Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons

被引:1
|
作者
Junaidi, Danial R. [1 ]
Ma, Maode [2 ]
Su, Rong [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, 50 Nanyang Ave, Singapore 639798, Singapore
[2] Qatar Univ, Coll Engn, Doha 2713, Qatar
关键词
D O I
10.1109/ICARCV57592.2022.10004350
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicles into the platoons, allowing them to wreak havoc on the platoon, which is known as a Sybil attack. In this paper, we propose a secure vehicular authentication scheme for platoon admission which is resistant to the threats of Sybil attacks. The proposed scheme offers a mutual authentication on both vehicle identity and message through a combination of a key exchange, a digital signature and an encryption scheme based on Elliptic Curve Cryptography (ECC). The scheme holds its outstanding feature to provide both perfect forward secrecy and group backward secrecy to ensure the protection of anonymity of vehicles and platoons while typical malicious attacks such as replay, and man-in-the-middle attacks can also be resisted. A formal evaluation of the security of the scheme by Canetti-Krawczyk (CK) adversary and random oracle model has been conducted to demonstrate its security functionality. Finally, the performance of the proposed scheme has been evaluated to show its efficiency.
引用
收藏
页码:949 / 954
页数:6
相关论文
共 50 条
  • [31] An Iris-Based Authentication Framework to Prevent Presentation Attacks
    Shahriar, Hossain
    Haddad, Hisham
    Islam, Mahbubul
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 504 - 509
  • [32] On avoiding saturation in the control of vehicular platoons
    Jovanovic, MR
    Fowler, JM
    Bamieh, B
    D'Andrea, R
    PROCEEDINGS OF THE 2004 AMERICAN CONTROL CONFERENCE, VOLS 1-6, 2004, : 2257 - 2262
  • [33] Distributed control of heterogeneous vehicular platoons
    Qin X.
    Wang J.
    Xie B.
    Hu M.
    Li K.
    Li, Keqiang (likq@tsinghua.edu.cn), 1600, SAE-China (39): : 73 - 78and106
  • [34] On the peaking phenomenon in the control of vehicular platoons
    Jovanovic, Mihailo R.
    Fowler, Jeffrey M.
    Bamieh, Bassam
    D'Andrea, Raffaello
    SYSTEMS & CONTROL LETTERS, 2008, 57 (07) : 528 - 537
  • [35] Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks
    Haddaji, Achref
    Ayed, Samiha
    Fourati, Lamia Chaari
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 155 - 163
  • [36] Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm
    Mahdi Maleknasab Ardakani
    Mohammad Ali Tabarzad
    Mohammad Amin Shayegan
    The Journal of Supercomputing, 2022, 78 : 16303 - 16335
  • [37] Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm
    Ardakani, Mahdi Maleknasab
    Tabarzad, Mohammad Ali
    Shayegan, Mohammad Amin
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (14): : 16303 - 16335
  • [38] Detecting Sybil attacks in VANETs
    Yu, Bo
    Xu, Cheng-Zhong
    Xiao, Bin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (06) : 746 - 756
  • [39] Unveiling Sybil Attacks Using AI-Driven Techniques in Software-Defined Vehicular Networks
    Nayak, Rajendra Prasad
    Bhoi, Sourav Kumar
    Sahoo, Kshira Sagar
    Sethi, Srinivas
    Mohapatra, Subasish
    Bhuyan, Monowar
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [40] REPLACE: Real-time Security Assurance in Vehicular Platoons Against V2V Attacks
    Boddupalli, Srivalli
    Hegde, Ashwini
    Ray, Sandip
    2021 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2021, : 1179 - 1185