Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (4): 157-167.doi: 10.11959/j.issn.2096-109x.2022050

• Papers • Previous Articles     Next Articles

Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks

Jie YI1, Tengfei CAO1, Shuai GAO2, Jianqiang HUANG1   

  1. 1 Department of Computer Technology and Applications, Qinghai University, Xining 810016, China
    2 National Engineering Research Center for Mobile Private Networks, Beijing Jiaotong University, Beijing 100044, China
  • Revised:2022-05-11 Online:2022-08-15 Published:2022-08-01
  • Supported by:
    TheNational Natural Science Foundation of China(62101299);The Natural Science Foundation of Qinghai Province(2020-ZJ-943Q)

Abstract:

With the rapid development of the Internet of Vehicles, service providers can efficiently provide caching services for vehicle users by deploying 5G base station-type RSUs adjacent to vehicles.However, due to the presence of malicious attackers, the controlled base station is turned to be malicious for the purpose of identity forgery attack.When messages are sent in the name of malicious base stations to interfere with the communication link between vehicles and the trusted base stations, it is easy to cause serious driving safety problems.To solve the above problem, an efficient transmission and honeypot defense strategy was proposed, which was based on the offensive and defensive game in the Internet of Vehicles to reduce the risk of identity forgery attacks and improve the security of data transmission.The interaction between trusted base stations and malicious base stations in the Internet of Vehicles scenario was modeled as an attack-defense game model.On this basis, trusted base stations and honeypot base stations were jointly used as defenders to defend against malicious attacks.Then, the trusted base station and the malicious base station, as the two sides of the offensive and defensive game, chose their respective strategies to construct a model of the benefit function of both sides.Combined with the vehicle delay feedback mechanism, the defender and the malicious base station dynamically adjusted their respective strategies.By adjusting the interaction between the honeypot base station and the vehicle, and also the degree of IP randomization, the overall benefit of the defender was effectively improved.Besides, the optimal solution was obtained by using the mixed strategy Nash equilibrium theory.Simulation experimental results show that the proposed strategy can improve the secure transmission performance of the Internet of Vehicles service in the presence of malicious attackers, and the defender’s expected benefit is improved by 48.9% and the data transmission delay is reduced by 57.1% compared to the no-honeypot defense scheme.

Key words: Internet of vehicles, game theory, honeypot strategy, offensive and defensive games

CLC Number: 

No Suggested Reading articles found!