TY - GEN
T1 - Credibility enhanced temporal graph convolutional network based sybil attack detection on edge computing servers
AU - Luo, Baiting
AU - Liu, Xiangguo
AU - Zhu, Qi
N1 - Funding Information:
We gratefully acknowledge the support from NSF grants CNS-1839511 and CNS-1834701.
Publisher Copyright:
© 2021 IEEE.
PY - 2021/7/11
Y1 - 2021/7/11
N2 - The emerging vehicular edge computing (VEC) technology has the potential to bring revolutionary development to vehicular ad hoc network (VANET). However, the edge computing servers (ECSs) are subjected to a variety of security threats. One of the most dangerous types of security attacks is the Sybil attack, which can create fabricated virtual vehicles (called Sybil vehicles) to significantly overload ECSs' limited computation resources and thus disrupt legitimate vehicles' edge computing applications. In this paper, we present a novel Sybil attack detection system on ECSs that is based on the design of a credibility enhanced temporal graph convolutional network. Our approach can identify the malicious vehicles in a dynamic traffic environment while preserving the legitimate vehicles' privacy, particularly their local position information. We evaluate our proposed approach in the SUMO simulator. The results demonstrate that our proposed detection system can accurately identify most Sybil vehicles while maintaining a low error rate.
AB - The emerging vehicular edge computing (VEC) technology has the potential to bring revolutionary development to vehicular ad hoc network (VANET). However, the edge computing servers (ECSs) are subjected to a variety of security threats. One of the most dangerous types of security attacks is the Sybil attack, which can create fabricated virtual vehicles (called Sybil vehicles) to significantly overload ECSs' limited computation resources and thus disrupt legitimate vehicles' edge computing applications. In this paper, we present a novel Sybil attack detection system on ECSs that is based on the design of a credibility enhanced temporal graph convolutional network. Our approach can identify the malicious vehicles in a dynamic traffic environment while preserving the legitimate vehicles' privacy, particularly their local position information. We evaluate our proposed approach in the SUMO simulator. The results demonstrate that our proposed detection system can accurately identify most Sybil vehicles while maintaining a low error rate.
UR - http://www.scopus.com/inward/record.url?scp=85118861691&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85118861691&partnerID=8YFLogxK
U2 - 10.1109/IV48863.2021.9575361
DO - 10.1109/IV48863.2021.9575361
M3 - Conference contribution
AN - SCOPUS:85118861691
T3 - IEEE Intelligent Vehicles Symposium, Proceedings
SP - 524
EP - 531
BT - 32nd IEEE Intelligent Vehicles Symposium, IV 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 32nd IEEE Intelligent Vehicles Symposium, IV 2021
Y2 - 11 July 2021 through 17 July 2021
ER -