{"title":"反西比尔:在保护隐私的VANET中反对西比尔攻击","authors":"Rasheed Hussain, Heekuck Oh, Sangjin Kim","doi":"10.1109/ICCVE.2012.27","DOIUrl":null,"url":null,"abstract":"In this paper, we aim at two conflicting goals, privacy and Sybil attacks in Vehicular Ad Hoc NETworks (VANETs). Sybil attack refers to impersonation of one physical entity for many, namely Sybil nodes. Such attacks may cause dire consequences such as traffic jams or even deadly accidents. We leverage pseudonymless beaconing in order to preserve privacy. To cope with the Sybil attack, we put forth a two fold strategy. For scheduled beacons, we mploy TRM (Tamper Resistant Module) to perform a lightweight pre-assembly data analysis on beacons whereas for ERMs (Event Reporting Messages), RSUs distribute authorized tokens among benign vehicular nodes which in turn are consumed to report ERM. Our proposed scheme preserves privacy in both beacons and ERMs, and offers conditional anonymity.","PeriodicalId":182453,"journal":{"name":"2012 International Conference on Connected Vehicles and Expo (ICCVE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET\",\"authors\":\"Rasheed Hussain, Heekuck Oh, Sangjin Kim\",\"doi\":\"10.1109/ICCVE.2012.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we aim at two conflicting goals, privacy and Sybil attacks in Vehicular Ad Hoc NETworks (VANETs). Sybil attack refers to impersonation of one physical entity for many, namely Sybil nodes. Such attacks may cause dire consequences such as traffic jams or even deadly accidents. We leverage pseudonymless beaconing in order to preserve privacy. To cope with the Sybil attack, we put forth a two fold strategy. For scheduled beacons, we mploy TRM (Tamper Resistant Module) to perform a lightweight pre-assembly data analysis on beacons whereas for ERMs (Event Reporting Messages), RSUs distribute authorized tokens among benign vehicular nodes which in turn are consumed to report ERM. Our proposed scheme preserves privacy in both beacons and ERMs, and offers conditional anonymity.\",\"PeriodicalId\":182453,\"journal\":{\"name\":\"2012 International Conference on Connected Vehicles and Expo (ICCVE)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Connected Vehicles and Expo (ICCVE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCVE.2012.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Connected Vehicles and Expo (ICCVE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCVE.2012.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET
In this paper, we aim at two conflicting goals, privacy and Sybil attacks in Vehicular Ad Hoc NETworks (VANETs). Sybil attack refers to impersonation of one physical entity for many, namely Sybil nodes. Such attacks may cause dire consequences such as traffic jams or even deadly accidents. We leverage pseudonymless beaconing in order to preserve privacy. To cope with the Sybil attack, we put forth a two fold strategy. For scheduled beacons, we mploy TRM (Tamper Resistant Module) to perform a lightweight pre-assembly data analysis on beacons whereas for ERMs (Event Reporting Messages), RSUs distribute authorized tokens among benign vehicular nodes which in turn are consumed to report ERM. Our proposed scheme preserves privacy in both beacons and ERMs, and offers conditional anonymity.