Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications

Full metadata record
DC Field Value Language
dc.contributor.authorHussain, Rasheed-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2021-06-22T23:02:06Z-
dc.date.available2021-06-22T23:02:06Z-
dc.date.issued2014-08-
dc.identifier.issn0929-6212-
dc.identifier.issn1572-834X-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/22344-
dc.description.abstractThe foreseen dream of Vehicular Ad Hoc NETwork (VANET) deployment is obstructed by long-chased security and privacy nightmares. Despite of the increasing demand for perfect privacy, it conflicts with rather more serious security threat called 'Sybil Attack' which refers to, impersonation of one physical entity for many, namely Sybil nodes. In such circumstances, data received from malicious Sybil attacker may seem as if it was received from many distinct physical nodes. Sybil nodes may deliberately mislead other neighbors, resulting in catastrophic situations like traffic jams or even deadly accidents. Preventing such attacks in a privacy-enabled environment is not a trivial task. In this paper, we aim at two conflicting goals, i.e. privacy and Sybil attack in VANET. We leverage pseudonymless beaconing in order to preserve privacy. To cope with Sybil attack, we put forth a twofold strategy. In order to avoid Sybil attack through scheduled beacons, we employ tamper resistant module (TRM) to carry out a pre-assembly data analysis on data that is used to assemble beacons whereas for event reporting message (ERM), we employ road side units (RSUs) to localize Sybil nodes in VANET and report them to the revocation authority(s). RSUs distribute authorized tokens among the benign vehicular nodes which in turn are consumed to report ERMs. RSUs collect ERMs for certain event and figures out if more than one ERM for the same event includes identical token or, if an ERM is sent more than once by the same source. Our proposed scheme preserves privacy in both beacons and ERMs, and provides conditional anonymity where in case of a dispute; malicious attackers are subject to revocation. We also show that our proposed scheme outperforms the previously proposed scheme from security and computational complexity standpoint.-
dc.format.extent25-
dc.language영어-
dc.language.isoENG-
dc.publisherSPRINGER-
dc.titleOn Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1007/s11277-014-1659-5-
dc.identifier.scopusid2-s2.0-84904602169-
dc.identifier.wosid000340470500013-
dc.identifier.bibliographicCitationWIRELESS PERSONAL COMMUNICATIONS, v.77, no.4, pp 2649 - 2673-
dc.citation.titleWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.volume77-
dc.citation.number4-
dc.citation.startPage2649-
dc.citation.endPage2673-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorVANET-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorSybil attack-
dc.subject.keywordAuthorBeaconing-
dc.subject.keywordAuthorEvent reporting messages-
dc.identifier.urlhttps://link.springer.com/article/10.1007/s11277-014-1659-5-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE