Sybil-Vanet-Milcom09 - Paper ID# 900042.PDF DEFENSE AGAINST...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Paper ID# 900042.PDF 1 of 7 DEFENSE AGAINST SYBIL ATTACK IN VEHICULAR AD HOC NETWORK BASED ON ROADSIDE UNIT SUPPORT Soyoung Park, Baber Aslam, Damla Turgut, Cliff C. Zou School of Electrical Engineering and Computer Science University of Central Florida 4000 Central Florida Blvd. Orlando, FL 32816-2362 ABSTRACT In this paper, we propose a timestamp series approach to defend against Sybil attack in a vehicular ad hoc network (VANET) based on roadside unit support. The proposed approach targets the initial deployment stage of VANET when basic roadside unit (RSU) support infrastructure is available and a small fraction of vehicles have network communication capability. Unlike previously proposed schemes that require a dedicated vehicular public key infrastructure to certify individual vehicles, in our approach RSUs are the only components issuing the certificates. Due to the differences of moving dynamics among vehicles, it is rare to have two vehicles passing by multiple RSUs at exactly the same time. By exploiting this spatial and temporal correlation between vehicles and RSUs, two messages will be treated as Sybil attack issued by one vehicle if they have the similar timestamp series issued by RSUs. The timestamp series approach needs neither vehicular-based public-key infrastructure nor Internet accessible RSUs, which makes it an economical solution suitable for the initial stage of VANET. 1. INTRODUCTION With the significant development of network technologies and facilities, vehicular ad hoc network (VANET) has been recently taken a growing interest as a promising technology in a ubiquitous environment. The VANET makes it possible that vehicles sense their local traffic situation and then share the traffic information quickly with each other. This means vehicles can obtain certain traffic information occurred on their driving route earlier to react against accidental events in advance. Due to the safety requirements of VANET related applications, we have to deal with the security issues associated at the initial development stage of VANET. Among various security issues, in this paper, we focus on Sybil attack because it is the root cause of many security problems. Sybil attack was first introduced by Douceur in the context of peer-to-peer networks [4]. It allows a malicious sender to create multiple fake identities (called Sybil nodes) to impersonate as normal nodes. Most VANET based applications, such as cooperative forward collision warning, pre-crash sensing and warning, local hazard notification, enhanced route guidance and navigation, need the cooperation of vehicles: the similar view sensed by multiple distinct vehicles for a certain traffic situation can provide trustable correctness and a reliable proof about the traffic situation to other vehicles [2][5][6][9][10][12][13]. For this reason, Sybil attack is particularly harmful because it violates the fundamental assumptions of the VANET research. Figure 1. Illustration of the timestamp series approach
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 7

Sybil-Vanet-Milcom09 - Paper ID# 900042.PDF DEFENSE AGAINST...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online