Detecting Sybil Attacks Using Proofs of Work and Location in VANETs

In this paper, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs is used to create vehicle trajectory which is used as vehicle anonymous identity. Also, one RSU is not able to issue trajectories for vehicles, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. So, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. Then, during any reported event, e.g., road congestion, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle; therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.

[1]  Hari Balakrishnan,et al.  Cabernet: vehicular content delivery using WiFi , 2008, MobiCom '08.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  JooSeok Song,et al.  A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks , 2014, ICIS.

[4]  Zachary MacHardy,et al.  V2X Access Technologies: Regulation, Research, and Remaining Challenges , 2018, IEEE Communications Surveys & Tutorials.

[5]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[6]  Ales Berkopec,et al.  HyperQuick algorithm for discrete hypergeometric distribution , 2007, J. Discrete Algorithms.

[7]  Shinya Takahashi,et al.  A Simple and Faster Branch-and-Bound Algorithm for Finding a Maximum Clique , 2010, WALCOM.

[8]  Sagar Naik,et al.  Vehicular Networks for a Greener Environment: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[9]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[10]  Kishor S. Trivedi,et al.  Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Services , 2012, IEEE Transactions on Vehicular Technology.

[11]  Bertrand Ducourthial,et al.  Sybil Nodes Detection Based on Received Signal Strength Variations within VANET , 2009, Int. J. Netw. Secur..

[12]  Alexandra Boldyreva,et al.  Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .

[13]  Daniel Zelterman,et al.  Models for Discrete Data , 1999 .

[14]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[15]  Xue Liu,et al.  Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI , 2019, IEEE Transactions on Mobile Computing.

[16]  S. Syed,et al.  Fuzzy Logic Based-Map Matching Algorithm for Vehicle Navigation System in Urban Canyons , 2004 .

[17]  Daniel Krajzewicz,et al.  Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .

[18]  Elisa Lee,et al.  Statistical Methods for Survival Data Analysis: Lee/Survival Data Analysis , 2003 .

[19]  Hengchang Liu,et al.  SmartRoad , 2015, ACM Trans. Sens. Networks.

[20]  Xin Wang,et al.  A Robust Detection of the Sybil Attack in Urban VANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[21]  Mohamed F. Younis,et al.  Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs , 2015, 2015 IEEE International Conference on Communications (ICC).

[22]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[23]  A. Govardhan,et al.  Sybil attack detection technique using session key certificate in vehicular ad hoc networks , 2017, 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET).

[24]  Hock Beng Lim,et al.  UrbanMobilitySense: A User-Centric Participatory Sensing System for Transportation Activity Surveys , 2014, IEEE Sensors Journal.

[25]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[26]  Jizhong Zhao,et al.  Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[27]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[28]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[29]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[30]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, Inf. Comput..

[31]  Gene Tsudik,et al.  Privacy-Preserving Location-Based On-Demand Routing in MANETs , 2011, IEEE Journal on Selected Areas in Communications.