Journal
IEEE ACCESS
Volume 6, Issue -, Pages 62371-62383Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2868002
Keywords
Edge computing; network security; vehicular and wireless technologies; collaborative work
Categories
Funding
- NSFC [61379115, 61422201, 61501127, 61370159, 61503083, U1301255, U1501251]
- Science and Technology Program of Guangdong Province [2015B010129001, 2015B010106010, 2016A030313705, 2014B090907010, 2015B010131014]
- Special-Support Project of Guangdong Province [2014TQ01X100]
- Science and Technology Program of Guangzhou [2014J2200097]
- U.S. National Science Foundation [US CNS-1343361, CNS-1350230, CNS-1646607, CNS-1702850, CNS-1801925]
Ask authors/readers for more resources
Edge computing-based Internet of Vehicles (EC-IoV) has emerged when computing environment is extended to vehicular network edge for supporting compute-intensive applications. To implement EC-IoV, roadside units (RSUs) are enhanced and upgraded toward edge computing infrastructures with hardware improvements. RSU is a crucial component to communicate with and serve vehicles in EC-IoV. However, RSUs easily suffer from potential network attacks. The attacks lower the quality of user experience, disrupt RSU workload scheduling and even result in user information leakage. Due to the open deployment environment, network traffic among all RSUs may be eavesdropped by a global adversary. When a hotspot phenomenon causes heavy traffic to an RSU, the adversary could take advantage of traffic statistics to locate the RSU. After that, the adversary may concentrate to attack the RSU and try to interrupt on-going services. As a consequence, RSU hotspot attack with traffic eavesdropping is launched. In this paper, we focus on such a new adversary model in EC-IoV and discuss the attack and its defence. To prevent from the attack, we propose a proactive scheme by generating dummy traffic delivery. The local vehicles are collaborative and encouraged to send dummy packets to specified RSUs. This dummy traffic will mislead the traffic statistics and protect hospot RSUs. Stackelberg game approach is used to build an incentive mechanism in the scheme. Numerical results demonstrate that our scheme is effective and efficient to secure EC-IoV against RSU hotspot attack.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available