4.7 Article

Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TNSE.2021.3139005

Keywords

Monitoring; Trajectory; Security; Servers; Routing; Cryptography; Reliability; Cluster; malicious node detection; false downstream data; VANET; fog computing

Funding

  1. National Social Science Foundation of China [20BTQ058]
  2. National Natural Science Foundation of China [61902040, 62072078]
  3. Hunan Provincial Education Department Scientific Research Project of China [20B024]
  4. Hunan Graduate Education Innovation and Professional Ability Improvement Project of China [CX20200881]
  5. National Research Fund Project of China [61872239]
  6. Guangdong Key Lab of AI and Multi-modal Data Processing, BNUHKBU United International College [2020KSYS007]
  7. Zhuhai Science-Tech Innovation Bureau [ZH22017001210119PWC, 28712217900001]

Ask authors/readers for more resources

This paper proposes a detection scheme for malicious nodes in fog computing-based VANETs, which can supervise the data forwarding process and detect malicious nodes in a timely manner. The experimental results demonstrate the effectiveness of the proposed scheme in ensuring security.
In vehicular ad hoc networks (VANETs), many data protection schemes have been proposed to secure the data collection procedure, but few schemes focus on the downstream data transmission procedure. In some cluster-based data transmission schemes, if a legal cluster head node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious cluster head node is a valid internal user, its behaviour is difficult to be detected only through some cryptographic methods. In this paper, we propose a cluster-based malicious node detection scheme for false downstream data in fog computing-based VANETs, where the fog servers are used to detect the suspicious data and the malicious cluster head nodes. In our proposed scheme, we further construct a trajectory clustering method among vehicle nodes, in which the cluster head nodes and the corresponding edge monitoring nodes are accurately selected. Also, under our proposed threat model, we analyze the potential security problems in detail. Compared with other related works, our proposed detection scheme can supervise the downstream data forwarded by the cluster head nodes and detect the malicious cluster head nodes. Further, the experimental results show our proposed scheme is efficient for fog computing-based VANETs. Therefore, our scheme may be used as an auxiliary mechanism of some cryptography-based schemes not only to ensure the security of the data forwarding process, but also to effectively and timely monitor the data forwarding process.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available