Font Size: a A A

Malicious Node Detection Research For Fog Computing-based VANETs

Posted on:2021-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:X Y DongFull Text:PDF
GTID:2518306314980459Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of vehicle ad hoc networks(VANETs),more and more mobile vehicle terminal equipment and infrastructure to realize network connection,the traditional Internet model can not meet the demand of high mobility,distribution location perception and low latency service.Fog computing integrates heterogeneous computing resources widely distributed in the edge network to provide users with more powerful computing services to solve the present situation problems of low latency and the rapid mobility in the VANETs,also has brought data security hidden danger,therefore,this paper mainly proposes two solutions to detect the malicious nodes in the VANETs.In this paper,in Fog Computing-based VANETs,two malicious node detection schemes are proposed by using betweenness centrality,Outlier detection technique,correlation analysis and trajectory clustering technique.The main work is summarized as follows:(1)A malicious node detection scheme based on correlation between data and network topology is proposed.This paper will mobile vehicle as the fog nodes in the network,the fog server uses the reputation calculation to score each suspicious node based on the correlation of acquired data and network topology.In our proposed scheme,we build a reputation mechanism to score each suspicious node according to the correlation between outlier detection of acquired data and influence of nodes.Finally,malicious node detection is realized.(2)A cluster-based malicious node detection for false downstream data is proposed.For the safety of the downstream data,we propose a cluster-based malicious node detection scheme for false downstream data in fog computing-based VANETs.In our proposed scheme,we construct a trajectory clustering method based on distance and link reliability between vehicle nodes.In each cluster,the cluster head nodes are selected based on their trajectory similarities with the other nodes,and the edge monitoring nodes are selected according to their centrality entropies with their neighboring clusters.Finally the fog server detects the suspicious data reported by some edge monitoring nodes in each cluster and records the suspicious clusters(and malicious cluster head nodes)to which the reporting edge monitoring nodes belong.
Keywords/Search Tags:VANETs, Fog computing, Malicious node detection, Data Security, Reputation, Cluster, False downstream data
PDF Full Text Request
Related items