Detecting Sybil Attacks Using Proofs of Work and Location in VANETs

数学证明 计算机科学 无线自组网 计算机安全 西比尔攻击 计算机网络 无线传感器网络 电信 无线 几何学 数学
作者
Mohamed Baza,Mahmoud Nabil,Mohamed Mahmoud,Niclas Bewermeier,Kemal Fidan,Waleed Alasmary,Mohamed Abdallah
出处
期刊:IEEE Transactions on Dependable and Secure Computing [IEEE Computer Society]
卷期号:19 (1): 39-53 被引量:96
标识
DOI:10.1109/tdsc.2020.2993769
摘要

Vehicular Ad Hoc Networks (VANETs) have the potential to enable the next-generation Intelligent Transportation Systems (ITS). In ITS, data contributed by vehicles can build a spatio-temporal view of traffic statistics, which can improve road safety and reduce slow traffic and jams. To preserve drivers' privacy, vehicles should use multiple pseudonyms instead of only one identity. However, vehicles may exploit this abundance of pseudonyms and launch Sybil attacks by pretending to be multiple vehicles. Then, these Sybil (or fake) vehicles report false data, e.g., to create fake congestion or pollute traffic management data. In this article, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs are used to create a trajectory which is used as vehicle anonymous identity. Also, contributions from one RSU are not enough to create trajectories, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. Then, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. To report an event, the vehicle has to send the latest trajectory to an event manager. Then, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle, and therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate of Sybil attacks with low false negative and acceptable communication and computation overhead.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
刚刚
1秒前
无情慕卉发布了新的文献求助10
1秒前
2秒前
2秒前
wwl发布了新的文献求助10
3秒前
dagongren完成签到,获得积分10
3秒前
Bucky完成签到,获得积分10
3秒前
4秒前
4秒前
5秒前
充电宝应助鲜艳的曲奇采纳,获得10
5秒前
李健应助小王采纳,获得10
6秒前
邓邓发布了新的文献求助10
6秒前
casperzwj完成签到,获得积分10
7秒前
HHH发布了新的文献求助10
8秒前
汉堡包应助追风采纳,获得10
8秒前
8秒前
8秒前
笨笨的银耳汤完成签到,获得积分10
9秒前
甘乐发布了新的文献求助10
9秒前
11秒前
阿谈完成签到,获得积分10
11秒前
wwl完成签到,获得积分20
14秒前
14秒前
17秒前
脑洞疼应助zhangfengsheng采纳,获得10
18秒前
景稷远发布了新的文献求助10
20秒前
星辰大海应助源远流长采纳,获得10
22秒前
张宝发布了新的文献求助10
22秒前
秦大帅发布了新的文献求助10
23秒前
追风发布了新的文献求助10
23秒前
陆66完成签到 ,获得积分10
24秒前
嘞嘞完成签到 ,获得积分10
24秒前
24秒前
25秒前
苑开心发布了新的文献求助10
28秒前
28秒前
28秒前
传奇3应助科研通管家采纳,获得10
28秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Real Analysis: Theory of Measure and Integration (3rd Edition) Epub版 1200
AnnualResearch andConsultation Report of Panorama survey and Investment strategy onChinaIndustry 1000
卤化钙钛矿人工突触的研究 1000
Engineering for calcareous sediments : proceedings of the International Conference on Calcareous Sediments, Perth 15-18 March 1988 / edited by R.J. Jewell, D.C. Andrews 1000
Continuing Syntax 1000
Signals, Systems, and Signal Processing 610
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6261045
求助须知:如何正确求助?哪些是违规求助? 8083041
关于积分的说明 16889426
捐赠科研通 5332382
什么是DOI,文献DOI怎么找? 2838432
邀请新用户注册赠送积分活动 1815883
关于科研通互助平台的介绍 1669531