Location Hijacking Attack in Software-Defined Space-Air-Ground-Integrated Vehicular Network

Research output: Contribution to journalArticlepeer-review

21 Scopus citations

Abstract

Internet of Vehicles (IoV) is an emerging technology in automotive field, in which vehicles can communicate with other vehicles and roadside infrastructures to improve information acquisition ability as well as obtain various services to elevate the security and comfort level. To cope with the increasingly complex vehicular network, software-defined networking (SDN) architecture with advantages of centralized management and flexible control becomes a promising solution. However, in application scenarios, the security of SDN is rarely concerned. If attackers exploit the vulnerabilities of SDN to hijack the network location of the servers or vehicles, vehicles may not be able to access the services they need timely and effectively, which will pose a great threat to the benefit of vehicle users. In light of this, we focus on location hijacking attack against SDN in vehicular network. We perform this attack on five mainstream SDN controller platforms and analyse its impacts from multiple perspectives. As far as we know, this is the first study of such attack in vehicular network. Furthermore, using the advantages of the software-defined space-air-ground-integrated vehicular network and the characteristics of high altitude platform (HAP), such as wide coverage and high load capacity, we put forward the attack recovery scheme based on deep Q -learning (DQL) to supplement existing defence mechanisms that always have counter attacks and endow the vehicular network with a certain resilience.

Original languageEnglish
Pages (from-to)5971-5981
Number of pages11
JournalIEEE Internet of Things Journal
Volume9
Issue number8
DOIs
StatePublished - 15 Apr 2022

Keywords

  • Network security
  • software-defined networking (SDN)
  • space-air-ground-integrated network
  • vehicular network

Fingerprint

Dive into the research topics of 'Location Hijacking Attack in Software-Defined Space-Air-Ground-Integrated Vehicular Network'. Together they form a unique fingerprint.

Cite this