4.6 Article

Secure Roadside Unit Hotspot Against Eavesdropping Based Traffic Analysis in Edge Computing Based Internet of Vehicles

Journal

IEEE ACCESS
Volume 6, Issue -, Pages 62371-62383

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2868002

Keywords

Edge computing; network security; vehicular and wireless technologies; collaborative work

Funding

  1. NSFC [61379115, 61422201, 61501127, 61370159, 61503083, U1301255, U1501251]
  2. Science and Technology Program of Guangdong Province [2015B010129001, 2015B010106010, 2016A030313705, 2014B090907010, 2015B010131014]
  3. Special-Support Project of Guangdong Province [2014TQ01X100]
  4. Science and Technology Program of Guangzhou [2014J2200097]
  5. U.S. National Science Foundation [US CNS-1343361, CNS-1350230, CNS-1646607, CNS-1702850, CNS-1801925]

Ask authors/readers for more resources

Edge computing-based Internet of Vehicles (EC-IoV) has emerged when computing environment is extended to vehicular network edge for supporting compute-intensive applications. To implement EC-IoV, roadside units (RSUs) are enhanced and upgraded toward edge computing infrastructures with hardware improvements. RSU is a crucial component to communicate with and serve vehicles in EC-IoV. However, RSUs easily suffer from potential network attacks. The attacks lower the quality of user experience, disrupt RSU workload scheduling and even result in user information leakage. Due to the open deployment environment, network traffic among all RSUs may be eavesdropped by a global adversary. When a hotspot phenomenon causes heavy traffic to an RSU, the adversary could take advantage of traffic statistics to locate the RSU. After that, the adversary may concentrate to attack the RSU and try to interrupt on-going services. As a consequence, RSU hotspot attack with traffic eavesdropping is launched. In this paper, we focus on such a new adversary model in EC-IoV and discuss the attack and its defence. To prevent from the attack, we propose a proactive scheme by generating dummy traffic delivery. The local vehicles are collaborative and encouraged to send dummy packets to specified RSUs. This dummy traffic will mislead the traffic statistics and protect hospot RSUs. Stackelberg game approach is used to build an incentive mechanism in the scheme. Numerical results demonstrate that our scheme is effective and efficient to secure EC-IoV against RSU hotspot attack.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available