Detecting Sybil Attacks Using Proofs of Work and Location in VANETs

数学证明 计算机科学 无线自组网 计算机安全 西比尔攻击 计算机网络 无线传感器网络 电信 无线 几何学 数学
作者
Mohamed Baza,Mahmoud Nabil,Mohamed Mahmoud,Niclas Bewermeier,Kemal Fidan,Waleed Alasmary,Mohamed Abdallah
出处
期刊:IEEE Transactions on Dependable and Secure Computing [IEEE Computer Society]
卷期号:19 (1): 39-53 被引量:96
标识
DOI:10.1109/tdsc.2020.2993769
摘要

Vehicular Ad Hoc Networks (VANETs) have the potential to enable the next-generation Intelligent Transportation Systems (ITS). In ITS, data contributed by vehicles can build a spatio-temporal view of traffic statistics, which can improve road safety and reduce slow traffic and jams. To preserve drivers' privacy, vehicles should use multiple pseudonyms instead of only one identity. However, vehicles may exploit this abundance of pseudonyms and launch Sybil attacks by pretending to be multiple vehicles. Then, these Sybil (or fake) vehicles report false data, e.g., to create fake congestion or pollute traffic management data. In this article, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs are used to create a trajectory which is used as vehicle anonymous identity. Also, contributions from one RSU are not enough to create trajectories, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. Then, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. To report an event, the vehicle has to send the latest trajectory to an event manager. Then, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle, and therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate of Sybil attacks with low false negative and acceptable communication and computation overhead.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
汉堡包应助欣喜寄云采纳,获得10
1秒前
无奈妖妖完成签到,获得积分10
1秒前
符昱发布了新的文献求助10
1秒前
黎敏完成签到,获得积分10
1秒前
zzx发布了新的文献求助10
2秒前
Guo发布了新的文献求助10
3秒前
小虚心发布了新的文献求助10
3秒前
3秒前
zzzz应助LLSSLL采纳,获得10
3秒前
4秒前
4秒前
5秒前
黎敏发布了新的文献求助10
5秒前
5秒前
wanci应助你好采纳,获得10
6秒前
卓天宇完成签到,获得积分0
6秒前
天天快乐应助jiangyitiao采纳,获得10
6秒前
张继科keke发布了新的文献求助10
7秒前
7秒前
yazai发布了新的文献求助10
8秒前
所所应助HaoyuHu采纳,获得10
8秒前
molihuakai应助熠熠采纳,获得10
9秒前
1f发布了新的文献求助30
9秒前
9秒前
9秒前
大个应助超级的翅膀采纳,获得30
9秒前
11秒前
qqq完成签到,获得积分10
11秒前
CipherSage应助丹妮采纳,获得10
12秒前
12秒前
13秒前
14秒前
14秒前
15秒前
唐一一发布了新的文献求助10
15秒前
ZungJyu发布了新的文献求助10
15秒前
16秒前
桃子完成签到,获得积分10
16秒前
16秒前
nihaoaaaa发布了新的文献求助10
18秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
PowerCascade: A Synthetic Dataset for Cascading Failure Analysis in Power Systems 2000
The Composition and Relative Chronology of Dynasties 16 and 17 in Egypt 1500
Picture this! Including first nations fiction picture books in school library collections 1500
Signals, Systems, and Signal Processing 610
Unlocking Chemical Thinking: Reimagining Chemistry Teaching and Learning 555
Rheumatoid arthritis drugs market analysis North America, Europe, Asia, Rest of world (ROW)-US, UK, Germany, France, China-size and Forecast 2024-2028 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6366041
求助须知:如何正确求助?哪些是违规求助? 8179983
关于积分的说明 17243873
捐赠科研通 5420779
什么是DOI,文献DOI怎么找? 2868231
邀请新用户注册赠送积分活动 1845373
关于科研通互助平台的介绍 1692871