رکورد قبلیرکورد بعدی

" Detecting Sybil Attacks Using Proofs of Work and Location for Vehicular Ad-Hoc Networks (VANETs) "


Document Type : Latin Dissertation
Language of Document : English
Record Number : 1051336
Doc. No : TL50453
Main Entry : Bewermeier, Niclas
Title & Author : Detecting Sybil Attacks Using Proofs of Work and Location for Vehicular Ad-Hoc Networks (VANETs)\ Bewermeier, NiclasMahmoud, Mohamed
College : Tennessee Technological University
Date : 2019
Degree : M.S.
student score : 2019
Note : 98 p.
Abstract : Vehicular Ad-Hoc Networks (VANETs) enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that will pave the way to the next-generation Intelligent Transportation System (ITS). ITS aims to improve the road safety and reduce slow traffic and jams. To preserve driver’s privacy, vehicles should use multiple pseudonyms instead of only one identity. However, malicious vehicles may exploit this abundance of pseudonyms and launch Sybil attacks by pretending to be multiple vehicles. Then, these Sybil (or fake) vehicles report false data, e.g., to create fake congestions or pollute the traffic management data. In this thesis, we propose a novel Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) is responsible for issuing a signed and time-stamped tag as a proof for the vehicle’s anonymous location. Each vehicle should use the proofs sent from multiple RSUs to create an anonymous trajectory. The vehicle should send its trajectory to a traffic management center (TMC) which should use a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that since the Sybil vehicles are bounded physically to one vehicle, their trajectories should overlap. We design the proof of location so that one RSU is not able to create trajectories for the vehicles, but the contributions of several RSUs are needed. By this way, our scheme can be secured against RSU compromise attacks. In addition, to limit the ability of attackers to create multiple trajectories for the Sybil vehicles, upon receiving the proof of location from an RSU, the vehicle also receives a computational puzzle to solve. The vehicles should solve the puzzle and provide the solution (proof of work) to the next RSU to obtain a proof of location. Our extensive simulations and experiments demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.
Descriptor : Computer Engineering
: Computer science
: Electrical engineering
Added Entry : Mahmoud, Mohamed
Added Entry : Tennessee Technological University
کپی لینک

پیشنهاد خرید
پیوستها
عنوان :
نام فایل :
نوع عام محتوا :
نوع ماده :
فرمت :
سایز :
عرض :
طول :
2231143868_706.pdf
2231143868.pdf
پایان نامه لاتین
متن
application/pdf
2.38 MB
85
85
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟