B. Pooja, M. M. Manohara Pai, R. Pai, N. Ajam, J. Mouzna
{"title":"VANETs中基于签名身份验证的内部和外部DoS攻击缓解","authors":"B. Pooja, M. M. Manohara Pai, R. Pai, N. Ajam, J. Mouzna","doi":"10.1109/APCASE.2014.6924490","DOIUrl":null,"url":null,"abstract":"Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"40","resultStr":"{\"title\":\"Mitigation of insider and outsider DoS attack against signature based authentication in VANETs\",\"authors\":\"B. Pooja, M. M. Manohara Pai, R. Pai, N. Ajam, J. Mouzna\",\"doi\":\"10.1109/APCASE.2014.6924490\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.\",\"PeriodicalId\":118511,\"journal\":{\"name\":\"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"40\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APCASE.2014.6924490\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCASE.2014.6924490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mitigation of insider and outsider DoS attack against signature based authentication in VANETs
Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.