DEFENSE AGAINST SYBIL ATTACK IN VEHICULAR AD HOC NETWORK BASED ON ROADSIDE UNIT SUPPORT

被引:0
作者
Park, Soyoung [1 ]
Aslam, Baber [1 ]
Turgut, Damla [1 ]
Zou, Cliff C. [1 ]
机构
[1] Univ Cent Florida, Sch Elect Engn & Comp Sci, Orlando, FL 32816 USA
来源
MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4 | 2009年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a timestamp series approach to defend against Sybil attack in a vehicular ad hoc network (VANET) based on roadside unit support. The proposed approach targets the initial deployment stage of VANET when basic roadside unit (RSU) support infrastructure is available and a small fraction of vehicles have network communication capability. Unlike previously proposed schemes that require a dedicated vehicular public key infrastructure to certify individual vehicles, in our approach RSUs are the only components issuing the certificates. Due to the differences of moving dynamics among vehicles, it is rare to have two vehicles passing by multiple RSUs at exactly the same time. By exploiting this spatial and temporal correlation between vehicles and RSUs, two messages will be treated as Sybil attack issued by one vehicle if they have the similar timestamp series issued by RSUs. The timestamp series approach needs neither vehicular-based public-key infrastructure nor Internet accessible RSUs, which makes it an economical solution suitable for the initial stage of VANET.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 13 条
[1]  
Bertsekas DP., 2008, Introduction to probability, V2
[2]  
Blum J., 2004, IT Professional, V6, P24, DOI 10.1109/MITP.2004.1265539
[3]  
Demirbas Murat., 2006, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, P564
[4]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[5]  
GUETTE G., 2007, P IEEE INT C MOB ADH
[6]  
Guettel G, 2008, LECT NOTES COMPUT SC, V5019, P106, DOI 10.1007/978-3-540-79966-5_8
[7]   Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks [J].
Lv, Shaohe ;
Wang, Xiaodong ;
Zhao, Xin ;
Zhou, Xingming .
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, :442-446
[8]  
Newsome J, 2004, IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P259
[9]   Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks [J].
Pal, Sarit ;
Mukhopadhyay, Asish K. ;
Bhattacharya, Partha Pratim .
IETE TECHNICAL REVIEW, 2008, 25 (04) :209-215
[10]   Securing vehicular ad hoc networks [J].
Raya, Maxim ;
Hubaux, Jean-Pierre .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (01) :39-68