Detecting Sybil Attack with a Scalable Protocol
Keywords:Vehicular ad hoc networks (VANETs), privacy-preserving schemes, Sybil attacks, certification authority, and pseudonyms.
Vehicular ad hoc networks (VANETs) are being increasingly advocated for traffic control. Security and privacy are two major concerns in VANETs. Unfortunately, in VANETs, most of the privacy-preserving methods are vulnerable to Sybil attacks, whereby a malicious user can act as if to be multiple (other) vehicles. To ensure the authenticity of the messages propagated in VANET, a straight-forward process is to use public keys authorized by a certification authority (CA) to sign the messages. The certified public keys are called pseudonyms. On the other hand, in order to prevent vehicles from being tracked by categorizing the keys that are utilized, each vehicle can switch between multiple pseudonyms, which are difficult to correlate to each other.
2. Kosch, T. I. M. O., and M. A. R. K. U. S. Strassberger. "The role of new wireless technologies in automotive telematics and active safety." 8th Symposium Mobile Communications in Transportation. 2004.
3. El Zarki, Magda, Sharad Mehrotra, Gene Tsudik, and Nalini Venkatasubramanian. "Security issues in a future vehicular network." In European Wireless, vol. 2. 2002.
4. Li, Mingyan, R. Poovendran, K. Sampigethaya, and L. Huang. "Caravan: Providing location privacy for vanet." In Proc. Embedded Security in Cars (ESCAR) Workshop, vol. 2, pp. 13-15, 2005.
5. Choi, Jong Youl, Markus Jakobsson, and Susanne Wetzel. "Balancing auditability and privacy in vehicular networks." In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 79-87. ACM, 2005.
6. Calandriello, Giorgio, Panos Papadimitratos, Jean-Pierre Hubaux, and Antonio Lioy. "Efficient and robust pseudonymous authentication in VANET." In Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, pp. 19-28. ACM, 2007.
7. Rass, Stefan, Simone Fuchs, Martin Schaffer, and Kyandoghere Kyamakya. "How to protect privacy in floating car data systems." In Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking, pp. 17-22. ACM, 2008.
8. Parno, Bryan, and Adrian Perrig. "Challenges in securing vehicular networks." In Workshop on hot topics in networks (HotNets-IV), pp. 1-6. ACM, 2005.
9. Studer, Ahren, Elaine Shi, Fan Bai, and Adrian Perrig. "TACKing together efficient authentication, revocation, and privacy in VANETs." In 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1-9. IEEE, 2009.
10. Golle, Philippe, Dan Greene, and Jessica Staddon. "Detecting and correcting malicious data in VANETs." In Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pp. 29-37, 2004.
11. Raya, M., & Hubaux, J. P. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39-68, 2007.
12. Raya, M., Jungels, D., Papadimitratos, P., Aad, I., & Hubaux, J. P. “Certificate revocation in vehicular networks”. Laboratory for computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland, 2006.
13. Suh, W., Yun, H., Chon, K. S., & Park, C. H. “Forecasting hourly traffic volume of airport access road: Case study of incheon international airport”. 2005 Annual Transportation Research Boards’ (TRB) Meeeting, 2005.
14. P. Flajolet, D. Gardy, and L. Thimonier, “Birthday paradox, coupon collectors, caching algorithms and self-organized search,” Discrete Applied Mathematics, vol. 39, pp. 207 – 229, 1992.
15. Sweeney, L. (2002) “k-anonymity: A model for protecting privacy”, International Journal on Uncertainty. Fuzziness and Knowledge-based Systems, vol.10, no.5, pp.557–570.
Authors need to sign following agreement with International Journal of MC Square Scientific Research before publishing their articles:
- Authors need to return copyright form to Journal Editor-in-chief to proceed their articles for publication. Meantime, the journal licensed under a Creative Commons Attribution License, which permits other user to distribute the work with an acknowledgement of the authors for International Journal of MC Square Scientific Research.
- Authors are also able to share their separate, additional contractual arrangements for the non-restricted contribution of the journal with an acknowledgement of publication in International Journal of MC Square Scientific Research.
- Authors are allowed and encouraged to share their work during the submission process for increasing citation and exploring to increase the paper availability in worldwide way. The Effect of Open Access.