可靠的、可扩展的、抗dos攻击的安全车载通信

IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Hongyu Jin, Panos Papadimitratos
{"title":"可靠的、可扩展的、抗dos攻击的安全车载通信","authors":"Hongyu Jin,&nbsp;Panos Papadimitratos","doi":"10.1016/j.cose.2025.104469","DOIUrl":null,"url":null,"abstract":"<div><div>Standardized Vehicular Communication (VC), mainly Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs), is paramount to vehicle safety, carrying vehicle status information and reports of traffic/road-related events respectively. Broadcasted CAMs and DENMs are pseudonymously authenticated for security and privacy protection, with each node needing to have all incoming messages validated within an expiration deadline. This creates an asymmetry that can be easily exploited by external adversaries to launch a clogging Denial of Service (DoS) attack: each forged VC message forces all neighboring nodes to cryptographically validate it; at increasing rates, easy to generate forged messages gradually exhaust processing resources and severely degrade or deny timely validation of benign CAMs/DENMs. The result can be catastrophic when awareness of neighbor vehicle positions or critical reports are missed. We address this problem making the standardized VC pseudonymous authentication <em>DoS-resilient</em>. We propose efficient cryptographic constructs, which we term message verification <em>facilitators</em>, to prioritize processing resources for verification of potentially valid messages among bogus messages and verify multiple messages based on one signature verification. Any message acceptance is strictly based on public-key based message authentication/verification for <em>accountability</em>, i.e., <em>non-repudiation</em> is not sacrificed, unlike symmetric key based approaches. This further enables drastic <em>misbehavior detection</em>, also exploiting the newly introduced facilitators, based on probabilistic signature verification and cross-checking over multiple facilitators verifying the same message; while maintaining verification latency low even when under attack, trading off modest communication overhead. Our facilitators can also be used for efficient discovery and verification of <em>DENM</em> or any <em>event-driven message</em>, including <em>misbehavior evidence</em> used for our scheme. Even when vehicles are saturated by adversaries mounting a clogging DoS attack, transmitting high-rate bogus CAMs/DENMs, our scheme achieves an average <span><math><mrow><mn>50</mn><mspace></mspace><mi>m</mi><mi>s</mi></mrow></math></span> verification delay with message expiration ratio less than 1% - a huge improvement over the current standard that verifies every message signature in a First-Come First-Served (FCFS) manner and suffers from having 50% to nearly 100% of the received benign messages expiring.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"156 ","pages":"Article 104469"},"PeriodicalIF":4.8000,"publicationDate":"2025-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Accountable, Scalable and DoS-resilient Secure Vehicular Communication\",\"authors\":\"Hongyu Jin,&nbsp;Panos Papadimitratos\",\"doi\":\"10.1016/j.cose.2025.104469\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Standardized Vehicular Communication (VC), mainly Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs), is paramount to vehicle safety, carrying vehicle status information and reports of traffic/road-related events respectively. Broadcasted CAMs and DENMs are pseudonymously authenticated for security and privacy protection, with each node needing to have all incoming messages validated within an expiration deadline. This creates an asymmetry that can be easily exploited by external adversaries to launch a clogging Denial of Service (DoS) attack: each forged VC message forces all neighboring nodes to cryptographically validate it; at increasing rates, easy to generate forged messages gradually exhaust processing resources and severely degrade or deny timely validation of benign CAMs/DENMs. The result can be catastrophic when awareness of neighbor vehicle positions or critical reports are missed. We address this problem making the standardized VC pseudonymous authentication <em>DoS-resilient</em>. We propose efficient cryptographic constructs, which we term message verification <em>facilitators</em>, to prioritize processing resources for verification of potentially valid messages among bogus messages and verify multiple messages based on one signature verification. Any message acceptance is strictly based on public-key based message authentication/verification for <em>accountability</em>, i.e., <em>non-repudiation</em> is not sacrificed, unlike symmetric key based approaches. This further enables drastic <em>misbehavior detection</em>, also exploiting the newly introduced facilitators, based on probabilistic signature verification and cross-checking over multiple facilitators verifying the same message; while maintaining verification latency low even when under attack, trading off modest communication overhead. Our facilitators can also be used for efficient discovery and verification of <em>DENM</em> or any <em>event-driven message</em>, including <em>misbehavior evidence</em> used for our scheme. Even when vehicles are saturated by adversaries mounting a clogging DoS attack, transmitting high-rate bogus CAMs/DENMs, our scheme achieves an average <span><math><mrow><mn>50</mn><mspace></mspace><mi>m</mi><mi>s</mi></mrow></math></span> verification delay with message expiration ratio less than 1% - a huge improvement over the current standard that verifies every message signature in a First-Come First-Served (FCFS) manner and suffers from having 50% to nearly 100% of the received benign messages expiring.</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"156 \",\"pages\":\"Article 104469\"},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2025-04-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825001580\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825001580","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

标准化的车辆通信(VC),主要是协同感知信息(CAMs)和分散环境通知信息(denm),对车辆安全至关重要,分别携带车辆状态信息和交通/道路相关事件报告。为了安全和隐私保护,广播cam和denm采用匿名身份验证,每个节点都需要在到期期限内验证所有传入消息。这造成了一种不对称,可以很容易地被外部对手利用来发起阻塞的拒绝服务(DoS)攻击:每个伪造的VC消息都迫使所有相邻节点对其进行加密验证;容易生成的伪造消息以越来越快的速度逐渐耗尽处理资源,严重降低或拒绝对良性cam / denm的及时验证。当对相邻车辆位置或关键报告的意识缺失时,结果可能是灾难性的。我们解决了这个问题,使标准化的VC假名认证具有dos弹性。我们提出了高效的加密结构,我们称之为消息验证促进者,以优先考虑处理资源,以验证虚假消息中的潜在有效消息,并基于一个签名验证验证多个消息。与基于对称密钥的方法不同,任何消息接受都严格基于基于公开密钥的消息身份验证/验证,即不牺牲不可否认性。这进一步实现了严重的不当行为检测,也利用了新引入的辅助器,基于概率签名验证和对验证同一消息的多个辅助器的交叉检查;即使在受到攻击的情况下,也要保持较低的验证延迟,以适度的通信开销为代价。我们的促进器还可以用于有效地发现和验证DENM或任何事件驱动的消息,包括用于我们方案的不当行为证据。即使车辆被攻击者阻塞DoS攻击饱和,传输高速率的伪造cam / denm,我们的方案也实现了平均50ms的验证延迟,消息过期率低于1%,这比当前以先到先得(FCFS)方式验证每个消息签名的标准有了巨大的改进,并且收到的良性消息的50%到近100%都过期了。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Accountable, Scalable and DoS-resilient Secure Vehicular Communication
Standardized Vehicular Communication (VC), mainly Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs), is paramount to vehicle safety, carrying vehicle status information and reports of traffic/road-related events respectively. Broadcasted CAMs and DENMs are pseudonymously authenticated for security and privacy protection, with each node needing to have all incoming messages validated within an expiration deadline. This creates an asymmetry that can be easily exploited by external adversaries to launch a clogging Denial of Service (DoS) attack: each forged VC message forces all neighboring nodes to cryptographically validate it; at increasing rates, easy to generate forged messages gradually exhaust processing resources and severely degrade or deny timely validation of benign CAMs/DENMs. The result can be catastrophic when awareness of neighbor vehicle positions or critical reports are missed. We address this problem making the standardized VC pseudonymous authentication DoS-resilient. We propose efficient cryptographic constructs, which we term message verification facilitators, to prioritize processing resources for verification of potentially valid messages among bogus messages and verify multiple messages based on one signature verification. Any message acceptance is strictly based on public-key based message authentication/verification for accountability, i.e., non-repudiation is not sacrificed, unlike symmetric key based approaches. This further enables drastic misbehavior detection, also exploiting the newly introduced facilitators, based on probabilistic signature verification and cross-checking over multiple facilitators verifying the same message; while maintaining verification latency low even when under attack, trading off modest communication overhead. Our facilitators can also be used for efficient discovery and verification of DENM or any event-driven message, including misbehavior evidence used for our scheme. Even when vehicles are saturated by adversaries mounting a clogging DoS attack, transmitting high-rate bogus CAMs/DENMs, our scheme achieves an average 50ms verification delay with message expiration ratio less than 1% - a huge improvement over the current standard that verifies every message signature in a First-Come First-Served (FCFS) manner and suffers from having 50% to nearly 100% of the received benign messages expiring.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信