Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons

被引:1
|
作者
Junaidi, Danial R. [1 ]
Ma, Maode [2 ]
Su, Rong [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, 50 Nanyang Ave, Singapore 639798, Singapore
[2] Qatar Univ, Coll Engn, Doha 2713, Qatar
关键词
D O I
10.1109/ICARCV57592.2022.10004350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicles into the platoons, allowing them to wreak havoc on the platoon, which is known as a Sybil attack. In this paper, we propose a secure vehicular authentication scheme for platoon admission which is resistant to the threats of Sybil attacks. The proposed scheme offers a mutual authentication on both vehicle identity and message through a combination of a key exchange, a digital signature and an encryption scheme based on Elliptic Curve Cryptography (ECC). The scheme holds its outstanding feature to provide both perfect forward secrecy and group backward secrecy to ensure the protection of anonymity of vehicles and platoons while typical malicious attacks such as replay, and man-in-the-middle attacks can also be resisted. A formal evaluation of the security of the scheme by Canetti-Krawczyk (CK) adversary and random oracle model has been conducted to demonstrate its security functionality. Finally, the performance of the proposed scheme has been evaluated to show its efficiency.
引用
收藏
页码:949 / 954
页数:6
相关论文
共 50 条
  • [1] Defending against Sybil Attacks in Vehicular Platoons
    Santhosh, Jesty
    Sankaran, Sriram
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [2] Vehicular Platoons Security: A Review with an Emphasis on Sybil Attacks
    Hassine, Yosra
    Touati, Haifa
    2023 12TH IFIP/IEEE INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS, PEMWN, 2023,
  • [3] A Survey of Techniques to Prevent Sybil Attacks
    John, RincyMedayil
    Cherian, Jacob P.
    Kizhakkethottam, Jubilant J.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,
  • [4] Merged technique to prevent SYBIL Attacks in VANETs
    Syed, Salman Ali
    Prasad, B. V. V. S.
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 287 - 292
  • [5] Secure Vehicular Platoon Management against Sybil Attacks
    Junaidi, Danial Ritzuan
    Ma, Maode
    Su, Rong
    SENSORS, 2022, 22 (22)
  • [6] Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
    Chang, Shan
    Qi, Yong
    Zhu, Hongzi
    Zhao, Jizhong
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 1103 - 1114
  • [7] Detecting Sybil attacks in vehicular ad hoc networks
    Hamdan S.
    Hudaib A.
    Awajan A.
    International Journal of Parallel, Emergent and Distributed Systems, 2021, 36 (02) : 69 - 79
  • [8] Combating Sybil Attacks in Vehicular Ad Hoc Networks
    Rabieh, Khaled Mohamed
    Azer, Marianne Amir
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 65 - 72
  • [9] A Blockchain-based Lightweight Authentication Protocol for Vehicular Platoons
    Carvajal-Roca, Ivan E.
    Shi, Jinming
    Wang, Jian
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [10] SRJE: Decentralized Authentication Scheme against Sybil Attacks
    Mashimo, Yo
    Yasutomi, Masanori
    Shigeno, Hiroshi
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 220 - 225