...
首页> 外文期刊>Indian Journal of Science and Technology >Resilient Privacy Preservation Scheme to Detect Sybil Attacks in Vehicular Ad Hoc Networks
【24h】

Resilient Privacy Preservation Scheme to Detect Sybil Attacks in Vehicular Ad Hoc Networks

机译:弹性隐私保护方案,可检测车载Ad Hoc网络中的Sybil攻击

获取原文
           

摘要

Objective: Vehicular Ad hoc Networks (VANETs) have the potential to improve road safety dramatically, regulate traffic, management of parking lots and public areas. Security and Privacy are two significant concerns in VANETs, as a malicious vehicle may deliberately deceive other vehicles in the network. Analysis: Disastrously, several privacy-preserving methods are susceptible to Sybil attacks, whereby a malicious vehicle impersonates as multiple benign vehicles for gaining a disproportionately large influence. Conventional pseudonym generation schemes preserve driver’s privacy and also facilitate identifying the Sybil attacker. However, the pseudonym scheme induces a brand new issue where in a smart attacker may compromise semi-trusted RSUs and launch a Sybil attack in a particular area. Findings: This paper proposes a System for detecting misbehavior vehicles with location Privacy (SYBIL-CAP), consisting TcA - Preserving Location Privacy (TAP-LOOP), and Resilience to RSU compromise (RESUME) for identifying Sybil attacker. SYBIL-CAP provides a temporarily authorized certificate that includes the trusted certificate and secret key trajectories to vehicles to recognize compromised RSU without requiring the unique identity of vehicles. More precisely, in TAP-LOOP, a vehicle approaches a TCA to receive a location-hidden trusted certificate via RSU to conceal its sensitive information at all times. RESUME implements Diffie-Hellman Key Exchange (DHKE) algorithm between two adjacent RSUs to generate a shared secret key, appended in the temporarily authorized certificate. A vehicle identifies the compromised RSU and malicious vehicle by verifying the authorized message at a group of three consecutive RSUs. Improvement: The simulation results depict that the SYBIL-CAP largely restricts Sybil attack by detecting compromised RSU with lower overhead, compared to existing P2DAP.
机译:目的:车载自组织网络(VANET)具有极大地改善道路安全,调节交通,停车场和公共区域管理的潜力。安全和隐私是VANET中的两个重要问题,因为恶意车辆可能会故意欺骗网络中的其他车辆。分析:灾难性地,几种保护隐私的方法容易受到Sybil攻击,从而使恶意车辆冒充为多种良性车辆,从而获得不成比例的巨大影响。传统的化名生成方案可以保护驾驶员的隐私,也有助于识别Sybil攻击者。但是,假名方案引起了一个全新的问题,即聪明的攻击者可能会危害半信任的RSU,并在特定区域发起Sybil攻击。调查结果:本文提出了一种具有位置隐私(SYBIL-CAP)的检测不良行为车辆的系统,该系统由TcA-保留位置隐私(TAP-LOOP)和对RSU妥协的恢复能力(RESUME)来识别Sybil攻击者。 SYBIL-CAP向车辆提供了临时授权的证书,其中包括受信任的证书和密钥轨迹,以在不要求车辆唯一身份的情况下识别出受感染的RSU。更准确地说,在TAP-LOOP中,车辆通过RSU接近TCA以接收位置隐藏的受信任证书,以始终隐藏其敏感信息。 RESUME在两个相邻RSU之间实施Diffie-Hellman密钥交换(DHKE)算法,以生成共享的秘密密钥,该密钥附加在临时授权的证书中。车辆通过在三个连续的RSU的组中验证授权消息来识别受感染的RSU和恶意车辆。改进:仿真结果表明,与现有的P2DAP相比,SYBIL-CAP通过检测具有较低开销的受损RSU在很大程度上限制了Sybil攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号