Node Reputation Vanets
DOI10.1109/TCC.2020.2985050
URLView the original
Indexed BySCIE
Language英語English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Information Systems ; Computer Science, Software Engineering ; Computer Science, Theory & Methods
WOS IDWOS:000808079500034
Scopus ID2-s2.0-85132342878
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Corresponding AuthorGu, Ke
Affiliation1.Changsha University of Science and Technology, School of Computer and Communication Engineering, Changsha, 410114, China
2.University of Macau, Department of Computer and Information Science, Taipa, 999078, Macao
Recommended Citation
GB/T 7714
Gu, Ke,Dong, Xin Ying,Jia, Wei Jia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2), 1215-1232.
APA Gu, Ke., Dong, Xin Ying., & Jia, Wei Jia (2022). Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs. IEEE Transactions on Cloud Computing, 10(2), 1215-1232.
MLA Gu, Ke,et al."Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs".IEEE Transactions on Cloud Computing 10.2(2022):1215-1232.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Gu, Ke]'s Articles
[Dong, Xin Ying]'s Articles
[Jia, Wei Jia]'s Articles
Baidu academic
Similar articles in Baidu academic
[Gu, Ke]'s Articles
[Dong, Xin Ying]'s Articles
[Jia, Wei Jia]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Gu, Ke]'s Articles
[Dong, Xin Ying]'s Articles
[Jia, Wei Jia]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.