Detecting Sybil Attack with a Scalable Protocol

Authors

  • Hemalatha T

DOI:

https://doi.org/10.20894/IJMSR.117.004.001.005

Keywords:

Vehicular ad hoc networks (VANETs), privacy-preserving schemes, Sybil attacks, certification authority, and pseudonyms.

Abstract

Vehicular ad hoc networks (VANETs) are being increasingly advocated for traffic control. Security and privacy are two major concerns in VANETs. Unfortunately, in VANETs, most of the privacy-preserving methods are vulnerable to Sybil attacks, whereby a malicious user can act as if to be multiple (other) vehicles. To ensure the authenticity of the messages propagated in VANET, a straight-forward process is to use public keys authorized by a certification authority (CA) to sign the messages. The certified public keys are called “pseudonyms”. On the other hand, in order to prevent vehicles from being tracked by categorizing the keys that are utilized, each vehicle can switch between multiple pseudonyms, which are difficult to correlate to each other.

Downloads

Download data is not yet available.

Author Biography

Hemalatha T

New Prince Shri Bhavani college of Engineering and Technology, Gowrivakkam, Tamilnadu. India.

References

1. Enkelmann, W. “Fleetnet-applications for inter-vehicle communication”. In Intelligent Vehicles Symposium, 2003. Proceedings. IEEE, pp. 162-167, June 2003.

2. Kosch, T. I. M. O., and M. A. R. K. U. S. Strassberger. "The role of new wireless technologies in automotive telematics and active safety." 8th Symposium Mobile Communications in Transportation. 2004.

3. El Zarki, Magda, Sharad Mehrotra, Gene Tsudik, and Nalini Venkatasubramanian. "Security issues in a future vehicular network." In European Wireless, vol. 2. 2002.

4. Li, Mingyan, R. Poovendran, K. Sampigethaya, and L. Huang. "Caravan: Providing location privacy for vanet." In Proc. Embedded Security in Cars (ESCAR) Workshop, vol. 2, pp. 13-15, 2005.

5. Choi, Jong Youl, Markus Jakobsson, and Susanne Wetzel. "Balancing auditability and privacy in vehicular networks." In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 79-87. ACM, 2005.

6. Calandriello, Giorgio, Panos Papadimitratos, Jean-Pierre Hubaux, and Antonio Lioy. "Efficient and robust pseudonymous authentication in VANET." In Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, pp. 19-28. ACM, 2007.

7. Rass, Stefan, Simone Fuchs, Martin Schaffer, and Kyandoghere Kyamakya. "How to protect privacy in floating car data systems." In Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking, pp. 17-22. ACM, 2008.

8. Parno, Bryan, and Adrian Perrig. "Challenges in securing vehicular networks." In Workshop on hot topics in networks (HotNets-IV), pp. 1-6. ACM, 2005.

9. Studer, Ahren, Elaine Shi, Fan Bai, and Adrian Perrig. "TACKing together efficient authentication, revocation, and privacy in VANETs." In 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1-9. IEEE, 2009.

10. Golle, Philippe, Dan Greene, and Jessica Staddon. "Detecting and correcting malicious data in VANETs." In Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pp. 29-37, 2004.

11. Raya, M., & Hubaux, J. P. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39-68, 2007.

12. Raya, M., Jungels, D., Papadimitratos, P., Aad, I., & Hubaux, J. P. “Certificate revocation in vehicular networks”. Laboratory for computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland, 2006.

13. Suh, W., Yun, H., Chon, K. S., & Park, C. H. “Forecasting hourly traffic volume of airport access road: Case study of incheon international airport”. 2005 Annual Transportation Research Boards’ (TRB) Meeeting, 2005.

14. P. Flajolet, D. Gardy, and L. Thimonier, “Birthday paradox, coupon collectors, caching algorithms and self-organized search,” Discrete Applied Mathematics, vol. 39, pp. 207 – 229, 1992.

15. Sweeney, L. (2002) “k-anonymity: A model for protecting privacy”, International Journal on Uncertainty. Fuzziness and Knowledge-based Systems, vol.10, no.5, pp.557–570.

Downloads

Published

2012-12-15

Issue

Section

Articles