Detecting Sybil Attacks using Proofs of Work and Location in VANETs

04/11/2019
by   Mohamed Baza, et al.
0

In this paper, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs is used to create vehicle trajectory which is used as vehicle anonymous identity. Also, one RSU is not able to issue trajectories for vehicles, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. So, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. Then, during any reported event, e.g., road congestion, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle; therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.

READ FULL TEXT

page 4

page 5

page 6

page 7

page 8

page 9

page 10

page 12

research
04/27/2021

Incident Detection on Junctions Using Image Processing

In traffic management, it is a very important issue to shorten the respo...
research
02/12/2019

A Privacy-Preserving Traffic Monitoring Scheme via Vehicular Crowdsourcing

The explosive growth of vehicle amount has given rise to a series of tra...
research
08/23/2021

Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing

Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beac...
research
04/11/2021

Proof of Travel for Trust-Based Data Validation in V2I Communication Part I: Methodology

Previous work on misbehavior detection and trust management for Vehicle-...
research
07/21/2021

PoF: Proof-of-Following for Vehicle Platoons

Cooperative vehicle platooning significantly improves highway safety and...
research
12/22/2021

Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection

We demonstrate that a supply-chain level compromise of the adaptive crui...
research
11/25/2020

LEADER: Low Overhead Rank Attack Detection for Securing RPL based IoT

In recent times researchers have found several security vulnerabilities ...

Please sign up or login with your details

Forgot password? Click here to reset