Weitere Artikel dieser Ausgabe durch Wischen aufrufen
The foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called ‘Sybil Attack’ which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Chen, C., Xin, W., Weili, H., & Binyu, Z. (2009). A robust detection of the sybil attack in urban VANETs. In 29th IEEE international conference on distributed computing systems workshops, ICDCS Workshops ’09 (pp. 270–276).
Chenxi, Z., Rongxing, L., Xiaodong, L., Pin-Han, H., & Xuemin, S. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In IEEE INFOCOM, The 27th Conference on Computer Communications (pp. 246–250).
Costa, P., Gavidia, D., Koldehofe, B., Miranda, H., Musolesi, M., & Riva, O. (2008). When cars start gossiping. In Proceedings of the 6th workshop on Middleware for network eccentric and mobile applications, ACM, Glasgow, Scotland (pp. 1–4).
Delgrossi, L., & Zhang, T. (2009). Dedicated Short-Range Communications. Vehicle Safety Communications: Protocols, Security, and Privacy (pp. 44–51).
Douceur, J. R. (2002). The sybil attack. International Workship on Peer to Peer Systems (pp. 251–260).
Gerlach, M., & Guttler, F. (2007). Privacy in VANETs using changing pseudonyms—ideal and real. In IEEE 65th Vehicular Technology Conference, VTC2007-Spring (pp. 2521–2525).
Grover, J., Gaur, M. S., & Laxmi, V. (2010). A novel defense mechanism against sybil attacks in VANET. In Proceedings of the 3rd international conference on security of information and networks, ACM, Taganrog, Rostov-on-Don, Russian Federation (pp. 249–255).
Grover, J., Gaur, M. S., & Laxmi, V. (2011). Sybil Attack in VANETs- Detection and Prevention (pp. 269–294). Security of Self-Organizing Networks, Taylor and Francis Group, LLC.
Guette, G., & Ducourthial, B. (2007). On the Sybil attack detection in VANET. IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007 (pp. 1–6).
Hussain, R., Kim, S., & Oh, H. (2012). Privacy-aware VANET security: Putting data-centric misbehavior and sybil attack detection schemes into practice. Internet Security Applications, 2012 (WISA 2012) (pp. 296–311).
Hussain, R., Kim, S., & Oh, H. (2009). Information security applications. In H. Youm & M. Yung (Eds.), Towards privacy aware pseudonymless strategy for avoiding profile generation in VANET (pp. 268–280). Berlin/Heidelberg: Springer.
Ibrahim, K., & Weigle, M. C. (2008). CASCADE: Cluster-based accurate syntactic compression of aggregated data in VANETs. In IEEE GLOBECOM Workshops (pp. 1–10).
Ibrahim, K., Weigle, M. C., & Abuelela, M. (2009). p-IVG: Probabilistic inter-vehicle geocast for dense vehicular networks. In IEEE 69th Vehicular Technology Conference. VTC Spring (pp. 1–5).
Jinyuan, S., Chi, Z., Yanchao, Z., & Yuguang, F. (2010). An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21, 1227–1239. CrossRef
Leinmuller, T., Schoch, E., & Maihofer, C. (2007). Security requirements and solution concepts in vehicular ad hoc networks. Wireless on demand network systems and services, WONS ’07. Fourth Annual Conference on (pp. 84–91).
Levine, A. N., Shields, C., & Margolin, N. B. (2006). A survey of solutions to the sybil attack. Amherst, MA: University of Massachusetts.
Martucci, L. A., Kohlweiss, M., Andersson, C., & Panchenko, A. (2008). Self-certified Sybil-free pseudonyms. In Proceedings of the first ACM conference on Wireless network security (pp. 154–159). ACM, Alexandria, VA, USA.
Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., et al. (2008). Secure vehicular communication systems: Design and architecture. IEEE Communications Magazine, 46, 100–109.
Plößl, K., & Federrath, H. (2008). A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Computer Standards & Interfaces, 30, 390–397. CrossRef
Ruj, S., Cavenaghi, M. A., Zhen, H., Nayak, A., & Stojmenovic, I. (2011). On data-centric misbehavior detection in VANETs. IEEE Vehicular Technology Conference (VTC Fall) (pp. 1–5).
Scheuer, F., Posse, K., & Federrath, H. (2008). Preventing profile generation in vehicular networks. networking and communications, WIMOB ’08. IEEE International Conference on Wireless and Mobile, Computing (pp. 520–525).
Schmidt, R. K., Leinmuller, T., Schoch, E., Held, A., & Schafer, G. (2008). Vehicle behavior analysis to enhance security in vanets. Fourth workshop on vehicle to vehicle, communications (V2VCOM 2008).
Schmidt, R., Leinmuller, T., Schoch, E., Kargl, F., & Schafer, G. (2010). Exploration of adaptive beaconing for efficient intervehicle safety communication. IEEE Network, 24, 14–19. CrossRef
Shan, C., Yong, Q., Hongzi, Z., Jizhong, Z., & Xuemin, S. (2012). Footprint: Detecting sybil attacks in urban vehicular networks. IEEE Transactions on Parallel and Distributed Systems, 23, 1103–1114. CrossRef
Sommer, C., Tonguz, O. K., & Dressler, F. (2011). Traffic information systems: Efficient message dissemination via adaptive beaconing. IEEE Communications Magazine, 49, 173–179. CrossRef
Soyoung, P., Aslam, B., Turgut, D., & Zou, C. C. (2009). Defense against Sybil attack in vehicular ad hoc network based on roadside unit support. IEEE Military Communications Conference, MILCOM, 2009, 1–7.
Tong, Z., Choudhury, R. R., Peng, N., & Chakrabarty, K. (2011). P2DAP: Sybil attacks detection in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications, 29, 582–594. CrossRef
Wasef, A., Yixin, J., & Xuemin, S. (2008). ECMV: Efficient certificate management scheme for vehicular networks. IEEE Global Telecommunications Conference, GLOBECOM, 2008, 1–5.
Xiao, B., Yu, B., & Gao, C. (2006). Detection and localization of sybil nodes in VANETs. In Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks. (pp. 1–8). Los Angeles, CA, USA: ACM.
Yipin, S., Rongxing, L., Xiaodong, L., Xuemin, S., & Jinshu, S. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59, 3589–3603. CrossRef
Yong, H., Jin, T., & Yu, C. (2011). Cooperative sybil attack detection for position based applications in privacy preserved VANETs. In IEEE Global Telecommunications Conference (GLOBECOM 2011) (pp. 1–5).
- On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications
- Springer US
Neuer Inhalt/© Filograph | Getty Images | iStock