Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles
Author:
Zhu Yaling1ORCID, Zeng Jia1, Weng Fangchen1, Han Dan1, Yang Yiyu12, Li Xiaoqi1ORCID, Zhang Yuqing12
Affiliation:
1. The School of Cyberspace Security, Hainan University, Haikou 570208, China 2. The National Computer Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408, China
Abstract
Connected Automobile Vehicles (CAVs) enable cooperative driving and traffic management by sharing traffic information between them and other vehicles and infrastructures. However, malicious vehicles create Sybil vehicles by forging multiple identities and sharing false location information with CAVs, misleading their decisions and behaviors. The existing work on defending against Sybil attacks has almost exclusively focused on detecting Sybil vehicles, ignoring the traceability of malicious vehicles. As a result, they cannot fundamentally alleviate Sybil attacks. In this work, we focus on tracking the attack source of malicious vehicles by using a novel detection mechanism that relies on vehicle broadcast beacon packets. Firstly, the roadside units (RSUs) randomly instruct vehicles to perform customized key broadcasting and listening within communication range. This allows the vehicle to prove its physical presence by broadcasting. Then, RSU analyzes the beacon packets listened to by the vehicle and constructs a neighbor graph between the vehicles based on the customized particular fields in the beacon packets. Finally, the vehicle’s credibility is determined by calculating the edge success probability of vehicles in the neighbor graph, ultimately achieving the detection of Sybil vehicles and tracing malicious vehicles. The experimental results demonstrate that our scheme achieves the real-time detection and tracking of Sybil vehicles, with precision and recall rates of 98.53% and 95.93%, respectively, solving the challenge of existing detection schemes failing to combat Sybil attacks from the root.
Funder
Key Research and Development Science and Technol- 692 ogy of Hainan Province National Natural Science Foundation of China
Reference43 articles.
1. Ali, G.M.N., Ayalew, B., Vahidi, A., and Noor-A-Rahim, M. (2019, January 22–25). Analysis of reliabilities under different path loss models in urban/sub-urban vehicular networks. Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA. 2. Sadaf, M., Iqbal, Z., Javed, A.R., Saba, I., Krichen, M., Majeed, S., and Raza, A. (2023). Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects. Technologies, 11. 3. Bari, B.S., Yelamarthi, K., and Ghafoor, S. (2023). Intrusion detection in vehicle controller area network (can) bus using machine learning: A comparative performance study. Sensors, 23. 4. Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions;Giannaros;J. Cybersecur. Priv.,2023 5. Machine learning and blockchain technologies for cybersecurity in connected vehicles;Ahmad;Wiley Interdiscip. Rev. Data Min. Knowl. Discov.,2024
|
|