|
" Detecting Sybil Attacks Using Proofs of Work and Location for Vehicular Ad-Hoc Networks (VANETs) "
Bewermeier, Niclas
Mahmoud, Mohamed
Document Type
|
:
|
Latin Dissertation
|
Language of Document
|
:
|
English
|
Record Number
|
:
|
1051336
|
Doc. No
|
:
|
TL50453
|
Main Entry
|
:
|
Bewermeier, Niclas
|
Title & Author
|
:
|
Detecting Sybil Attacks Using Proofs of Work and Location for Vehicular Ad-Hoc Networks (VANETs)\ Bewermeier, NiclasMahmoud, Mohamed
|
College
|
:
|
Tennessee Technological University
|
Date
|
:
|
2019
|
Degree
|
:
|
M.S.
|
student score
|
:
|
2019
|
Note
|
:
|
98 p.
|
Abstract
|
:
|
Vehicular Ad-Hoc Networks (VANETs) enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that will pave the way to the next-generation Intelligent Transportation System (ITS). ITS aims to improve the road safety and reduce slow traffic and jams. To preserve driver’s privacy, vehicles should use multiple pseudonyms instead of only one identity. However, malicious vehicles may exploit this abundance of pseudonyms and launch Sybil attacks by pretending to be multiple vehicles. Then, these Sybil (or fake) vehicles report false data, e.g., to create fake congestions or pollute the traffic management data. In this thesis, we propose a novel Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) is responsible for issuing a signed and time-stamped tag as a proof for the vehicle’s anonymous location. Each vehicle should use the proofs sent from multiple RSUs to create an anonymous trajectory. The vehicle should send its trajectory to a traffic management center (TMC) which should use a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that since the Sybil vehicles are bounded physically to one vehicle, their trajectories should overlap. We design the proof of location so that one RSU is not able to create trajectories for the vehicles, but the contributions of several RSUs are needed. By this way, our scheme can be secured against RSU compromise attacks. In addition, to limit the ability of attackers to create multiple trajectories for the Sybil vehicles, upon receiving the proof of location from an RSU, the vehicle also receives a computational puzzle to solve. The vehicles should solve the puzzle and provide the solution (proof of work) to the next RSU to obtain a proof of location. Our extensive simulations and experiments demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.
|
Descriptor
|
:
|
Computer Engineering
|
|
:
|
Computer science
|
|
:
|
Electrical engineering
|
Added Entry
|
:
|
Mahmoud, Mohamed
|
Added Entry
|
:
|
Tennessee Technological University
|
| |