{"id":"https://openalex.org/W3118356594","doi":"https://doi.org/10.1109/access.2021.3049830","title":"RTED-SD: A Real-Time Edge Detection Scheme for Sybil DDoS in the Internet of Vehicles","display_name":"RTED-SD: A Real-Time Edge Detection Scheme for Sybil DDoS in the Internet of Vehicles","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3118356594","doi":"https://doi.org/10.1109/access.2021.3049830","mag":"3118356594"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3049830","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3049830","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09316718.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09316718.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100732557","display_name":"Jiabin Li","orcid":"https://orcid.org/0000-0003-2150-6783"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiabin Li","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University (SJTU), Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University (SJTU), Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062829885","display_name":"Zhi Xue","orcid":"https://orcid.org/0000-0003-2875-304X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Xue","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University (SJTU), Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University (SJTU), Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069701505","display_name":"Changlian Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Changlian Li","raw_affiliation_strings":["Intelligent Network Design Institute, China Information Consulting and Designing Institute Company Ltd., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Intelligent Network Design Institute, China Information Consulting and Designing Institute Company Ltd., Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100347779","display_name":"Ming Liu","orcid":"https://orcid.org/0000-0002-3482-4871"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Liu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University (SJTU), Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University (SJTU), Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100732557"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.8311,"has_fulltext":true,"cited_by_count":34,"citation_normalized_percentile":{"value":0.90840489,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"9","issue":null,"first_page":"11296","last_page":"11305"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8448984622955322},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.788546085357666},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.5561514496803284},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5526837706565857},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.513374924659729},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44297298789024353},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.44180142879486084},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4295637309551239},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.41462939977645874},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40881070494651794},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4058244526386261},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3405954837799072},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19770315289497375},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.16969254612922668}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8448984622955322},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.788546085357666},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.5561514496803284},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5526837706565857},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.513374924659729},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44297298789024353},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.44180142879486084},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4295637309551239},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.41462939977645874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40881070494651794},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4058244526386261},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3405954837799072},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19770315289497375},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.16969254612922668},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3049830","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3049830","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09316718.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:157febd819314c4aae581330564d2d3c","is_oa":true,"landing_page_url":"https://doaj.org/article/157febd819314c4aae581330564d2d3c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 11296-11305 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3049830","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3049830","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09316718.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G466649759","display_name":null,"funder_award_id":"2017Y","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8340078520","display_name":null,"funder_award_id":"2017YF","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8823009050","display_name":null,"funder_award_id":"2017YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3118356594.pdf","grobid_xml":"https://content.openalex.org/works/W3118356594.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1520914943","https://openalex.org/W1871954564","https://openalex.org/W2023503742","https://openalex.org/W2043104149","https://openalex.org/W2062789233","https://openalex.org/W2093174150","https://openalex.org/W2096390187","https://openalex.org/W2096847629","https://openalex.org/W2146189323","https://openalex.org/W2165491783","https://openalex.org/W2180055784","https://openalex.org/W2221980827","https://openalex.org/W2579606681","https://openalex.org/W2782978729","https://openalex.org/W2800201765","https://openalex.org/W2937017738","https://openalex.org/W2944858588","https://openalex.org/W2946624032","https://openalex.org/W2946701076","https://openalex.org/W2955500388","https://openalex.org/W2964314709","https://openalex.org/W2988328980","https://openalex.org/W3003303706","https://openalex.org/W3008695648","https://openalex.org/W3014294587","https://openalex.org/W3045170931","https://openalex.org/W3045657906","https://openalex.org/W3047116329","https://openalex.org/W3089088190","https://openalex.org/W3100279028","https://openalex.org/W6674805939","https://openalex.org/W6781200285"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2170801710","https://openalex.org/W2384861574","https://openalex.org/W2952704802","https://openalex.org/W4294565801","https://openalex.org/W4315629928"],"abstract_inverted_index":{"As":[0],"the":[1,7,17,41,50,65,76,81,111,116,134,139,148,156,160,171,187,202,208,213,221],"increasing":[2],"popularity":[3],"and":[4,19,34,47,58,90,119,132,166,192,211,220],"development":[5],"of":[6,9,44,69,75,138,163,189,217,224],"Internet":[8],"Vehicles":[10],"(IoV),":[11],"it":[12,168],"is":[13,73],"important":[14,60],"to":[15,49,80,87,114,130,185],"ensure":[16],"reliability":[18],"safety":[20,92],"for":[21,104,170],"IoV.":[22,108],"However,":[23],"communicating":[24],"in":[25,107,142,207],"an":[26,122],"open-access":[27],"environment":[28],"makes":[29,53],"road":[30],"safety,":[31,83],"communication":[32],"security":[33,51],"privacy":[35],"issues":[36,52],"facing":[37],"great":[38],"challenges.":[39],"Also,":[40],"high":[42],"requirement":[43],"real-time":[45],"detection":[46,55],"reponse":[48],"edge":[54],"a":[56,99,177],"more":[57,59],"research":[61],"subject.":[62],"Among":[63],"all":[64,201],"challenges,":[66],"Sybil":[67,105,203],"Denial":[68],"Service":[70],"(DoS)":[71],"Attack":[72],"one":[74],"most":[77],"severe":[78],"threats":[79],"IoV":[82,143,172],"which":[84],"can":[85],"lead":[86],"traffic":[88,117],"jams":[89],"other":[91],"issues.":[93],"In":[94,195],"this":[95],"paper,":[96],"we":[97,145,175,198],"introduce":[98],"Real-Time":[100],"Edge":[101],"Detection":[102],"Scheme":[103],"DDoS":[106,204],"We":[109],"use":[110],"entropy":[112,164],"theory":[113],"quantify":[115],"distribution,":[118],"further":[120],"design":[121],"algorithm":[123],"named":[124],"Fast":[125],"Quartile":[126],"Deviation":[127],"Check":[128],"(FQDC)":[129],"recognize":[131],"locate":[133],"attack.":[135],"Furthermore,":[136],"because":[137],"calculation":[140,149,162],"limit":[141],"scenarios,":[144],"also":[146],"optimize":[147],"with":[150],"some":[151],"useful":[152],"techniques,":[153],"such":[154],"as":[155],"optimized":[157],"sliding":[158],"window,":[159],"incremental":[161],"values":[165],"make":[167],"suitable":[169],"environment.":[173],"Finally,":[174],"proposed":[176],"temporal":[178],"index.":[179],"Temporal":[180],"False":[181],"Omission":[182],"Rate":[183],"(TFOR),":[184],"measure":[186],"performance":[188],"response":[190],"speed":[191],"omission":[193],"rate.":[194],"our":[196],"evaluation,":[197],"successfully":[199],"detect":[200],"attacks":[205],"provided":[206],"F2MD":[209],"datasets,":[210],"have":[212],"average":[214,222],"alarm":[215],"delay":[216],"4.9193":[218],"seconds,":[219],"TFOR":[223],"1.6024%.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
