999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

2021-12-11 13:31:06JuanGuoYanzhuLiuShanLiZhiLiandSoniaKherbachi
Computers Materials&Continua 2021年8期

Juan Guo,Yanzhu Liu,Shan Li,Zhi Li and Sonia Kherbachi

1Guilin University of Electronic Technology,Beihai,536000,Guangxi,China

2Great Wall Computer Software and Systems Inc.,Beijing,100083,China

3Department of Electronics and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing,100070,China

4State Grid Information&Telecommunication Group Co.,Ltd.,Beijing,100031,China

5Department of Management,University of Bejaia,Bejaia,06000,Algeria

Abstract:With the rapid development of mobile communication technology,the application of internet of vehicles(IoV)services,such as for information services, driving safety,and traffic efficiency,is growing constantly.For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing,encryption and decision-making can be completed at the local end,thus providing real-time and highly reliable communication capability.The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication channel for vehicles and server providers.Additional computing resources can be configured to accommodate the computing requirements of users.In this study, a virtual traffic defense strategy based on a differential game is proposed to solve the security problem of user-sensitive information leakage when an RSU is attacked.An incentive mechanism encourages service vehicles within the hot range to send virtual traffic to another RSU.By attracting the attention of attackers,it covers the target RSU and protects the system from attack.Simulation results show that the scheme provides the optimal strategy for intelligent vehicles to transmit virtual data,and ensures the maximization of users’interests.

Keywords: Edge computing; internet of vehicles; differential games; security defense

1 Introduction

With the rapid development of internet technology such as network communication and intelligent vehicles, the internet of vehicles (IoV), including the cloud platform, car connection,car-road interconnection, and car service platform, has entered daily life.As an important part of intelligent transportation, the IoV has achieved real-time perception of roads and traffic conditions by combining the GPS, car/road camera, and other technologies such as sensors, computing,and intelligent processing [1].Vehicles are increasingly connected to the internet of things (IoT),which enables access to information for drivers and passengers on the move [2].Through rapid transmission and interaction with multiple traffic signals, the network of cars has implemented real-time analysis and realized control of the vehicle and the road, which improves traffic efficiency and traffic safety, and better serves the user.

By converting a vast amount of data to meaningful, actionable knowledge, the IoV can help to meet challenges to safe, efficient transportation [3].Owing to the lack of physical resources for data processing, most vehicles must be based on roadside units (RSUs) connected to a cloud data center [4].Although the cloud computing platform has almost unlimited resources, its centralized architecture has the disadvantages of transmission delay and lack of network stability [5].Data volume, real-time demand, IoV computing capacity, and demand for communication stability limit the ability of the cloud computing architecture to meet user needs [6].Edge computing (EC) has become the object of intense research to solve these problems, in the form of the edge computingbased internet of vehicles (ECIoVs) [7].

EC responds to user requests in a timely and efficient manner by distributing processing and memory functions at the network’s edge, thereby reducing the time consumed by network operations and service delivery [8].Compared to cloud computing, EC can provide fast, efficient computing and communication, and can realize the real-time interaction of all kinds of data,which is the new direction of the IoV.To deploy storage and computing at the wireless network edge, including radio access points, the edge information system (EIS), edge caching, EC, and edge AI will play a key role in the IoV [9].AI-related modules of EC are redesigned to distribute AI functions to the edge [10].However, the deployment position is closer to the user, which weakens its protection, increasing the likelihood of attack, which will affect user service [11], giving rise to security issues.

The RSU is an important edge node, and an important component in the interaction of the user with edge calculation, network communication, and terminal equipment.This study designs a virtual traffic defense mechanism to avoid the interruption of vehicle communication and the compromise of user privacy from hotspot attacks on an RSU.Game theory is introduced to describe the costs and benefits of sending data to different RSUs.By maximizing the welfare of the system, the optimal strategy for each vehicle to send data to each RSU is obtained, so as to protect RSUs from hotspot attacks while minimizing the impact on network performance caused by virtual traffic.

2 Related Work

A large number of RSUs and vehicles equipped with embedded devices constitute the IoV with data communication, transmission, computing, and other capabilities [12].Data collected from vehicles include parameters such as a vehicle’s speed, location, and direction of movement,while data collected from RSUs can include overall traffic information [13].EC conducts computing tasks and data caching near end-users [14].At present, the network of cars utilizes marginal computing to give more computing, data storage, and communication ability to RSUs, so that they can simultaneously store, forward, and process packets [15].However, this increased functionality compromises user safety, and even the security of the network, due to attack.An attack on an RSU will first interrupt intelligent vehicle services in an area, which affects the user experience.An attacked RSU will not be able to return data to the cloud, which will hamper its resource scheduling.Even more serious is the disclosure of sensitive user information.

Many solutions have been proposed to the privacy and security issues of RSUs.Chen et al.proposed a batch identification game model (BIGM) in wireless mobile networks, enabling nodes to find invalid signatures in a reasonable time in the cases of both complete and incomplete information [16].Liu et al.[17] designed a method to implement security policies and showed that traffic forwarding rules can illustrate security strategies.Arif et al.[18] suggested that packets sent to service providers from smart vehicles can ensure the safety of interactive data by anonymous processing techniques.Ying et al.[19] suggested that intelligent vehicles in a mixed area will be distributed to the symmetric key used to encrypt communication data between intelligent vehicles and RSUs.Basudan et al.[20] designed a communication protocol for the free adjustment of the fog node RSU, which can realize two-way authentication and protection of data integrity in communication.Wang et al.[21] proposed a scheme of computing, storage and communication with an RSU, so as to realize real-time collection, analysis and uploading of communication information of intelligent vehicles.Hui et al.[22] proposed a method of chaotic secure data transmission, encrypting and decrypting the main data signal by the principle of n-shift encryption.

This article studies a potential attack and the corresponding defense scheme of an RSU in the edge calculation of a car network based on a decision framework.We analyze the dynamic decision-making process of the user in the hot attack of an RSU, and help an intelligent vehicle on the IoV to achieve its maximum income to ensure its privacy and security.

3 Edge Computing Game Security Model

The network game security model based on EC has a cloud layer, edge node layer, and intelligent terminal layer, as shown in Fig.1.The cloud layer is the data storage and resource scheduling center of the three-layer network model.The cloud data center (CDC) is located in the cloud layer and mainly coordinates the demand for resources of the boundary node layer.The edge nodes of dynamic virtual computing resource (VCR) dynamically provide the allocation and management of virtualization services for the server and RSU edge node layer on demand.The edge node layer in the middle is deployed on the edge server and RSU, and is dispersed in hotspots such as gas stations, parking spaces, and supermarkets.It coordinates between users and service providers, and a vehicle is connected to its recent RSU when it receives the service.As the bottom of the three-tier structure, the intelligent terminal layer is composed of a large number of intelligent vehicles and their generated data.Based on short-distance communication such as Wi-Fi, Bluetooth, and ZigBee, the intelligent vehicle is connected to the edge node, and service is provided by the RSU in the EC node.

Roles fulfill different functions and form an IoV communication environment through cooperation or resistance.The main roles are the security center, RSU, intelligent vehicle, and RSU attacker.

3.1 Safety Center

Deployed in the cloud layer, the security center is the highest security manager in the network,is responsible for the safety of all entities including the vehicle, RSU, and service providers, and is certified as an organization that provides trusted services.

3.2 RSU

RSUs are deployed in dispersed locations such as gas stations, parking lots, and supermarkets, and have computational hardware, such as multifocal cuts, memory, and physical resources,to process user requests.The RSU creates virtual machines, and dynamically creates, migrates,uninstalls, and destroys resources between them to realize intelligent, efficient, real-time services.

Figure 1:Network model based on edge computing

3.3 Intelligent Vehicle

An intelligent vehicle interacts with an adjacent RSU through the short-distance communication of Wi-Fi, Bluetooth, and ZigBee.It sends a service request to an RSU, which processes it to an edge server.Owing to the close geographical location of the communication parties, the communication effect and user experience will be better.

3.4 RSU Attacker

RSU attacks are monitored at all times.When an RSU interacts frequently with many vehicles and there is a surge in communication data, a hot service phenomenon occurs.The RSU attacker installs a traffic eavesdropping device near each RSU, selects the target RUS with the largest current data traffic through real-time traffic statistics, and attacks it.By attacking the target RSU,it can disrupt or even interrupt the current service.

To ensure the normal operation of the RSU network and provide safe and reliable data interaction, we use virtual traffic to identify the monitoring results of global attackers [23,24].That is, the intelligent vehicles in the area send the virtual traffic to the non-hot RSU, which can mislead the attacker, thereby successfully resisting the attack.

An incentive mechanism encourages intelligent vehicles to send virtual packets to a specified RSU, which generates virtual traffic.An RSU will develop incentives based on virtual traffic requirements.At the same time, the utility function of the intelligent vehicle will be obtained by combining the actual cost with the reward scheme to evaluate the degree of participation of the defense scheme.The parameters are shown in Tab.1.We establish the security model based on the differential game edge.

Table 1:Model parameter

Considering the following scenario, in the IoVs, the set of vehicles that are covered in theith RSU is denoted asGi, and thejth vehicle served in the set is given as vij, vij∈Gi.φij(t)is the virtual data quantity transmitted by vehicle vijat timet, whose value will directly affect the revenue of vehicles.The excitation obtained by vehicle vijtransmitting virtual dataφij(t)at timetis represented bylijφij(t), wherelijis the excitation value of unit virtual flow.The transmission cost of vehicle vijtransmitting virtual data at timetiscijφij(t), wherecijis the transmission cost of unit virtual data packets by vehicle vij.During service, the vehicle must bind and transmit the virtual data package with the business packet, and additional virtual data packages will inconvenience the vehicle.To facilitate discussion, we assumeandρis a parameter greater than zero to evaluate the number of users.Finally, with the transmission of virtual data, the communication link may produce a certain network transport overhead, such as network latency.We describe this asEi=κix(t), whereκiis a weight parameter to control the extra cost of the network, and a larger value ofκiindicates a more serious network impact.x(t)is the state variable of the network, which satisfies

whereαandβare positive parameters,αis the total cost parameter generated by applying network resources, andβis the ratio of unexpected load overhead to system load.

According to the above model, the incomeUijof vehicle vijcan be expressed as

Therefore, based on differential game theory [25], when the game theory time is(0,T), the total cost function of vehicle vijcan be expressed as

4 Feedback Nash Equilibrium Model Solution

Based on research on the feedback Nash equilibrium solution of the differential game [26]and the above model, for any vehicle vij, there exists a continuously differentiable functionVti(t,x):[0,T]×R→Rsatisfying the Isaacs-Bellman equation,

Then the strategy setis the feedback Nash equilibrium solution of the differential game described by Eqs.(1) and (3).For the optimal policy setwe give the following theorem.

Theorem 1:For the differential game of Eqs.(1) and (3) , the feedback Nash equilibrium solution is

Proof:The partial derivative of Eq.(4) with respect toxcan be obtained as

To facilitate the solution, define

Take the partial derivative of Eq.(6) to obtain

Then

Substitute Eqs.(6) in (5) to obtain

Substitute Eqs.(7) and (8) in formula Eq.(4) and simplify to obtain

Comparing Eqs.(8) and (10), it can be seen that

Therefore, the optimal strategy can be calculated as

where

Theorem 1has been proved.

5 Experimental Simulation

We used MATLAB simulation tools to evaluate the performance of the proposed virtual traffic defense strategy based on a differential game.Consider a network of vehicles including five RSUs, each with an effective circular coverage area of radius 300 meters.After entering an RSUcovered area, a vehicle will participate in virtual traffic defense activities according to its initial state, and will protect the system from hotspot attacks.There are five vehicles in the observation range that send data to the RSU.Assume that the system observation time is 5 min, the RSU needs a total of 5 KB of traffic, and the system virtual traffic incentive value is 100 per byte.The values of other system parameters are shown in Tab.2.

Table 2:Model simulation parameter settings

Fig.2 depicts the relationship between the optimal amount of transmitted dataφij(t)and timet, from which it can be seen thatt∈[0,5], andφij(t)will be affected by many variables.Because an RSU provides a reasonable incentive strategy, the optimal transmission strategyφij(t)of the intelligent vehicle is an increasing function of timet.This means that the vehicle can make more money by continuously increasing the amount of virtual data it transmits.At the same time,because of the different network states, the speed of the vehicle transmission of virtual data can differ, i.e., a relatively poor network environment must transmit more virtual data to maximize the return.At the game’s conclusion, the vehicle will stop transmitting virtual data.Vehicle 1, due to its better network environment and less business data, has a relatively stable transmission speed over the whole game, and it continues transferring for 4.8 min.Vehicle 5 suffers from a poor network environment and more business data, which requires more data transmission at greater speeds, and the time required for transmission is shorter.

Figure 2:Change of optimal transmission data volume φij(t) with time t

The state of the vehicle network channel when the intelligent vehicle transmits virtual data is shown in Fig.3.It is clear that additional virtual data transmission increases network load,which harms RSUs and vehicle networks.The more virtual data transmitted, the worse the state of the network channel.When the intelligent vehicle stops transmitting virtual data, the network channel resumes its initial state.

Figure 3:Change of channel state x(t) with time t

Figure 4:Changes in security risk values over time

The security risks of a vehicle when transmitting virtual data are shown in Fig.4, from which it can be seen that the transmission of virtual data will bring security risks to the vehicle.With the increase of transmission volume, the security risks suffered by the vehicle increase.The greater the amount of virtual data transmitted, the higher the risk.As the transmission is completed, its security risk will be reduced to the initial state.

Figure 5:Comparison of dynamic optimal and static optimal game utility functions

Figure 6:Comparison of probability of a successful hotspot attack

Fig.5 compares vehicle revenue under the dynamic optimal transmission of the proposed virtual data volume strategy and the static optimal transmission of virtual data volume strategy,from which it can be seen that the benefits of the former are much greater than those of the latter.

Fig.6 shows the probability of an attacker correctly locking a target RSU with or without a defense plan.Because an RSU misleads attackers by incentivizing vehicles to obtain virtual data,attackers cannot find hotspots, which avoids security threats from hotspot attacks on the RSU.The simulation results in Fig.6 show that the proposed virtual traffic transmission strategy based on differential games can effectively hide hotspot phenomena, thus protecting the network from RSU hotspot attacks.

From simulation experiments, the quantitative relationship between the amount of data sent by vehicles and the channel state and safety risk can be obtained under the proposed safety model.According to the optimal strategy formed by the game among vehicles, the maximum welfare of the system can be obtained.While protecting the secure communication of the target RSU, the negative influence on the channel state is minimized.

6 Conclusion

Addressing the vulnerability to attack of an RSU in a network of vehicles relying on edge computing, we proposed a security defense scheme using differential game theory.An incentive mechanism was adopted to encourage serviced vehicles within a hotspot to send virtual traffic to another RSU.By attracting the attacker’s attention, the target RSU is protected from attack.Additional virtual traffic will increase the network load.Therefore, the system model was established through a differential game, and the optimal virtual data strategy was obtained, so as to balance communication security and network performance.Simulation results showed that the proposed scheme can effectively defend an RSU from hotspot attacks, provide the optimal strategy for the transmission of virtual data volume for intelligent vehicles, and avoid significant degradation of network performance.

In future work, the opportunity interval of vehicle communication will be further considered.By analyzing its statistical model, the virtual data can be made closer to the distribution of real network traffic, so as to hide and protect key RSUs.

Acknowledgement:We gratefully acknowledge the anonymous reviewers who read drafts and made many helpful suggestions.

Funding Statement:This work is supported by Guangxi Vocational Education Teaching Reform Research Project (GXGZJG2020B149), J.G.(Juan Guo).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 免费毛片全部不收费的| 久久国产乱子伦视频无卡顿| 91黄视频在线观看| 亚洲欧美日韩中文字幕在线一区| 国产成人a毛片在线| 欧美成人日韩| 亚洲精品午夜天堂网页| 日韩国产亚洲一区二区在线观看| 全部免费毛片免费播放| 一本大道无码日韩精品影视| 国产在线拍偷自揄拍精品| 午夜爽爽视频| 欧美日韩理论| 欧美成人区| 很黄的网站在线观看| 久草美女视频| 无码一区18禁| 日韩毛片免费观看| h网站在线播放| 国产青青草视频| 国产视频入口| 国产乱人免费视频| 欧洲日本亚洲中文字幕| 久草网视频在线| 人妻无码中文字幕一区二区三区| 欧美成人免费一区在线播放| 激情无码字幕综合| 国产女人在线观看| 国产农村妇女精品一二区| 嫩草影院在线观看精品视频| 日本不卡在线| 国产十八禁在线观看免费| 最新国语自产精品视频在| 国产成人8x视频一区二区| 免费高清自慰一区二区三区| 国产精品久久自在自线观看| 国产极品粉嫩小泬免费看| 久久久噜噜噜久久中文字幕色伊伊| www.亚洲国产| 日韩高清中文字幕| 丁香六月综合网| 亚洲欧美日韩色图| 国产裸舞福利在线视频合集| 日本一区高清| 女人18毛片水真多国产| 久久福利片| 久久视精品| h网站在线播放| 夜夜高潮夜夜爽国产伦精品| 国产一区二区精品福利| 欧美精品亚洲精品日韩专区va| 日韩精品一区二区深田咏美| 国产人妖视频一区在线观看| 欧美日韩午夜| 久久国产精品无码hdav| 综1合AV在线播放| 看国产毛片| 高潮毛片无遮挡高清视频播放| 久久成人国产精品免费软件| 最新国产你懂的在线网址| 91精品国产情侣高潮露脸| 热思思久久免费视频| 免费高清自慰一区二区三区| 欧美在线天堂| 久久婷婷综合色一区二区| 国产毛片网站| 午夜爽爽视频| 视频二区中文无码| 午夜爽爽视频| 2021最新国产精品网站| 国产美女免费| 国产第一页免费浮力影院| 99re视频在线| 日本a级免费| 在线欧美a| 精品国产免费人成在线观看| 91毛片网| swag国产精品| 日韩中文精品亚洲第三区| 凹凸精品免费精品视频| 91在线一9|永久视频在线| 凹凸精品免费精品视频|