A Self-Learning Detection Method of Sybil Attack Based on LSTM for Electric Vehicles
Abstract
:1. Introduction
2. Related Research Status
3. Sybil Attack
3.1. Sybil Attack Features
3.2. Sybil Attack Discovery
3.2.1. Packet inspection
3.2.2. Identification of Sybil Nodes
3.2.3. Sybil Nodes Isolated
4. Sybil Attack Intrusion Detection Model
4.1. Construct a Self-Learning Sybil Attack Detection Model
4.2. Sybil Attack Detection Process Based on Self-Learning
5. Simulation Experiment of the Intrusion Detection Mechanism Based on Self-Learning
5.1. Experimental Environment and Evaluation Criteria
5.2. Data Preprocessing
6. Experimental Results and Analysis
6.1. Analysis of Simulation Experiment Results
6.2. Performance Analysis
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Rata, M.; Rata, G.; Filote, C.; Raboaca, M.S.; Graur, A.; Afanasov, C.; Felseghi, A.-R. The ElectricalVehicle Simulator for Charging Station in Mode 3 of IEC 61851-1 Standard. Energies 2020, 13, 176. [Google Scholar] [CrossRef] [Green Version]
- Chou, Y.; Chang, X.M.; Chou, Q.; Peng, C.; Su, S.T. Anomaly detection method of stream data based on LSTM and sliding window. Comput. Appl. 2019. [Google Scholar] [CrossRef]
- Hussain, A.; Bui, V.-H.; Baek, J.-W.; Kim, H.-M. Stationary Energy Storage System for Fast EV Charging Stations: Optimality Analysis and Results Validation. Energies 2020, 13, 230. [Google Scholar] [CrossRef] [Green Version]
- Kim, D.-J.; Ryu, K.-S.; Ko, H.-S.; Kim, B. Optimal Operation Strategy of ESS for EV Charging Infrastructure for Voltage Stabilization in a Secondary Feeder of a Distribution System. Energies 2020, 13, 179. [Google Scholar] [CrossRef] [Green Version]
- Gao, X.; Ma, Y.X.; Tang, X.B.; Lu, X.R. Research on Self-learning and Automatic Design of Optical Fiber Loop in Smart Substation Based on Matlab Neural Network Algorithm. Power Syst. Prot. Control 2019, 22, 159–167. [Google Scholar]
- Chen, Y.H.; Zhou, D.; Zheng, W.B. Data transmission device of charging pile based on WiFi. Meas. Test. Technol. 2019, 11, 1–3. [Google Scholar]
- Javed, M.A.; Zeadally, S.; Hamid, Z. Trust-based security adaptation mechanism for Vehicular Sensor Networks. Comput. Netw. 2018, 137, 27–36. [Google Scholar] [CrossRef]
- Xia, F.; Li, C.Y.; Chen, D.X.; Tang, J. A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw. Appl. 2017, 10, 305–314. [Google Scholar]
- Lim, K.; Manivannan, D. An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Veh. Commun. 2016, 4, 30–37. [Google Scholar] [CrossRef]
- Zhang, Y.Z.; Ye, X.Q. Sybil detection based on periodic ultra-wideband distance information in WSN. Telecommun. Sci. Mag. 2016, 8, 110–117. [Google Scholar]
- Hu, R.H.; Dong, X.M.; Wang, D.L. Research on Node Replication Attack and Sybil Attack Defense Mechanism in Wireless Sensor Networks, Computer Aided Verification. J. Electr. 2015, 8, 743–752. [Google Scholar]
- Trifa, Z.; Khemakhem, M. Sybil Nodes as a Mitigation Strategy against Sybil Attack. Procedia Comput. Sci. 2014, 32, 1135–1140. [Google Scholar] [CrossRef] [Green Version]
- Grover, J.; Laxmi, V.; Gaur, M.S. Sybil attack detection in VANET using neighbouring vehicles. Int. J. Secur. Netw. 2014, 9, 222–233. [Google Scholar] [CrossRef]
- Olariu, S.; Kha-Lil, I.; Abuelela, M. Taking VANET to the clouds. Int. J. Pervasive Comput. Commun. 2011, 7, 7–21. [Google Scholar] [CrossRef]
- Huang, L. Design and implementation of sensor network based on distributed group identity authentication. Comput. Eng. 2007, 10, 161–163. [Google Scholar]
- Wu, D.P.; Si, S.S.; Yan, J.J.; Wang, R.Y. Detection mechanism of social network Sybil nodes based on behavior characteristic analysis. J. Electr. Inf. Technol. 2017, 9, 2089–2096. [Google Scholar]
- Ji, W. Research on Several Key Issues of Reputation Mechanism in Peer-to-Peer Environment. Master’s Thesis, University of Science and Technology of China, Hefei, China, 11 March 2009. [Google Scholar]
- Zhang, H.; Zhang, J.B.; Zhang, T. Research on an Incentive Model Against Sybil Attack. Comput. Technol. Dev. 2012, 12, 164–186. [Google Scholar]
- Shareh, M.B.; Navidi, H.; Javadi, H.H.S.; HosseinZadeh, M. Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model. Inf. Sci. 2019, 470, 94–108. [Google Scholar] [CrossRef]
- Ma, H.; Liang, Y.; Ji, S.; Li, D. A trust/distrust-based reputation attack defense strategy and stability analysis. Comput. Res. Dev. 2018, 12, 2685–2702. [Google Scholar]
- Ge, J.Y. Sybil node detection based on routes and certificates in VANET. Commun. Technol. 2012, 11, 40–43. [Google Scholar]
- Fang, H.; Guo, G.; Zhang, J. Multi-faceted trust and distrust prediction for recommender systems. Support Syst. 2015, 71, 37–47. [Google Scholar] [CrossRef]
- Gai, K.; Choo, K.K.R.; Qiu, M.; Zhu, L. Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things. IEEE Internet Things J. 2018, 5, 3059–3067. [Google Scholar] [CrossRef]
- Chen, Y.; Ye, Q.; Li, M.Z. Research on Identity-based Encryption Algorithms in Wireless Sensor Networks. Comput. Appl. Softw. 2015, 12, 302–309. [Google Scholar]
- Tan, L.; Lian, Y.F.; Chen, K. Method for identifying malicious users in social networks based on composite classification model. Comput. Appl. Softw. 2015, 12, 1–17. [Google Scholar]
- Wang, X.; Liu, L.; Su, J.S. RLM: A general model for trust representation and aggregation. IEEE Trans. Serv. Comput. 2010, 5, 131–143. [Google Scholar] [CrossRef] [Green Version]
- Rodrigues, R.; Druschel, P. Peer-to-peer systems. Commun. ACM 2010, 53, 72–82. [Google Scholar] [CrossRef] [Green Version]
- Zeadally, S.; Hunt, R.; Chen, Y.S.; Irwin, A.; Hassan, A. Vehicular ad hoc networks (VANETS): Status, results, and challenges. Telecommun. Syst. 2012, 50, 217–241. [Google Scholar] [CrossRef]
- Wu, D.P.; Zhang, P.N. Node service ability aware packet forwarding mechanism in intermittently connected wireless networks. IEEE Wirel. Commun. 2016, 15, 8169–8181. [Google Scholar] [CrossRef]
- Yu, X.; Liu, L.; Wu, Y. Optimal routing among WSN clusters based on ring search. Telecommun. Sci. 2015, 2, 109–118. [Google Scholar]
- De Fuentes, J.M.; González-Manzano, L.; González-Tablas, A.I.; Blasco, J. Jorge Security Models in Vehicular Ad-hoc Networks: A Survey. IETE Tech. Rev. 2014, 31, 47–64. [Google Scholar] [CrossRef]
- Riccardo, P. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia. Comput. Netw. 2016, 94, 205–218. [Google Scholar]
- Chu, G.F.; Chen, Q.; Zhang, L. Analysis and comparison of P2P network simulator. Comput. Technol. Dev. 2011, 11, 66–69. [Google Scholar]
- Chen, H.Q.; Wang, H.; Wang, H.K. Node localization method for detecting Sybil attack in wireless sensor network. Telecommun. Eng. 2011, 9, 87–91. [Google Scholar]
- Cao, X.; Kou, W.; Du, X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 2010, 180, 2895–2903. [Google Scholar] [CrossRef]
- Ren, X.L.; Jiang, C. Sybil attack detection scheme based on hierarchical grid. Comput. Eng. 2010, 11, 159–163. [Google Scholar]
Scenes | |||||
---|---|---|---|---|---|
LOS | Highway | −1.66 | −2.88 | −66.1 | 3.95 |
Urban area | −1.81 | −2.85 | −63.9 | 4.15 | |
OLOS | Highway | −1.66 | −3.18 | −76.1 | 6.12 |
Urban area | −1.93 | −2.74 | −72.3 | 6.67 |
Parameter | Parameter Value |
---|---|
Vehicle speed | 10–30 m/s |
MAC protocol | 802.11 p |
Sending frequency | 1 Hz |
Communication range | 200 m |
Simulation time | 1000 s |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, Y.-Y.; Shang, J.; Chen, X.; Liang, K. A Self-Learning Detection Method of Sybil Attack Based on LSTM for Electric Vehicles. Energies 2020, 13, 1382. https://doi.org/10.3390/en13061382
Zhang Y-Y, Shang J, Chen X, Liang K. A Self-Learning Detection Method of Sybil Attack Based on LSTM for Electric Vehicles. Energies. 2020; 13(6):1382. https://doi.org/10.3390/en13061382
Chicago/Turabian StyleZhang, Yi-Ying, Jing Shang, Xi Chen, and Kun Liang. 2020. "A Self-Learning Detection Method of Sybil Attack Based on LSTM for Electric Vehicles" Energies 13, no. 6: 1382. https://doi.org/10.3390/en13061382