Footprint: Detecting Sybil Attacks in Urban Private Vehicular Networks
نویسندگان
چکیده
In private vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining a disproportionately large influence. In this paper, we propose a novel Sybil attack detection mechanism Footprint using the trajectories of vehicles for identification while still preserving their location privacy. More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of appearance at this RSU and time. We design a location-hidden authorized message generation scheme for two objectives: first, RSU signatures on messages are signer-ambiguous so that the RSU location information is concealed from the resulted authorized message; second, two authorized messages signed by the same RSU within the same given period of time (temporarily linkable) are recognizable so that they can be used for identification. With the temporal limitation on the linkability of two authorized messages, authorized messages used for long-term identification is prohibited. With this scheme, vehicles can generate a location-hidden trajectory for location-privacy-preserved identification by collecting a consecutive series of authorized messages. Utilizing social relationship among trajectories according to the similarity definition of two trajectories, Footprint can recognize and therefore dismiss “communities” of Sybil trajectories. Rigorous security analysis and extensive trace-driven simulations demonstrate the efficacy of Footprint.
منابع مشابه
Distributed Data Fusion for Detecting Sybil Attacks in VANETs
Sybil attacks have become a serious threat as they can affect the functionality of VANETs (Vehicular Ad Hoc Networks). This paper presents a method for detecting such attacks in VANETs based on distributed data fusion. An algorithm has been developed in order to build distributed confidence over the network under the belief function framework. Our approach has been validated by simulation.
متن کاملA secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks
In Vehicular Ad Hoc Networks (VANETs), vehicles should report events to warn the drivers of unexpected hazards on the roads. While these reports can contribute to safer driving, VANETs suffer from various security threats; a major one is Sybil attacks. In these attacks, an individual attacker can pretend as several vehicles that report a false event. In this paper, we propose a secure event-rep...
متن کاملDetection of Sybil Attacks in Vehicular Ad hoc Networks Based on Road Side Unit Support
Until recently vehicles and transportation systems were considered as the realm of mechanical engineers, but the need for the road safety and desire to be connected to the world, has broaden the industry scope. In order to do so Intelligent Transport System has been introduced and for few years, Vehicular Ad hoc Networks are getting much attention. The advance developments, wireless communicati...
متن کاملDetection of Sybil Attack in VANETs by Trust Establishment in Clusters
Vehicular ad hoc networks (VANET) are a class of ad hoc networks build to ensure the safety of traffic. Trust and security remain a major concern in VANET since a simple mistake can have catastrophic consequence. A crucial point in VANET is how to trust the information transmitted when the neighbouring vehicles are rapidly changing and moving in and out of range. The main aim of this paper is t...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کامل