VANETs中基于签名身份验证的内部和外部DoS攻击缓解

B. Pooja, M. M. Manohara Pai, R. Pai, N. Ajam, J. Mouzna
{"title":"VANETs中基于签名身份验证的内部和外部DoS攻击缓解","authors":"B. Pooja, M. M. Manohara Pai, R. Pai, N. Ajam, J. Mouzna","doi":"10.1109/APCASE.2014.6924490","DOIUrl":null,"url":null,"abstract":"Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.","PeriodicalId":118511,"journal":{"name":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"40","resultStr":"{\"title\":\"Mitigation of insider and outsider DoS attack against signature based authentication in VANETs\",\"authors\":\"B. Pooja, M. M. Manohara Pai, R. Pai, N. Ajam, J. Mouzna\",\"doi\":\"10.1109/APCASE.2014.6924490\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.\",\"PeriodicalId\":118511,\"journal\":{\"name\":\"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"40\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APCASE.2014.6924490\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCASE.2014.6924490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 40

摘要

身份验证是VANETs中安全可靠的消息通信的基本框架。为了验证消息,IEEE 1609.2标准使用ECDSA作为标准数字签名算法。但是ECDSA签名的验证时间非常长。因此,内部或外部攻击者可以使用一小部分带宽,并用无效签名淹没网络,从而导致拒绝服务(DoS)攻击。因此,本文提出了一种两阶段方案来缓解vanet中的内部和外部DoS攻击。在第一阶段,使用从私钥对和公钥对中计算出的HMAC签名对通信实体进行身份验证。只有经过认证的用户才能计算出HMAC签名,减少了外部攻击者的DoS攻击。如果实体是真实的,并且使其他车辆受到DoS攻击,则第二阶段旨在检测内部攻击者。在此阶段,根据攻击者泛滥的无效签名的数量,将其与阈值进行比较,以识别内部攻击者。因此,由于内部和外部攻击者,DoS攻击得到了缓解。实验结果表明,该方案不仅减轻了DoS攻击,而且性能较好,计算开销可以忽略不计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Mitigation of insider and outsider DoS attack against signature based authentication in VANETs
Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信