Detecting Sybil Attacks Using Proofs of Work and Location in VANETs

数学证明 计算机科学 车载自组网 无线自组网 利用 计算机安全 西比尔攻击 概念证明 钥匙(锁) 计算机网络 无线传感器网络 电信 无线 几何学 数学 操作系统
作者
Mohamed Baza,Mahmoud Nabil,Mohamed E. Mahmoud,Niclas Bewermeier,Kemal Fidan,Noor Zaman,Mohamed Abdallah
出处
期刊:IEEE Transactions on Dependable and Secure Computing [IEEE Computer Society]
卷期号:19 (1): 39-53 被引量:37
标识
DOI:10.1109/tdsc.2020.2993769
摘要

Vehicular Ad Hoc Networks (VANETs) have the potential to enable the next-generation Intelligent Transportation Systems (ITS). In ITS, data contributed by vehicles can build a spatio-temporal view of traffic statistics, which can improve road safety and reduce slow traffic and jams. To preserve drivers’ privacy, vehicles should use multiple pseudonyms instead of only one identity. However, vehicles may exploit this abundance of pseudonyms and launch Sybil attacks by pretending to be multiple vehicles. Then, these Sybil (or fake) vehicles report false data, e.g., to create fake congestion or pollute traffic management data. In this article, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle’s anonymous location. Proofs sent from multiple consecutive RSUs are used to create a trajectory which is used as vehicle anonymous identity. Also, contributions from one RSU are not enough to create trajectories, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. Then, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. To report an event, the vehicle has to send the latest trajectory to an event manager. Then, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle, and therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate of Sybil attacks with low false negative and acceptable communication and computation overhead.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
现代飞鸟完成签到,获得积分10
1秒前
3秒前
ruochenzu完成签到,获得积分10
4秒前
5秒前
vv完成签到,获得积分10
5秒前
么一嗷喵完成签到,获得积分10
6秒前
卞卞完成签到,获得积分10
6秒前
冰兰发布了新的文献求助50
10秒前
10秒前
ruochenzu发布了新的文献求助10
11秒前
EthanChan完成签到,获得积分10
11秒前
13秒前
科研通AI2S应助vv采纳,获得10
14秒前
14秒前
诸葛小哥哥完成签到 ,获得积分10
14秒前
liuwei发布了新的文献求助30
14秒前
上官若男应助HongJiang采纳,获得10
14秒前
15秒前
Panchael发布了新的文献求助10
16秒前
张菲菲发布了新的文献求助30
19秒前
20秒前
锦秋完成签到 ,获得积分10
21秒前
WNing发布了新的文献求助10
22秒前
24秒前
lin应助科研通管家采纳,获得10
27秒前
美好乐松应助科研通管家采纳,获得10
27秒前
美好乐松应助科研通管家采纳,获得10
27秒前
汉堡包应助科研通管家采纳,获得10
27秒前
852应助科研通管家采纳,获得10
27秒前
烟花应助科研通管家采纳,获得10
27秒前
劲秉应助科研通管家采纳,获得10
27秒前
上官若男应助科研通管家采纳,获得10
27秒前
wanci应助科研通管家采纳,获得10
27秒前
科研通AI5应助科研通管家采纳,获得10
27秒前
美好乐松应助科研通管家采纳,获得10
28秒前
共享精神应助科研通管家采纳,获得10
28秒前
lin应助科研通管家采纳,获得10
28秒前
科研通AI2S应助科研通管家采纳,获得10
28秒前
贰鸟应助科研通管家采纳,获得20
28秒前
28秒前
高分求助中
Production Logging: Theoretical and Interpretive Elements 2700
Ophthalmic Equipment Market 1500
Neuromuscular and Electrodiagnostic Medicine Board Review 1000
こんなに痛いのにどうして「なんでもない」と医者にいわれてしまうのでしょうか 510
いちばんやさしい生化学 500
The First Nuclear Era: The Life and Times of a Technological Fixer 500
Unusual formation of 4-diazo-3-nitriminopyrazoles upon acid nitration of pyrazolo[3,4-d][1,2,3]triazoles 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 纳米技术 计算机科学 化学工程 内科学 复合材料 物理化学 电极 遗传学 量子力学 基因 冶金 催化作用
热门帖子
关注 科研通微信公众号,转发送积分 3672688
求助须知:如何正确求助?哪些是违规求助? 3228855
关于积分的说明 9782298
捐赠科研通 2939285
什么是DOI,文献DOI怎么找? 1610759
邀请新用户注册赠送积分活动 760719
科研通“疑难数据库(出版商)”最低求助积分说明 736198