Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons

被引:1
|
作者
Junaidi, Danial R. [1 ]
Ma, Maode [2 ]
Su, Rong [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, 50 Nanyang Ave, Singapore 639798, Singapore
[2] Qatar Univ, Coll Engn, Doha 2713, Qatar
关键词
D O I
10.1109/ICARCV57592.2022.10004350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicles into the platoons, allowing them to wreak havoc on the platoon, which is known as a Sybil attack. In this paper, we propose a secure vehicular authentication scheme for platoon admission which is resistant to the threats of Sybil attacks. The proposed scheme offers a mutual authentication on both vehicle identity and message through a combination of a key exchange, a digital signature and an encryption scheme based on Elliptic Curve Cryptography (ECC). The scheme holds its outstanding feature to provide both perfect forward secrecy and group backward secrecy to ensure the protection of anonymity of vehicles and platoons while typical malicious attacks such as replay, and man-in-the-middle attacks can also be resisted. A formal evaluation of the security of the scheme by Canetti-Krawczyk (CK) adversary and random oracle model has been conducted to demonstrate its security functionality. Finally, the performance of the proposed scheme has been evaluated to show its efficiency.
引用
收藏
页码:949 / 954
页数:6
相关论文
共 50 条
  • [21] An Efficient Technique To Detect And Prevent Sybil Attacks In Social Network Applications
    Samuel, S. Justin
    Dhivya, B.
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [22] Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication
    Ruan, Na
    Su, Chunhua
    Xie, Chi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (02) : 256 - 264
  • [23] Effective Attacks in the Tor Authentication Protocol
    Zhang, Yang
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 81 - 86
  • [24] A Privacy-Preserving Authentication and Sybil Detection Protocol for Vehicular Ad Hoc Networks
    de Sales, Thiago M.
    Almeida, Hyggo O.
    Perkusich, Angelo
    de Sales, Leandro
    de Sales, Marcello
    2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2014, : 428 - 429
  • [25] Regional Blockchain for Vehicular Networks to Prevent 51% Attacks
    Shrestha, Rakesh
    Nam, Seung Yeob
    IEEE ACCESS, 2019, 7 : 95033 - 95045
  • [26] P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks
    Zhou, Tong
    Roy, Romit
    Ning, Choudhury Peng
    Chakrabarty, Krishnendu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 582 - 594
  • [27] Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks
    Triki, Bayrem
    Rekhis, Slim
    Chammem, Mhamed
    Boudriga, Noureddine
    2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
  • [28] Defense against Sybil attacks and authentication for anonymous location-based routing in MANET
    Kumari, S. Vadhana
    Paramasivan, B.
    WIRELESS NETWORKS, 2017, 23 (03) : 715 - 726
  • [29] Vehicular platoons in cyclic interconnections
    Studli, Sonja
    Seron, Maria M.
    Middleton, Richard H.
    AUTOMATICA, 2018, 94 : 283 - 293
  • [30] Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks
    Krzywiecki, Lukasz
    Koziel, Patryk
    Panwar, Nisha
    2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 383 - 386