亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Detecting Sybil Attacks Using Proofs of Work and Location in VANETs

数学证明 计算机科学 无线自组网 计算机安全 西比尔攻击 计算机网络 无线传感器网络 电信 无线 几何学 数学
作者
Mohamed Baza,Mahmoud Nabil,Mohamed Mahmoud,Niclas Bewermeier,Kemal Fidan,Waleed Alasmary,Mohamed Abdallah
出处
期刊:IEEE Transactions on Dependable and Secure Computing [Institute of Electrical and Electronics Engineers]
卷期号:19 (1): 39-53 被引量:96
标识
DOI:10.1109/tdsc.2020.2993769
摘要

Vehicular Ad Hoc Networks (VANETs) have the potential to enable the next-generation Intelligent Transportation Systems (ITS). In ITS, data contributed by vehicles can build a spatio-temporal view of traffic statistics, which can improve road safety and reduce slow traffic and jams. To preserve drivers' privacy, vehicles should use multiple pseudonyms instead of only one identity. However, vehicles may exploit this abundance of pseudonyms and launch Sybil attacks by pretending to be multiple vehicles. Then, these Sybil (or fake) vehicles report false data, e.g., to create fake congestion or pollute traffic management data. In this article, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs are used to create a trajectory which is used as vehicle anonymous identity. Also, contributions from one RSU are not enough to create trajectories, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. Then, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. To report an event, the vehicle has to send the latest trajectory to an event manager. Then, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle, and therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate of Sybil attacks with low false negative and acceptable communication and computation overhead.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
9秒前
糯米糍发布了新的文献求助10
10秒前
糯米糍发布了新的文献求助10
14秒前
24秒前
chenny发布了新的文献求助30
31秒前
balko完成签到,获得积分10
36秒前
善学以致用应助顺利代曼采纳,获得10
38秒前
47秒前
YifanWang应助科研通管家采纳,获得10
48秒前
NexusExplorer应助科研通管家采纳,获得10
48秒前
顺利代曼发布了新的文献求助10
52秒前
1分钟前
Shrine发布了新的文献求助10
1分钟前
星辰大海应助Shrine采纳,获得10
1分钟前
可爱的函函应助糯米糍采纳,获得10
1分钟前
CGDAZE完成签到,获得积分10
1分钟前
2分钟前
挣钱养刺猬完成签到,获得积分10
2分钟前
2分钟前
2分钟前
yunshui完成签到,获得积分10
2分钟前
英姑应助挣钱养刺猬采纳,获得10
2分钟前
2分钟前
脑洞疼应助轩轩采纳,获得10
2分钟前
Shrine发布了新的文献求助10
2分钟前
研友_VZG7GZ应助科研通管家采纳,获得10
2分钟前
Akim应助科研通管家采纳,获得10
2分钟前
深情安青应助科研通管家采纳,获得10
2分钟前
2分钟前
轩轩发布了新的文献求助10
2分钟前
李爱国应助Saint采纳,获得10
3分钟前
CES_SH发布了新的文献求助10
3分钟前
雪飞杨完成签到 ,获得积分10
3分钟前
4分钟前
Saint发布了新的文献求助10
4分钟前
4分钟前
4分钟前
FashionBoy应助科研通管家采纳,获得10
4分钟前
4分钟前
神火发布了新的文献求助10
4分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Kinesiophobia : a new view of chronic pain behavior 3000
Les Mantodea de guyane 2500
Signals, Systems, and Signal Processing 510
Discrete-Time Signals and Systems 510
Brittle Fracture in Welded Ships 500
Lloyd's Register of Shipping's Approach to the Control of Incidents of Brittle Fracture in Ship Structures 500
热门求助领域 (近24小时)
化学 材料科学 生物 医学 工程类 计算机科学 有机化学 物理 生物化学 纳米技术 复合材料 内科学 化学工程 人工智能 催化作用 遗传学 数学 基因 量子力学 物理化学
热门帖子
关注 科研通微信公众号,转发送积分 5942735
求助须知:如何正确求助?哪些是违规求助? 7075606
关于积分的说明 15889072
捐赠科研通 5073485
什么是DOI,文献DOI怎么找? 2729037
邀请新用户注册赠送积分活动 1687981
关于科研通互助平台的介绍 1613600