CN110992690B - False data detection method based on space-time outliers in Internet of vehicles - Google Patents
False data detection method based on space-time outliers in Internet of vehicles Download PDFInfo
- Publication number
- CN110992690B CN110992690B CN201911200558.3A CN201911200558A CN110992690B CN 110992690 B CN110992690 B CN 110992690B CN 201911200558 A CN201911200558 A CN 201911200558A CN 110992690 B CN110992690 B CN 110992690B
- Authority
- CN
- China
- Prior art keywords
- data
- neighborhood
- spatiotemporal
- time
- vehicles
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 33
- 230000002159 abnormal effect Effects 0.000 claims abstract description 24
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 14
- 238000013450 outlier detection Methods 0.000 claims abstract description 12
- 238000000034 method Methods 0.000 claims description 25
- 230000002123 temporal effect Effects 0.000 claims description 7
- 238000012360 testing method Methods 0.000 claims description 6
- 238000013480 data collection Methods 0.000 claims description 5
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000005856 abnormality Effects 0.000 claims description 2
- 229910052739 hydrogen Inorganic materials 0.000 claims description 2
- 230000006399 behavior Effects 0.000 abstract description 3
- 238000013398 bayesian method Methods 0.000 abstract 1
- 238000004088 simulation Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 239000000243 solution Substances 0.000 description 3
- 206010039203 Road traffic accident Diseases 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 2
- 230000000052 comparative effect Effects 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000002547 anomalous effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/01—Detecting movement of traffic to be counted or controlled
- G08G1/0104—Measuring and analyzing of parameters relative to traffic conditions
- G08G1/0125—Traffic data processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Chemical & Material Sciences (AREA)
- Analytical Chemistry (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Traffic Control Systems (AREA)
Abstract
本发明提出了一种车联网中基于时空离群点的虚假数据检测方法,其步骤为:利用车联网中部署在路边的RSU收集车辆报告的数据,按照时间和空间属性对数据进行分组,量化每个组内数据的相似程度,基于贝叶斯方法检测出现数据显著分歧的异常数据组。将道路空间中交通数据高度相关的区域定义为时空邻域,基于历史数据建立时空邻域,利用离群点检测算法检测显著偏离整体的虚假数据。本发明利用真实交通环境中交通数据的时空相关特性,初步判断虚假数据,再结合时空离群点检测算法,量化时空邻域中每个数据与整体的偏离程度,找出虚假数据,能够正确有效地评价道路交通状况,提高交通管理行为能力,从而实现交通安全、智能导航等丰富多样的上层应用。
The invention proposes a false data detection method based on spatiotemporal outliers in the Internet of Vehicles. Quantify the degree of similarity of data within each group, and detect abnormal data groups with significant data divergence based on Bayesian methods. The area with high correlation of traffic data in the road space is defined as the spatiotemporal neighborhood, and the spatiotemporal neighborhood is established based on the historical data, and the outlier detection algorithm is used to detect the false data that deviates significantly from the whole. The invention utilizes the space-time correlation characteristics of traffic data in the real traffic environment to preliminarily determine the false data, and then combines the space-time outlier detection algorithm to quantify the degree of deviation of each data in the space-time neighborhood from the whole, and find the false data, which can be correct and effective. It can evaluate road traffic conditions and improve traffic management behaviors, so as to realize various upper-layer applications such as traffic safety and intelligent navigation.
Description
技术领域technical field
本发明涉及车联网安全技术领域,特别是指一种车联网中基于时空离群点的虚假数据检测方法。The invention relates to the technical field of Internet of Vehicles security, in particular to a false data detection method based on spatiotemporal outliers in the Internet of Vehicles.
背景技术Background technique
车联网通过在车辆上安装多类型传感器(GPS、雷达、加速度传感器等),使车辆在行驶过程能够感知自身及周边车辆的运动状态(位置、速度、方向、瞬时加速度等),以及道路环境信息(天气、道路状况等)。使用专用短距离通信技术(DSRC:Dedicated Short-RangeCommunications)和5G技术,实现车-车之间、车-路边基础设施之间或者车-后台管理中心之间的无线通信,将这些信息分享给周边车辆,或者经过预部署的路边基础设施(RSU:RoadSide Unit)进行数据聚合后提供给后台交通管理中心。基于这些信息,能够有效地评价道路交通状况,计算车辆行程时间,或者感知交通拥堵、交通事故等异常事件,从而实现交通安全、智能导航等丰富多样的上层应用。By installing multiple types of sensors (GPS, radar, acceleration sensors, etc.) on the vehicle, the Internet of Vehicles enables the vehicle to perceive the motion state (position, speed, direction, instantaneous acceleration, etc.) of itself and surrounding vehicles during driving, as well as road environment information. (weather, road conditions, etc.). Use Dedicated Short-Range Communications (DSRC: Dedicated Short-Range Communications) and 5G technology to realize wireless communication between vehicles, between vehicles and roadside infrastructure, or between vehicles and background management centers, and share this information with The surrounding vehicles or the pre-deployed roadside infrastructure (RSU: RoadSide Unit) aggregates the data and provides it to the back-end traffic management center. Based on this information, it can effectively evaluate road traffic conditions, calculate vehicle travel time, or perceive abnormal events such as traffic congestion and traffic accidents, so as to realize various upper-layer applications such as traffic safety and intelligent navigation.
车联网的网络架构具有分布式、自组织的特点,车辆之间具有平等的地位,任意车辆都可以发送交通数据。由于恶意攻击、用户自私性、传感器故障等原因,车辆节点可能提供不准确甚至错误的数据。比如:为了更快地抵达目的地,自私的车辆驾驶者发送伪造的高车辆密度和低行驶速度,制造交通拥堵的假象,诱使周边车辆驶出当前道路,从而实现清空道路的目的。车辆可能被错误的数据误导做出错误的反应,如急刹车、变道等,不但干扰正常的交通秩序,极端情况下甚至可能造成交通事故。后台管理中心也会对交通状况产生错误的判断,做出错误的交通管理行为,导致交通混乱。The network architecture of the Internet of Vehicles has the characteristics of distributed and self-organization. Vehicles have equal status, and any vehicle can send traffic data. Due to malicious attacks, user selfishness, sensor failures, etc., vehicle nodes may provide inaccurate or even wrong data. For example, in order to reach their destination faster, selfish vehicle drivers send fake high vehicle density and low driving speed to create the illusion of traffic congestion, and induce surrounding vehicles to leave the current road, so as to achieve the purpose of clearing the road. Vehicles may be misled by wrong data to make wrong responses, such as sudden braking, lane change, etc., which not only interfere with normal traffic order, but may even cause traffic accidents in extreme cases. The background management center will also make wrong judgments on traffic conditions, make wrong traffic management behaviors, and cause traffic chaos.
发明内容SUMMARY OF THE INVENTION
针对上述背景技术中存在的不足,本发明提出了一种车联网中基于时空离群点的虚假数据检测方法,解决了现有车联网中内部敌手注入虚假交通数据造成交通混乱的技术问题。In view of the deficiencies in the above background technology, the present invention proposes a false data detection method based on spatiotemporal outliers in the Internet of Vehicles, which solves the technical problem of traffic chaos caused by the injection of false traffic data by internal adversaries in the existing Internet of Vehicles.
本发明的技术方案是这样实现的:The technical scheme of the present invention is realized as follows:
一种车联网中基于时空离群点的虚假数据检测方法,其步骤如下:A method for detecting false data based on spatiotemporal outliers in the Internet of Vehicles, the steps of which are as follows:
S1、数据收集与分组:车联网中部署在路边的RSU负责收集覆盖范围内车辆节点报告的数据,并按照数据的时间、空间属性对数据进行分组得到数据组;S1. Data collection and grouping: The RSU deployed on the roadside in the Internet of Vehicles is responsible for collecting the data reported by vehicle nodes within the coverage area, and grouping the data according to the time and space attributes of the data to obtain data groups;
S2、数据异常检测:利用RSU计算数据组的数据一致性因子C,并基于贝叶斯决策和假设检验方法判断数据一致性因子C的值在时间轴上是否发生显著改变,若是,将数据组标记为异常数据组,执行步骤S3,否则,返回步骤S1;S2. Data anomaly detection: Use RSU to calculate the data consistency factor C of the data group, and judge whether the value of the data consistency factor C has changed significantly on the time axis based on Bayesian decision-making and hypothesis testing methods. If it is marked as an abnormal data group, go to step S3, otherwise, return to step S1;
S3、建立时空邻域:利用关联熵构建异常数据组的时空领域;S3. Establish spatio-temporal neighborhood: use correlation entropy to construct spatio-temporal domain of abnormal data set;
S4、时空离群点检测:利用离群点检测算法检测异常数据组的时空邻域中的离群点,确定攻击者注入的虚假数据。S4, spatiotemporal outlier detection: use an outlier detection algorithm to detect outliers in the spatiotemporal neighborhood of an abnormal data group, and determine the false data injected by the attacker.
所述步骤S2中数据异常检测的方法为:The method for data abnormality detection in the step S2 is:
S21、数据组的数据一致性因子C的计算方法为:S21. The calculation method of the data consistency factor C of the data group is:
其中,Gs(t)={d1,d2,…dN}为一组N个不同车辆在路段s和时隙t内采集的交通数据的数据组,t=1,2,…T,i,j=1,2,…,N;Among them, G s (t)={d 1 , d 2 ,...d N } is a data group of traffic data collected by a group of N different vehicles in road segment s and time slot t, t=1, 2,...T , i,j=1,2,...,N;
S22、根据假设检验原理,建立假设模型:S22. According to the principle of hypothesis testing, establish a hypothesis model:
其中,ΘT={C1,…CT}为当前数据组在时隙1,2,…T上的一致性因子向量,H0表示Ct的值未发生显著变化,H1为表示Ct的值在时隙t0发生显著变化;Among them, Θ T = {C 1 ,...C T } is the consistency factor vector of the current data group on
S23、根据贝叶斯原理,使用后验概率确定数据一致性因子C的值在时间t上发生显著变化的概率:S23. According to the Bayesian principle, use the posterior probability to determine the probability that the value of the data consistency factor C changes significantly at time t:
其中,q∈{1,2},P(Hq|ΘT)为似然函数,P(Hq)为先验概率;Among them, q∈{1, 2}, P(H q |Θ T ) is the likelihood function, and P(H q ) is the prior probability;
S24、根据似然公式判断数据一致性因子C在t=t0时发生了显著改变:S24. According to the likelihood formula, it is judged that the data consistency factor C has changed significantly at t=t 0 :
S25、将数据组Gs(t0)视为异常数据组,并构建时空邻域,确定其中攻击者注入的虚假数据。S25 , regard the data group G s (t 0 ) as an abnormal data group, and construct a spatiotemporal neighborhood to determine the false data injected by the attacker.
所述时空邻域包括直接时间邻域、直接空间邻域和间接时空邻域;所述直接时间邻域:包括同一位置、相邻时隙采集的数据组Gs(t-1)、Gs(t+1);所述直接空间邻域:包括同一时隙,相邻路段的数据Gs-1(t)、Gs+1(t);所述间接时空邻域:包括时间、空间都间接相邻的数据组。The spatiotemporal neighborhood includes a direct temporal neighborhood, a direct spatial neighborhood, and an indirect spatiotemporal neighborhood; the direct temporal neighborhood includes the data sets G s (t-1), G s collected at the same location and adjacent time slots (t+1); the direct spatial neighborhood: including the same time slot, data G s-1 (t) and G s+1 (t) of adjacent road segments; the indirect space-time neighborhood: including time, space are all indirectly adjacent datasets.
所述步骤S3中利用关联熵构建异常数据组的时空领域的方法为:In the step S3, the method of constructing the spatiotemporal domain of the abnormal data group by using the association entropy is:
S31、令X为随机变量,表示车辆收集的交通数据,将X值离散化为Q个小的子区间;S31. Let X be a random variable, representing the traffic data collected by the vehicle, and discretize the X value into Q small sub-intervals;
S32、数据组Gs(t)=(d1,d2,…dN)为N个车辆报告的数据d1,d2,…dN,其中,di∈[0,Q-1];在N′个速度值中,落在第j子区间的速度值的个数是sj,其中,0≤j≤Q-1,随机变量X的熵为:S32. The data group G s (t)=(d 1 , d 2 ,...d N ) is the data d 1 , d 2 ,... d N reported by N vehicles, where d i ∈[0,Q-1] ; Among the N' velocity values, the number of velocity values falling in the jth sub-interval is s j , where 0≤j≤Q-1, and the entropy of the random variable X is:
S33、令XG1为数据组G1(t)的随机变量,XG2为数据组G2(t)的随机变量,则数据组G1(t)和G2(t)的关联熵为:S33. Let X G1 be the random variable of the data group G 1 (t), and X G2 be the random variable of the data group G 2 (t), then the correlation entropy of the data groups G 1 (t) and G 2 (t) is:
其中,表示且的概率,则随机变量和的互信息为:in, express and probability, then the random variable and The mutual information is:
S34、利用数据组G1(t)和G2(t)之间的冗余信息R(G1,G2)量化数据组G1(t)和G2(t)之间的关联:S34. Use redundant information R(G 1 , G 2 ) between the data groups G 1 (t) and G 2 (t) to quantify the association between the data groups G 1 (t) and G 2 (t):
S35、存在s-l-或s+l+满足或者但或者将l-或者l+定义数据组Gs(t)的时空邻域边界;Gs(t)的空间邻域为其中,l-和l+均是正整数;S35. Existence of sl- or s+l + is satisfied or but or Let l- or l + define the space - time neighborhood boundary of the data set G s (t); the spatial neighborhood of G s (t) is Among them , l- and l + are positive integers;
S36、一个数据组的时间邻域包含在同样路段但不同时隙收集的数据组,若存在t-l-或t+l+满足R(Gs(t),Gs(t-l-))≥ε或者R(Gs(t),Gs(t+l+))≥ε,但R(Gs(t),Gs(t-l--1))<ε或者R(Gs(t),Gs(t+l++1))<ε,称l-或者l+为时空邻域边界。S36. The time neighborhood of a data group includes data groups collected in the same road section but in different time slots, if there is tl - or t+l + satisfying R(G s (t), G s (tl - ))≥ε or R(G s (t),G s (t+l + ))≥ε, but R(G s (t),G s (tl - -1))<ε or R(G s (t),G s (t+l + +1))<ε, call l - or l + as the space-time neighborhood boundary.
所述步骤S4中利用离群点检测算法检测异常数据组的时空邻域中的离群点的方法为:The method for detecting the outliers in the spatiotemporal neighborhood of the abnormal data group by using the outlier detection algorithm in the step S4 is:
S41、一个异常数据组的时空邻域由m个数据项组成,记为M={o1,o2,..pm},计算M中数据的均值:S41. The spatiotemporal neighborhood of an abnormal data group is composed of m data items, denoted as M={o 1 , o 2 , ..p m }, and the mean value of the data in M is calculated:
S42、计算M中数据的标准差为其中, S42. Calculate the standard deviation of the data in M as in,
S43、检查每一个数据项o是否在区间[A-k0·σ,A+k0·σ]内,其中,k0>1是预定义的常数参数;落在此区间之外的数据项被视为离群点,被视为敌手注入的虚假数据,数据提供者被视为攻击者。S43. Check whether each data item o is within the interval [Ak 0 ·σ, A+k 0 ·σ], where k 0 >1 is a predefined constant parameter; data items that fall outside this interval are regarded as As outliers, it is regarded as fake data injected by the adversary, and the data provider is regarded as the attacker.
本技术方案能产生的有益效果:本发明利用真实交通环境中交通数据的时空相关特性,初步判断虚假数据,再结合时空离群点检测算法,量化时空邻域中每个数据与整体的偏离程度,找出虚假数据,能够正确有效地评价道路交通状况,提高交通管理行为能力,从而实现交通安全、智能导航等丰富多样的上层应用。The beneficial effects that this technical solution can produce: the present invention utilizes the spatiotemporal correlation characteristics of traffic data in a real traffic environment to preliminarily determine false data, and then combines the spatiotemporal outlier detection algorithm to quantify the degree of deviation between each data in the spatiotemporal neighborhood and the whole , find false data, can correctly and effectively evaluate road traffic conditions, improve traffic management behavior, so as to achieve traffic safety, intelligent navigation and other rich and diverse upper-level applications.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the embodiments of the present invention or the technical solutions in the prior art more clearly, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative efforts.
图1为本发明的流程图;Fig. 1 is the flow chart of the present invention;
图2为本发明实施例实用的地图;2 is a practical map of an embodiment of the present invention;
图3为本发明与对比算法在不同车辆密度下的检测率;Fig. 3 is the detection rate of the present invention and the comparison algorithm under different vehicle densities;
图4为本发明与对比算法在不同攻击者比例下的检测率;Fig. 4 is the detection rate of the present invention and the comparative algorithm under different proportions of attackers;
图5为本发明与对比算法在不同攻击者比例下的误检率。FIG. 5 is the false detection rate of the present invention and the comparative algorithm under different proportions of attackers.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有付出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
本发明使用离散化的时间和道路空间。时间划分为若干等长的时隙,记为t=1,2,…。道路划分为若干个路段,记为s=1,2,…。车辆在行驶过程中利用车载传感器采集车辆密度、速度、流量等交通数据,并通过DSRC(Dedicated Short-Range Communications)无线通信技术分享这些数据,以实现交通安全、交通管理等多类型上层应用。消息的一般格式为o={t,(lon,lat),d,vid},其中,t是数据采集的时间,lon和lat表示数据采集的位置(经纬度),d是车辆采集的交通数据,vid是车辆身份标识符。假设沿道路预先部署RSU(Roadside unit),负责收集车辆报告的数据,执行本发明提出的检测方法,评价车辆报告的数据的真实性,检测攻击者注入的虚假数据。The present invention uses discretized time and road space. Time is divided into several time slots of equal length, denoted as t=1, 2, . . . The road is divided into several sections, denoted as s=1,2,…. Vehicles use on-board sensors to collect traffic data such as vehicle density, speed, and flow during driving, and share these data through DSRC (Dedicated Short-Range Communications) wireless communication technology to achieve multiple types of upper-layer applications such as traffic safety and traffic management. The general format of the message is o={t,(lon,lat),d,vid}, where t is the time of data collection, lon and lat indicate the location (latitude and longitude) of data collection, d is the traffic data collected by the vehicle, vid is the vehicle identification identifier. It is assumed that the RSU (Roadside Unit) is pre-deployed along the road, responsible for collecting the data reported by the vehicle, executing the detection method proposed by the present invention, evaluating the authenticity of the data reported by the vehicle, and detecting the false data injected by the attacker.
如图1所示,本发明实施例提供了一种车联网中基于时空离群点的虚假数据检测方法,具体步骤如下:As shown in FIG. 1 , an embodiment of the present invention provides a method for detecting false data based on spatiotemporal outliers in the Internet of Vehicles. The specific steps are as follows:
S1、数据收集与分组:车联网中部署在路边的RSU负责收集覆盖范围内车辆节点报告的数据,并按照数据的时间、空间属性对数据进行分组得到数据组;以路段s为例,RSU将收到的数据分组为:Gs(1),Gs(2),…Gs(T),表示路段同一路段s中在一系列时隙1,2,…T采集的数据。S1. Data collection and grouping: The RSU deployed on the roadside in the Internet of Vehicles is responsible for collecting the data reported by the vehicle nodes within the coverage area, and grouping the data according to the time and space attributes of the data to obtain a data group; taking the road segment s as an example, the RSU The received data are grouped into: G s (1), G s (2),…G s (T), which represent the data collected in a series of
S2、数据异常检测:利用RSU计算数据组的数据一致性因子C,并基于贝叶斯决策和假设检验方法判断数据一致性因子C的值在时间轴上是否发生显著改变,若是,将数据组标记为异常数据组,执行步骤S3,否则,返回步骤S1;S2. Data anomaly detection: Use RSU to calculate the data consistency factor C of the data group, and judge whether the value of the data consistency factor C has changed significantly on the time axis based on Bayesian decision-making and hypothesis testing methods. If it is marked as an abnormal data group, go to step S3, otherwise, return to step S1;
所述数据异常检测的方法为:The data anomaly detection method is:
S21、数据一致性的定义为数据一致性因子量化组内数据相似的程度,数据组的数据一致性因子C的计算方法为:S21. The definition of data consistency is that the data consistency factor quantifies the degree of similarity of the data in the group. The calculation method of the data consistency factor C of the data group is:
其中,Gs(t)={d1,d2,…dN}为一组N个不同车辆在路段s和时隙t内采集的交通数据的数据组,t=1,2,…T,i,j=1,2,…,N;Among them, G s (t)={d 1 , d 2 ,...d N } is a data group of traffic data collected by a group of N different vehicles in road segment s and time slot t, t=1, 2,...T , i,j=1,2,...,N;
S22、根据假设检验原理,建立假设模型:S22. According to the principle of hypothesis testing, establish a hypothesis model:
其中,ΘT={C1,…CT}为当前数据组在时隙1,2,…T上的一致性因子组成的向量,H0为原假设,表示Ct的值未发生显著变化,H1为备选假设,表示Ct的值在时隙t0发生显著变化;Among them, Θ T ={C 1 ,...C T } is the vector composed of the consistency factors of the current data set on
S23、根据贝叶斯原理,使用后验概率确定数据一致性因子C的值在时间t上发生显著变化的概率:S23. According to the Bayesian principle, use the posterior probability to determine the probability that the value of the data consistency factor C changes significantly at time t:
其中,q∈{1,2},P(Hq|ΘT)为似然函数,P(Hq)为先验概率;Among them, q∈{1, 2}, P(H q |Θ T ) is the likelihood function, and P(H q ) is the prior probability;
S24、根据似然公式判断数据一致性因子C在t=t0时发生了显著改变:S24. According to the likelihood formula, it is judged that the data consistency factor C has changed significantly at t=t 0 :
S25、将数据组Gs(t0)视为异常数据组,并执行进一步检测过程,确定其中攻击者注入的虚假数据。S25, regard the data group G s (t 0 ) as an abnormal data group, and perform a further detection process to determine the false data injected by the attacker.
S3、建立时空邻域:利用关联熵构建异常数据组的时空领域;使用步骤S2能够发现数据异常的数据组,但无法确定哪些组内数据是攻击者注入的。本发明利用历史交通数据构建异常数据组的时空领域,将每个数据项与时空邻域内的数据进行比较,使用时空离群点算法发现显著偏离的数据项。道路场景中,相邻两个位置之间交通数据一般存在较强的时空关联性,但关联的程度受地理位置、交通规则等多种因素影响。如高速公路场景中,前后相邻的两个路段呈现较强的关联性,而城市场景中被十字路口分割的前后两个路段虽然地理位置邻近,但受红绿灯影响车辆运动相关性较弱。使用时空邻域表示道路空间中交通数据高度相关的地理区域。具体地,数据组Gs(t)包含时隙s和路段t的数据,其时空邻域包括直接时间邻域、直接空间邻域和间接时空邻域;所述直接时间邻域:包括同一位置、相邻时隙采集的数据组Gs(t-1)、Gs(t+1);所述直接空间邻域:包括同一时隙,相邻路段的数据Gs-1(t)、Gs+1(t);所述间接时空邻域:包括时间、空间都间接相邻的数据组。S3. Establish spatiotemporal neighborhood: use association entropy to construct the spatiotemporal domain of abnormal data groups; using step S2, data groups with abnormal data can be found, but it is impossible to determine which data groups are injected by attackers. The present invention uses historical traffic data to construct a spatiotemporal domain of abnormal data groups, compares each data item with data in the spatiotemporal neighborhood, and uses a spatiotemporal outlier algorithm to find data items that deviate significantly. In road scenes, traffic data between two adjacent locations generally has a strong spatial and temporal correlation, but the degree of correlation is affected by various factors such as geographic location and traffic rules. For example, in the highway scene, the two adjacent road sections before and after show strong correlation, while in the urban scene, the front and rear road sections divided by intersections are geographically close, but the correlation between vehicle motions affected by traffic lights is weak. Use spatiotemporal neighborhoods to represent geographic areas in road space where traffic data is highly correlated. Specifically, the data group G s (t) contains data of time slot s and road segment t, and its spatiotemporal neighborhood includes direct temporal neighborhood, direct spatial neighborhood and indirect spatiotemporal neighborhood; the direct temporal neighborhood: including the same location , the data groups G s (t-1), G s (t+1) collected in adjacent time slots; the direct spatial neighborhood: including the same time slot, the data G s-1 (t), G s+1 (t); the indirect spatiotemporal neighborhood: including data groups that are indirectly adjacent in time and space.
所述利用关联熵构建异常数据组的时空领域的方法为:The method for constructing the spatiotemporal domain of anomalous data sets by using the correlation entropy is as follows:
S31、令X为随机变量,表示车辆收集的交通数据,将X值离散化为Q个小的子区间;S31. Let X be a random variable, representing the traffic data collected by the vehicle, and discretize the X value into Q small sub-intervals;
S32、数据组Gs(t)=(d1,d2,…dN)为N个车辆报告的数据d1,d2,…dN,di∈[0,Q-1];在N′个速度值中,落在第j子区间的速度值的个数是sj,其中,0≤j≤Q-1,随机变量X的熵为:S32. The data group G s ( t ) = ( d 1 , d 2 , . Among the N' velocity values, the number of velocity values falling in the jth sub-interval is s j , where 0≤j≤Q-1, and the entropy of the random variable X is:
S33、令XG1为数据组G1(t)的随机变量,XG2为数据组G2(t)的随机变量,则数据组G1(t)和G2(t)的关联熵为:S33. Let X G1 be the random variable of the data group G 1 (t), and X G2 be the random variable of the data group G 2 (t), then the correlation entropy of the data groups G 1 (t) and G 2 (t) is:
其中,表示且的概率,则随机变量和的互信息为:in, express and probability, then the random variable and The mutual information is:
S34、利用数据组G1(t)和G2(t)之间的冗余信息R(G1,G2)量化数据组G1(t)和G2(t)之间的关联:S34. Use redundant information R(G 1 , G 2 ) between the data groups G 1 (t) and G 2 (t) to quantify the association between the data groups G 1 (t) and G 2 (t):
S35、存在s-l-或s+l+满足或者但或者其中,l-和l+均是正整数,将l-或者l+定义数据组Gs(t)的时空邻域边界;Gs(t)的空间邻域为 S35. Existence of sl- or s+l + is satisfied or but or Among them, l - and l + are both positive integers, and l - or l + defines the space-time neighborhood boundary of the data group G s (t); the spatial neighborhood of G s (t) is
S36、一个数据组的时间邻域包含在同样路段但不同时隙收集的数据组,若存在t-l-或t+l+满足R(Gs(t),Gs(t-l-))≥ε或者R(Gs(t),Gs(t+l+))≥ε,但R(Gs(t),Gs(t-l--1))<ε或者R(Gs(t),Gs(t+l++1))<ε,称l-或者l+为时空邻域边界。S36. The time neighborhood of a data group includes data groups collected in the same road section but in different time slots, if there is tl - or t+l + satisfying R(G s (t), G s (tl - ))≥ε or R(G s (t),G s (t+l + ))≥ε, but R(G s (t),G s (tl - -1))<ε or R(G s (t),G s (t+l + +1))<ε, call l - or l + as the space-time neighborhood boundary.
S4、时空离群点检测:利用离群点检测算法检测异常数据组的时空邻域中的离群点,确定攻击者注入的虚假数据。S4, spatiotemporal outlier detection: use an outlier detection algorithm to detect outliers in the spatiotemporal neighborhood of an abnormal data group, and determine the false data injected by the attacker.
所述利用离群点检测算法检测异常数据组的时空邻域中的离群点的方法为:The method for detecting outliers in the spatiotemporal neighborhood of an abnormal data group by using an outlier detection algorithm is:
S41、一个异常数据组的时空邻域由m个数据项组成,记为M={o1,o2,..om},计算M中数据的均值:S41. The spatiotemporal neighborhood of an abnormal data group is composed of m data items, denoted as M={o 1 , o 2 , ..o m }, and the mean value of the data in M is calculated:
S42、计算M中数据的标准差为其中, S42. Calculate the standard deviation of the data in M as in,
S43、检查每一个数据项o是否在区间[A-k0·σ,A+k0·σ]内,其中,k0>1是预定义的常数参数;落在此区间之外的数据项被视为离群点,被视为敌手注入的虚假数据,数据提供者被视为攻击者。S43. Check whether each data item o is within the interval [Ak 0 ·σ, A+k 0 ·σ], where k 0 >1 is a predefined constant parameter; data items that fall outside this interval are regarded as As outliers, it is regarded as fake data injected by the adversary, and the data provider is regarded as the attacker.
基于仿真方法验证本发明的有效性,并与现有方法进行对比分析,评价本发明的技术优势。The effectiveness of the present invention is verified based on the simulation method, and the technical advantages of the present invention are evaluated by comparative analysis with the existing methods.
(1)仿真方法(1) Simulation method
仿真实验中使用交通仿真软件SUMO产生具有高度真实性的交通场景,使用OpenStreetMap项目提供的电子地图,仿真区域大小为2000米×2000米,如图2所示。所有道路为双向、每向3车道,车辆进入仿真区域的位置和方向为随机选择。仿真区域内车辆的平均密度为75辆/公里,车辆行驶过程中向RSU报告实时行驶速度。仿真运行100次,所有仿真数据为100次运行的平均值。In the simulation experiment, the traffic simulation software SUMO is used to generate a highly realistic traffic scene, and the electronic map provided by the OpenStreetMap project is used. The size of the simulation area is 2000 meters × 2000 meters, as shown in Figure 2. All roads are two-way, three lanes in each direction, and the position and direction of the vehicle entering the simulation area are randomly selected. The average density of vehicles in the simulation area is 75 vehicles/km, and the real-time driving speed is reported to the RSU during the driving process. Simulations were run 100 times and all simulation data are the average of 100 runs.
为了验证检测方法的准确性,设置了合谋攻击场景,假设存在多个合谋的攻击者,发送伪造的低车辆速度,制造交通拥堵的假象。攻击位置和时间为随机选择,伪造的车辆速度在[0,10]km/h之间随机选择,每个车辆在一个时隙中发送一次车辆速度,攻击者在所有车辆中的比例记为γ。In order to verify the accuracy of the detection method, a collusion attack scenario is set up, assuming that there are multiple colluding attackers, sending fake low vehicle speeds to create the illusion of traffic congestion. The attack location and time are randomly selected, the fake vehicle speed is randomly selected between [0,10]km/h, each vehicle sends the vehicle speed once in a time slot, and the proportion of attackers in all vehicles is denoted as γ .
使用如下度量对检测方法的性能进行评价。检测率(detection rate:DR)定义为所有虚假数据中被正确检测的比例,误检率(false positive rate:FPR)定义为数据被错误检测的概率,包括真实数据被检测为虚假数据和虚假数据被检测为真实数据。The performance of the detection method was evaluated using the following metrics. The detection rate (DR) is defined as the proportion of all false data that are correctly detected, and the false positive rate (FPR) is defined as the probability that the data is detected incorrectly, including real data being detected as false data and false data. detected as real data.
(2)结果及分析(2) Results and analysis
考察了车辆密度和攻击者比例对算法性能的影响。仿真结果在图3至图5中给出。图3给出了不同的车辆密度下本发明方法和LEAVE(Local eviction of attackers andvoting evaluators)协议的性能对比评价。本发明方法在所有车辆密度下的检测率均高于LEAVE,在车辆密度为80辆/公里时,本方法的检测率为98.3%,而LEAVE协议的检测率为91.5%。此外,本发明方法在车辆密度较低时检测率低于车辆高密度场景,在车辆密度为20辆/公里时,检测率为92.0%。当车辆密度为200辆/公里时检测率为99.9%。这主要是因为车辆密度较低时车辆之间的距离较大,车辆之间的空间限制不明显,车辆能够按照理想速度行驶,由于不同类型的车辆具有不同的理想速度,因此车辆行驶速度相差较大,导致车辆采集的数据呈现较大的方差,给正确识别增加了难度。The effects of vehicle density and attacker ratio on the performance of the algorithm are investigated. The simulation results are presented in Figures 3 to 5. Figure 3 shows the performance comparison evaluation of the method of the present invention and the LEAVE (Local eviction of attackers and voting evaluators) protocol under different vehicle densities. The detection rate of the method of the present invention is higher than that of LEAVE under all vehicle densities. When the vehicle density is 80 vehicles/km, the detection rate of this method is 98.3%, while the detection rate of the LEAVE protocol is 91.5%. In addition, when the vehicle density is low, the detection rate of the method of the present invention is lower than that of the high vehicle density scene, and when the vehicle density is 20 vehicles/km, the detection rate is 92.0%. The detection rate is 99.9% when the vehicle density is 200 vehicles/km. This is mainly because the distance between vehicles is large when the vehicle density is low, the space restriction between vehicles is not obvious, and the vehicles can travel at the ideal speed. Since different types of vehicles have different ideal speeds, the speed difference between vehicles is relatively small. If the data is large, the data collected by the vehicle presents a large variance, which increases the difficulty of correct identification.
图4和图5评价了本发明方法和LEAVE协议的抗合谋攻击能力。图3给出了不同攻击者比例下的检测率。从图中可知本发明方法在低攻击者比例下的检测率与LEAVE相似。然而,当攻击者比例升高时,LEAVE协议的检测率快速下降,当攻击者比例分别达到30%和40%时,检测率为65.5%和40%。本发明方法显示出较强的抗合谋攻击能力。在攻击者比例达到25%时,仍然能够达到96.5%的检测率。同时,误检率也显著低于LEAVE,在25%的攻击者比例下误检率为5.9%。Figures 4 and 5 evaluate the anti-collision attack capability of the method of the present invention and the LEAVE protocol. Figure 3 presents the detection rates under different proportions of attackers. It can be seen from the figure that the detection rate of the method of the present invention is similar to that of LEAVE under the low proportion of attackers. However, when the proportion of attackers increases, the detection rate of the LEAVE protocol decreases rapidly, when the proportion of attackers reaches 30% and 40%, respectively, the detection rate is 65.5% and 40%. The method of the invention shows strong anti-collusion attack capability. When the proportion of attackers reaches 25%, it is still able to achieve a detection rate of 96.5%. At the same time, the false detection rate is also significantly lower than that of LEAVE, with a false detection rate of 5.9% under a 25% attacker ratio.
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included in the scope of the present invention. within the scope of protection.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911200558.3A CN110992690B (en) | 2019-11-29 | 2019-11-29 | False data detection method based on space-time outliers in Internet of vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911200558.3A CN110992690B (en) | 2019-11-29 | 2019-11-29 | False data detection method based on space-time outliers in Internet of vehicles |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110992690A CN110992690A (en) | 2020-04-10 |
CN110992690B true CN110992690B (en) | 2021-09-17 |
Family
ID=70088311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911200558.3A Active CN110992690B (en) | 2019-11-29 | 2019-11-29 | False data detection method based on space-time outliers in Internet of vehicles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110992690B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113255593B (en) * | 2021-06-25 | 2021-09-24 | 北京市水利自动化研究所 | Sensor information anomaly detection method facing space-time analysis model |
CN115311838B (en) * | 2022-07-22 | 2023-09-26 | 重庆大学 | A method for evaluating vehicle coordination consistency in the tunnel entrance area |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103198296A (en) * | 2013-03-07 | 2013-07-10 | 中国科学技术大学 | Method and device of video abnormal behavior detection based on Bayes surprise degree calculation |
CN105654735A (en) * | 2016-03-24 | 2016-06-08 | 安徽四创电子股份有限公司 | Rapid fake-licensed car recognizing method based on outlier analysis algorithm |
CN107247954A (en) * | 2017-06-16 | 2017-10-13 | 山东省计算中心(国家超级计算济南中心) | A kind of image outlier detection method based on deep neural network |
CN108400973A (en) * | 2018-02-02 | 2018-08-14 | 中原工学院 | Spoofing detection method based on traffic flow model in vehicular ad hoc network |
CN109902612A (en) * | 2019-02-22 | 2019-06-18 | 北京工业大学 | An Anomaly Detection Method for Surveillance Video Based on Unsupervised Learning |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9233472B2 (en) * | 2013-01-18 | 2016-01-12 | Irobot Corporation | Mobile robot providing environmental mapping for household environmental control |
TWI674210B (en) * | 2017-12-04 | 2019-10-11 | 財團法人資訊工業策進會 | System and method for detecting dangerous vehicle |
US10922964B2 (en) * | 2018-01-05 | 2021-02-16 | Here Global B.V. | Multi-modal traffic detection |
-
2019
- 2019-11-29 CN CN201911200558.3A patent/CN110992690B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103198296A (en) * | 2013-03-07 | 2013-07-10 | 中国科学技术大学 | Method and device of video abnormal behavior detection based on Bayes surprise degree calculation |
CN105654735A (en) * | 2016-03-24 | 2016-06-08 | 安徽四创电子股份有限公司 | Rapid fake-licensed car recognizing method based on outlier analysis algorithm |
CN107247954A (en) * | 2017-06-16 | 2017-10-13 | 山东省计算中心(国家超级计算济南中心) | A kind of image outlier detection method based on deep neural network |
CN108400973A (en) * | 2018-02-02 | 2018-08-14 | 中原工学院 | Spoofing detection method based on traffic flow model in vehicular ad hoc network |
CN109902612A (en) * | 2019-02-22 | 2019-06-18 | 北京工业大学 | An Anomaly Detection Method for Surveillance Video Based on Unsupervised Learning |
Non-Patent Citations (2)
Title |
---|
A comparative study of cluster based outlier detection, distance;H. C. Mandhare;《 2017 International Conference on Intelligent Computing and Control Systems(ICICCS)》;20180111;931-935 * |
车载自组织网络安全关键技术研究;刘伎昭;《中国博士学位论文全文数据库工程科技Ⅱ辑》;20170215(第2期);C034-112 * |
Also Published As
Publication number | Publication date |
---|---|
CN110992690A (en) | 2020-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240042995A1 (en) | Vehicle operation using a dynamic occupancy grid | |
D'Andrea et al. | Detection of traffic congestion and incidents from GPS trace analysis | |
Karmakar et al. | Assessing trust level of a driverless car using deep learning | |
Zhang et al. | A multilevel information fusion approach for road congestion detection in VANETs | |
CN107567005A (en) | Car networking vehicle abnormality behavioral value method and system based on artificial immune system | |
CN110992690B (en) | False data detection method based on space-time outliers in Internet of vehicles | |
CN117178309A (en) | Method for creating a map with collision probability | |
El-Sayed et al. | Congestion detection and propagation in urban areas using histogram models | |
Kumar et al. | Study on road traffic congestion: A review | |
Milojevic et al. | Location aware data aggregation for efficient message dissemination in vehicular ad hoc networks | |
CN103824456B (en) | A kind of vehicle mounted sensor network real-time road event recommendation method | |
Wang et al. | Traffic speed estimation based on multi-source GPS data and mixture model | |
Nayak et al. | PHVA: A position based high speed vehicle detection algorithm for detecting high speed vehicles using vehicular cloud | |
He et al. | Crowd-sensing enhanced parking patrol using sharing bikes’ trajectories | |
CN105405297A (en) | Traffic accident automatic detection method based on monitoring video | |
CN102354452B (en) | Method for monitoring road conditions in real time based on simplified road network model | |
Abu-Elkheir et al. | Position verification for vehicular networks via analyzing two-hop neighbors information | |
Lücken et al. | Density‐Based Statistical Clustering: Enabling Sidefire Ultrasonic Traffic Sensing in Smart Cities | |
Raghu et al. | Efficient dead reckoning approach for localization prediction in VANETs | |
Bernaś | VANETs as a part of weather warning systems | |
Abuelela et al. | Automatic incident detection in VANETs: a bayesian approach | |
Weigle et al. | Intelligent highway infrastructure for planned evacuations | |
Lu et al. | An anti-collision algorithm for self-organizing vehicular ad-hoc network using deep learning | |
Dolberg et al. | Tracking spoofed locations in crowdsourced vehicular applications | |
Yadav et al. | IoT Based Collision Avoidance for Smart Vehicle to Vehicle Communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |