A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks

被引:9
|
作者
Rabieh, Khaled [1 ]
Mahmoud, Mohamed M. E. A. [1 ]
Azer, Marianne [2 ]
Allam, Mahmoud [3 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] Nile Univ, Natl Telecommun Inst, Cairo, Egypt
[3] Nile Univ, Cairo, Egypt
关键词
Security; Sybil attacks; privacy preservation; collusion attacks; event-reporting schemes; vehicular ad hoc networks; SYBIL ATTACKS;
D O I
10.1002/sec.1251
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In vehicular ad hoc networks, vehicles should report events to warn the drivers of unexpected hazards on the roads. While these reports can contribute to safer driving, vehicular ad hoc networks suffer from various security threats; a major one is Sybil attacks. In these attacks, an individual attacker can pretend as several vehicles that report a false event. In this paper, we propose a secure event-reporting scheme that is resilient to Sybil attacks and preserves the privacy of drivers. Instead of using asymmetric key cryptography, we use symmetric key cryptography to decrease the computation overhead. We propose an efficient pseudonym generation technique. The vehicles receive a small number of long-term secrets to compute pseudonyms/keys to be used in reporting the events without leaking private information about the drivers. In addition, we propose a scheme to identify the vehicles that use their pool of pseudonyms to launch Sybil attacks without leaking private information to road side units. We also study a strong adversary model assuming that attackers can share their pool of pseudonyms to launch colluding Sybil attacks. Our security analysis and simulation results demonstrate that our scheme can detect Sybil attackers effectively with low communication and computation overhead. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:3271 / 3281
页数:11
相关论文
共 50 条
  • [21] Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
    Gong C.
    Xiong L.
    He X.
    Niu X.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (05) : 6273 - 6286
  • [22] Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks
    Zhou, Tong
    Choudhury, Romit Roy
    Ning, Peng
    Chakrabarty, Krishnendu
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 195 - +
  • [23] APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    INFORMATION SECURITY, 2011, 7001 : 293 - +
  • [24] Privacy-preserving authentication schemes for vehicular ad hoc networks: a survey
    Lu, Huang
    Li, Jie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (06): : 643 - 655
  • [25] EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks
    Zhao, Baokang
    Su, Xiangyu
    Su, Jinshu
    Song, Ziming
    Sun, Yipin
    Tao, Jing
    Tang, Yong
    Chen, Shuhui
    Zhao, Guohong
    Chen, Yijiao
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, VOLS I-III, 2010, 1281 : 306 - 309
  • [26] Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks
    Zhong, Hong
    Chen, Lei
    Cui, Jie
    Zhang, Jing
    Bolodurina, Irina
    Liu, Lu
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8485 - 8497
  • [27] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jian-Feng
    Sun, Cong
    Xi, Ning
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 943 - 960
  • [28] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jianfeng
    Sun, Cong
    Wei, Dawei
    Xi, Ning
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 5 - 10
  • [29] Secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    COMPUTER COMMUNICATIONS, 2008, 31 (12) : 2803 - 2814
  • [30] A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography
    Alshudukhi, Jalawi Sulaiman
    Al-Mekhlafi, Zeyad Ghaleb
    Mohammed, Badiea Abdulkarem
    IEEE ACCESS, 2021, 9 : 15633 - 15642