A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms (Paperback)


Vehicular ad hoc networks VANETs are being increasingly advocated for traffic control, accident avoidance, and management of parking lot and public areas. In particular, communication devices are being installed in more and more cars and roadside infrastructure components. At the same time, they will have direct access to a fixed roadside network infrastructure with information flowing both ways Security and privacy are two major concerns in VANETs. Unfortunately, in VANETs, most Privacy-preserving schemes are vulnerable to Sybil attacks, whereby a malicious user can pretend to be multiple other vehicles. The detection of Sybil attacks in this manner does not require any vehicle in the network to disclose its identity; hence privacy is preserved at all times. I present a light weight and scalable protocol to detect Sybil attacks. In this protocol, a malicious user pretending to be multiple other vehicles can be detected in a distributed manner through passive overhearing by s set of fixed nodes called road-side boxes RSBs.In this paper, we are concerned with this problem and in particular, how to achieve security pseudonym - based authentication. Simulation results are presented.

R1,292

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles12920
Mobicred@R121pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

Vehicular ad hoc networks VANETs are being increasingly advocated for traffic control, accident avoidance, and management of parking lot and public areas. In particular, communication devices are being installed in more and more cars and roadside infrastructure components. At the same time, they will have direct access to a fixed roadside network infrastructure with information flowing both ways Security and privacy are two major concerns in VANETs. Unfortunately, in VANETs, most Privacy-preserving schemes are vulnerable to Sybil attacks, whereby a malicious user can pretend to be multiple other vehicles. The detection of Sybil attacks in this manner does not require any vehicle in the network to disclose its identity; hence privacy is preserved at all times. I present a light weight and scalable protocol to detect Sybil attacks. In this protocol, a malicious user pretending to be multiple other vehicles can be detected in a distributed manner through passive overhearing by s set of fixed nodes called road-side boxes RSBs.In this paper, we are concerned with this problem and in particular, how to achieve security pseudonym - based authentication. Simulation results are presented.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Lap Lambert Academic Publishing

Country of origin

Germany

Release date

May 2012

Availability

Expected to ship within 10 - 15 working days

First published

May 2012

Authors

Dimensions

229 x 152 x 6mm (L x W x T)

Format

Paperback - Trade

Pages

100

ISBN-13

978-3-8484-8467-6

Barcode

9783848484676

Categories

LSN

3-8484-8467-6



Trending On Loot