Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks

被引:0
|
作者
Triki, Bayrem [1 ]
Rekhis, Slim [1 ]
Chammem, Mhamed [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Tunis, Tunisia
关键词
Sybil attacks detection; RFID; VANET; Observers; Privacy Preserving;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Services provided by vehicular Adhoc Networks (VANETs) would be impaired if faced to sybil attacks, by which malicious vehicles claim multiple identities at the same time. The prevention of these attacks, which could occur in or out of the Road Side Units (RSUs) coverage, is challenging, as it should meet a compromise between the ability to identify the real identity of the malicious vehicle, and prevention of vehicles from being tracked by malicious entities. We propose in this paper a solution to prevent and detect Sybil attacks in VANETs. The identification of attackers is based on two types of authentication techniques. The first uses RFID tags embedded in the vehicle to authenticate them to the RSU and obtain short lifetime certificates. The second uses certificates to authenticate vehicles to their neighbors. The vehicular network we are considering is divided into different zones brought under the control of different certification authorities, forcing a vehicle to change its certificate when moving from a zone to another. One important characteristic of the proposed solution is that it prevents attackers from tracking the mobility of the vehicles. Avoiding false negatives is also addressed using observers (e.g., software components in charge of monitoring) in vehicle nodes. A set of simulation scenarios are conducted to evaluate the performance of the solution.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Privacy Issues of Vehicular Ad-Hoc Networks
    Dok, Hang
    Fu, Huirong
    Echevarria, Ruben
    Weerasinghe, Hesiri
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2010, 3 (01): : 17 - 32
  • [42] Privacy, consent and vehicular ad hoc networks (VANETs)
    Akalu, Rajen
    COMPUTER LAW & SECURITY REVIEW, 2018, 34 (01) : 37 - 46
  • [43] A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks
    Cai, Ying
    Zhang, Hao
    Fang, Yuguang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) : 647 - 656
  • [44] Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks
    Pandi Vijayakumar
    Maria Azees
    Victor Chang
    Jegatha Deborah
    Balamurugan Balusamy
    Cluster Computing, 2017, 20 : 2439 - 2450
  • [45] CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks
    Vijayakumar, P.
    Azees, M.
    Deborah, L. Jegatha
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 62 - 67
  • [46] Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks
    Zhong, Hong
    Huang, Bo
    Cui, Jie
    Xu, Yan
    Liu, Lu
    IEEE ACCESS, 2018, 6 : 2241 - 2250
  • [47] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
    Manivannan, D.
    Moni, Shafika Showkat
    Zeadally, Sherali
    VEHICULAR COMMUNICATIONS, 2020, 25
  • [48] RAPP: An Efficient Revocation Scheme with Authentication and Privacy Preserving for Vehicular Ad-hoc Networks
    Sarencheh, Amirreza
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2017, : 359 - 366
  • [49] PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Ming, Yang
    Shen, Xiaoqin
    SENSORS, 2018, 18 (05)
  • [50] A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks
    Al-Mekhlafi, Zeyad Ghaleb
    Mohammed, Badiea Abdulkarem
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (11): : 105 - 110