反西比尔:在保护隐私的VANET中反对西比尔攻击

Rasheed Hussain, Heekuck Oh, Sangjin Kim
{"title":"反西比尔:在保护隐私的VANET中反对西比尔攻击","authors":"Rasheed Hussain, Heekuck Oh, Sangjin Kim","doi":"10.1109/ICCVE.2012.27","DOIUrl":null,"url":null,"abstract":"In this paper, we aim at two conflicting goals, privacy and Sybil attacks in Vehicular Ad Hoc NETworks (VANETs). Sybil attack refers to impersonation of one physical entity for many, namely Sybil nodes. Such attacks may cause dire consequences such as traffic jams or even deadly accidents. We leverage pseudonymless beaconing in order to preserve privacy. To cope with the Sybil attack, we put forth a two fold strategy. For scheduled beacons, we mploy TRM (Tamper Resistant Module) to perform a lightweight pre-assembly data analysis on beacons whereas for ERMs (Event Reporting Messages), RSUs distribute authorized tokens among benign vehicular nodes which in turn are consumed to report ERM. Our proposed scheme preserves privacy in both beacons and ERMs, and offers conditional anonymity.","PeriodicalId":182453,"journal":{"name":"2012 International Conference on Connected Vehicles and Expo (ICCVE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET\",\"authors\":\"Rasheed Hussain, Heekuck Oh, Sangjin Kim\",\"doi\":\"10.1109/ICCVE.2012.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we aim at two conflicting goals, privacy and Sybil attacks in Vehicular Ad Hoc NETworks (VANETs). Sybil attack refers to impersonation of one physical entity for many, namely Sybil nodes. Such attacks may cause dire consequences such as traffic jams or even deadly accidents. We leverage pseudonymless beaconing in order to preserve privacy. To cope with the Sybil attack, we put forth a two fold strategy. For scheduled beacons, we mploy TRM (Tamper Resistant Module) to perform a lightweight pre-assembly data analysis on beacons whereas for ERMs (Event Reporting Messages), RSUs distribute authorized tokens among benign vehicular nodes which in turn are consumed to report ERM. Our proposed scheme preserves privacy in both beacons and ERMs, and offers conditional anonymity.\",\"PeriodicalId\":182453,\"journal\":{\"name\":\"2012 International Conference on Connected Vehicles and Expo (ICCVE)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Connected Vehicles and Expo (ICCVE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCVE.2012.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Connected Vehicles and Expo (ICCVE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCVE.2012.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

在本文中,我们针对两个相互冲突的目标,隐私和西比尔攻击在车载自组织网络(vanet)。Sybil攻击是指对多个物理实体(即Sybil节点)进行模拟。这种攻击可能会造成可怕的后果,如交通堵塞,甚至致命的事故。我们利用匿名信标来保护隐私。为了应对西比尔的袭击,我们提出了一个双重战略。对于预定的信标,我们使用TRM(防篡改模块)对信标执行轻量级的预组装数据分析,而对于ERM(事件报告消息),rsu在良性车辆节点之间分发授权令牌,这些令牌反过来被用于报告ERM。我们提出的方案保护信标和erm中的隐私,并提供条件匿名。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
AntiSybil: Standing against Sybil Attacks in Privacy-Preserved VANET
In this paper, we aim at two conflicting goals, privacy and Sybil attacks in Vehicular Ad Hoc NETworks (VANETs). Sybil attack refers to impersonation of one physical entity for many, namely Sybil nodes. Such attacks may cause dire consequences such as traffic jams or even deadly accidents. We leverage pseudonymless beaconing in order to preserve privacy. To cope with the Sybil attack, we put forth a two fold strategy. For scheduled beacons, we mploy TRM (Tamper Resistant Module) to perform a lightweight pre-assembly data analysis on beacons whereas for ERMs (Event Reporting Messages), RSUs distribute authorized tokens among benign vehicular nodes which in turn are consumed to report ERM. Our proposed scheme preserves privacy in both beacons and ERMs, and offers conditional anonymity.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信