Spatio-Temporal Analysis Based Resist Conspiracy Sybil Attack Detection in VANETs

被引:0
|
作者
Shi Y.-L. [1 ]
Wang L.-M. [1 ]
机构
[1] School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, 212013, Jiangsu
来源
基金
中国国家自然科学基金;
关键词
Conspiracy Sybil attack; Dynamic anonymous mechanism; Privacy protection; Timestamp token; VANETs;
D O I
10.11897/SP.J.1016.2018.02148
中图分类号
学科分类号
摘要
In Vehicular Ad Hoc Networks(VANETs), Attacker can obtain multiple network identities by forging, stealing and conspiring with other legal vehicles, then they use these Sybil identities to transmit fake traffic information to create an illusion traffic congestion, even would cause more serious traffic accidents. The most current Sybil attack detection scheme primarily detects forged identity and stolen identity Sybil attack, there is rare research to detect conspiracy Sybil attack. In addition, Sybil attack detection need to bind each vehicle to a single identity in order to keep adversaries from playing multiple roles or spoofing with other legitimate identities, this will lead to privacy reveal issues. In order to balanced solve the two conflicting problems between Sybil attack detection and privacy protection, we propose a resist conspiracy Sybil attack detection method based on Spatio-Temporal Analysis based Resist Conspiracy Sybil Attack(STARCS). The method uses anonymous road side unit(RSU) released timestamp token as identity in VANETs, and there set a table to record RSU that last passed and timestamp by Trust Authority(TA), the table is called request information table to record the RSU and timestamp which vehicle last passed, to defend the generation of stolen and conspired Sybil identities. In this paper, each alarm event only allows each vehicle to release an alert message with timestamp token to detect Sybil attack, and we check whether the timestamp token contained in multiple alert messages and used by a plurality of vehicles at the same time to detect conspiracy Sybil attack which attacker and conspired vehicles using the same identity at the same time, and based on the adjacent relation tag of RSUs which embedded in the timestamp token to detect conspiracy Sybil attack which attacker conspired with the long-distance vehicles launch Sybil attack. Due to we detect conspiracy Sybil attack from the perspective of time to analyze whether the identity is abused or not and from the perspective of spatial to analyze whether the identity is appearing unreasonable displacement or not, that is, from the spatio-temporal analysis to resist and detect conspiracy Sybil attack. Theoretical analysis and simulation results show this method not only can defend or detect various types of Sybil attack, but also has less computation overhead and communication overhead, and it can protect the privacy of vehicle's identity and position by dynamic anonymity mechanism. © 2018, Science Press. All right reserved.
引用
收藏
页码:2148 / 2161
页数:13
相关论文
共 22 条
  • [1] Kaur N., Arora A., A research on various attacks in VANET, International Journal of Advanced Research in Computer Science, 6, 6, (2015)
  • [2] Ghaleb F.A., Zainal A., Rassam M.A., Data verification and misbehavior detection in vehicular ad-hoc networks, Jurnal Teknologi, 73, 2, pp. 37-44, (2015)
  • [3] Feng X., Li C.Y., Chen D.X., Et al., EBRS: Event based reputation system for defensing multi-source Sybil attacks in VANET, Xu K, Zhu H eds. Wireless Algorithms, Systems, and Applications, 9204, pp. 145-154, (2015)
  • [4] Douceur J.R., The Sybil attack, Proceedings of the 1st International Workshop on Peer-to-Peer Systems, pp. 251-260, (2002)
  • [5] Saggi M.K., Kaur R., Isolation of Sybil attack in VANET using neighboring information, Proceedings of the IEEE International Advance Computing Conference(IACC), pp. 46-51, (2015)
  • [6] Kaur R., Malhotra N.C.J., Sybil attacks detection in vehicular ad hoc networks, International Journal of Advanced Research, 3, 6, pp. 1085-1096, (2015)
  • [7] Feng X., Li C.Y., Chen D.X., Et al., A method for defensing against multi-source Sybil attacks in VANET, Peer-to-Peer Networking and Applications, 10, 2, pp. 305-314, (2016)
  • [8] Newsome J., Shi E., Song D., Et al., The Sybil attack in sensor networks: Analysis & defenses, Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259-268, (2004)
  • [9] Zhou T., Choudhury R.R., Ning P., Et al., P2DAP-Sybil attacks detection in vehicular ad hoc networks, IEEE Journal on Selected Areas in Communications, 29, 3, pp. 582-594, (2011)
  • [10] Yu B., Xu C.Z., Xiao B., Detecting Sybil attacks in VANETs, Journal of Parallel and Distributed Computing, 73, 6, pp. 746-756, (2013)