Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks

被引:0
|
作者
Triki, Bayrem [1 ]
Rekhis, Slim [1 ]
Chammem, Mhamed [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Tunis, Tunisia
关键词
Sybil attacks detection; RFID; VANET; Observers; Privacy Preserving;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Services provided by vehicular Adhoc Networks (VANETs) would be impaired if faced to sybil attacks, by which malicious vehicles claim multiple identities at the same time. The prevention of these attacks, which could occur in or out of the Road Side Units (RSUs) coverage, is challenging, as it should meet a compromise between the ability to identify the real identity of the malicious vehicle, and prevention of vehicles from being tracked by malicious entities. We propose in this paper a solution to prevent and detect Sybil attacks in VANETs. The identification of attackers is based on two types of authentication techniques. The first uses RFID tags embedded in the vehicle to authenticate them to the RSU and obtain short lifetime certificates. The second uses certificates to authenticate vehicles to their neighbors. The vehicular network we are considering is divided into different zones brought under the control of different certification authorities, forcing a vehicle to change its certificate when moving from a zone to another. One important characteristic of the proposed solution is that it prevents attackers from tracking the mobility of the vehicles. Avoiding false negatives is also addressed using observers (e.g., software components in charge of monitoring) in vehicle nodes. A set of simulation scenarios are conducted to evaluate the performance of the solution.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks
    Zhou, Tong
    Choudhury, Romit Roy
    Ning, Peng
    Chakrabarty, Krishnendu
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 195 - +
  • [2] Detecting Sybil attacks in vehicular ad hoc networks
    Hamdan S.
    Hudaib A.
    Awajan A.
    International Journal of Parallel, Emergent and Distributed Systems, 2021, 36 (02) : 69 - 79
  • [3] Combating Sybil Attacks in Vehicular Ad Hoc Networks
    Rabieh, Khaled Mohamed
    Azer, Marianne Amir
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 65 - 72
  • [4] A Privacy-Preserving Authentication and Sybil Detection Protocol for Vehicular Ad Hoc Networks
    de Sales, Thiago M.
    Almeida, Hyggo O.
    Perkusich, Angelo
    de Sales, Leandro
    de Sales, Marcello
    2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2014, : 428 - 429
  • [5] Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A Review
    Muhamad, Aveen
    Elhadef, Mourad
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 547 - 555
  • [6] Privacy protection on Vehicular Ad hoc NETworks
    Hwang, Ren-Junn
    Hsiao, Yu-Kai
    Hwang, Cheng-Yang
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 7 (04) : 261 - 271
  • [7] Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks
    Zhang, Zhaoyi
    Lai, Yingxu
    Chen, Ye
    Wei, Jingwen
    Wang, Yuhang
    AD HOC NETWORKS, 2023, 141
  • [8] Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
    Grover, Jyoti
    Kumar, Deepak
    Sargurunathan, M.
    Gaur, M. S.
    Laxmi, Vijay
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 473 - 482
  • [9] Privacy Preserving Neighborhood Awareness in Vehicular Ad Hoc Networks
    Abumansoor, Osama
    Boukerche, Azzedine
    Landfeldt, Bjorn
    Samarah, Samer
    Q2SWINET 11: PROCEEDINGS OF THE SEVENTH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2011, : 17 - 20
  • [10] P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks
    Zhou, Tong
    Roy, Romit
    Ning, Choudhury Peng
    Chakrabarty, Krishnendu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 582 - 594