计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 235-240.

• 信息安全 • 上一篇    下一篇

车载自组网Sybil攻击检测方案研究综述

李春彦,王良民   

  1. 江苏大学计算机科学与通信工程学院 镇江212013;江苏大学计算机科学与通信工程学院 镇江212013
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61272074),江苏省自然科学基金(BK2011464),镇江市工业科技支撑项目(GY2013030)资助

Research on Detection Schemes of Sybil Attack in VANETs

LI Chun-yan and WANG Liang-min   

  • Online:2018-11-14 Published:2018-11-14

摘要: 在车载自组网中,Sybil攻击是指恶意车辆通过伪造、偷窃或合谋等非法方式获取虚假身份并利用多个身份进行非正常行为而威胁到其他驾乘者生命财产安全的一种攻击。介绍了车载自组网中Sybil攻击的起因与危害,对Sybil攻击的检测方案进行了论述。根据检测过程是否与位置相关,将Sybil攻击检测方案分为与位置无关的检测方案和与位置有关的检测方案两类,对其中的检测方案进行了分类和比较。最后指出了现有方案中存在的问题和未来可能的研究方向。

关键词: 车载自组网,Sybil攻击检测方案,Sybil攻击,与位置无关的检测方案,与位置有关的检测方案

Abstract: In vehicular ad hoc networks (VANETs)Sybil attack is an attack in which a malicious vehicle obtains multiple false identities through the way of forgery,stolen or conspiracy.The attacker uses these false identities to do misbehaviors which can threaten the lives and properties of other drivers and passengers.The cause and hazards of Sybil attack in vehicular ad hoc networks were introduced firstly.Then a survey of existing Sybil attack detection schemes was made.According as whether the detection process is related to positionthe detection schemes are classified into two categories:Non-position-based detection schemes and Position-based detection schemes.Comparison of detection schemes in each category was introduced elaborately as well.Finally,the problems in existing detection methods and some possible directions for future research were proposed.

Key words: Vehicular ad hoc networks,Sybil attack detection schemes,Sybil attack,Non-position-based detection schemes,Position-based detection schemes

[1] Blum J,Eskandarian A,Hoffman L.Challenges of inter-vehicle ad hoc networks [J].IEEE Transactions on Intelligent Transportation Systems,2004,5(4):347-351
[2] 常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-127
[3] 乔震,刘光杰,李季,等.移动自组织网络安全接入技术研究综述 [J].计算机科学,2013,40(20):1-9
[4] 王良民,李晓君,仲红.VANET中一种可撤销的车辆群组批认证方法 [J].中国科学:信息科学,2013,43(10):1307-1325
[5] Douceur J R.The Sybil attack [C]∥Proceeding of International Workshop on Peer-to-peer Systems.Cambridge.USA,IEEE,2002:251-260
[6] Razzaque M A,Salehi A,Cheraghi S M.Security and privacy in vehicular Ad-Hoc networks:survey and the road ahead [M]∥Wireless Networks and Security.Springer Berlin Heidelberg,2013:107-132
[7] Hartenstein H,Laberteaux K P.A tutorial survey on vehicular ad hoc networks [J].Communications Magazine,IEEE,2008,46(6):164-171
[8] Lacroix J,El-Khatib K.Vehicular Ad Hoc Network Security and Privacy:A Second Look [C]∥The Third International Conference on Advances in Vehicular SystemsTechnologies and Applications(VEHICULAR 2014).2014:6-15
[9] Al Sultan S,Al Doori M M,Bayatti A H,et al.A comprehensive survey on vehicular Ad Hoc network [J].Journal of Network and Computer Applications,2014,37:380-392
[10] 王良民,茅冬梅,梁军.基于RFID系统的隐私保护技术[J].江苏大学学报:自然科学版,2012,33(6):690-695
[11] Bissmeyer N,Stresing C,Bayarou K M.Intrusion detection inVANETs through verification of vehicle movement data [C]∥Vehicular Networking Conference (VNC) 2010.New Jersey,USA,IEEE,2010:166-173
[12] Ding Qing,Li Xi,Jiang Ming,et al.Reputation-based trust modelin vehicular ad hoc networks [C]∥International Conference on Wireless Communications and Signal Processing (WCSP).Suzhou,China,2010:1-6
[13] Chen Yi-ming,Wei Yu-chih.A beacon-based trust management system for enhancing user centric location privacy in VANETs [J].Journal of Communications and Networks,2013,15(2):153-163
[14] Korkmaz G,Ekici E,Ozguner F,et al.Urban multi-hop broadcast protocol for inter-vehicle communication systems [C]∥Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks.Philadelphia,PA,USA,ACM,2004:76-85
[15] Zhao Jing,Cao Guo-hong.VADD:Vehicle-assisted data delivery in vehicular ad hoc networks [J].IEEE Transactions on Vehicular Technology,2008,57(3):1910-1922
[16] Karp B,Kung H T.GPSR:Greedy perimeter stateless routing for wireless networks [C]∥Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston,MA,USA,ACM,2000:243-254
[17] Newsome J,Shi E,Song D,et al.The Sybil attack in sensor networks:analysis & defenses [C]∥Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks.Berkeley,California,USA:ACM,2004:259-268
[18] Yu H,Kaminsky M,Gibbons P B,et al.SybilGuard:Defendingagainst Sybil attacks via social networks [J].IEEE/ACM Transactions on Networking,2008,16(3):576-589
[19] Danezis G,Mittal P.SybilInfer:Detecting Sybil Nodes using Social Networks [C]∥Proceedings of the Network and Distributed System Security Symposium.San Diego,California,USA,2009:1-15
[20] Margolin N B,Levine B N.Quantifying resistance to the Sybil attack [M]∥Financial Cryptography and Data Security.Springer Berlin Heidelberg,2008:1-15
[21] Raya M,Hubaux J P.Securing vehicular ad hoc networks [J].Journal of Computer Security,2007,15(1):39-68
[22] 李春彦,刘怡良,王良民.车载自组网中基于交通场景的入侵行为检测机制 [J].山东大学学报:工学版,2013,43(6):14-19
[23] Rahbari M,Jamali J.Efficient detection of Sybil attack based on cryptography in VANET [J].International Journal of Network Security & its Applications (IJNSA).2011,3(6):185-195
[24] Guette G,Bryce C.Using TPMs to secure vehicular ad-hoc networks (VANETs) [M]∥Information Security Theory and Practices.Smart Devices,Convergence and Next Generation Networks.Springer Berlin Heidelberg.2008:106-116
[25] Park S,Aslam B,Turgut D,et al.Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support [J].Security and Communication Networks,2013,6(4):523-538
[26] Studer A,Shi E,Bai F,et al.TACKing together efficient authentication,revocation,and privacy in VANETs [C]∥6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks(SECON09).Rome,Italy,IEEE,2009:1-9
[27] Sun Yi-pin,Lu Rong-xing,Lin Xiao-dong,et al.An efficientpseudonymous authentication scheme with strong privacy pre-servation for vehicular communications [J].IEEE Transactions on Vehicular Technology,2010,59(7):3589-3603 (下转第262页)(上接第240页)
[28] Ruj S,Cavenaghi M A,Huang Z,et al.On data-centric misbehavior detection in VANETs [C]∥Vehicular Technology Conference (VTC Fall).San Francisco,CA,USA,IEEE,2011:1-5
[29] Lu Rong-xing,Li Xiao-dong,Luan T H,et al.Pseudonym changing at social spots:an effective strategy for location privacy in VANETs [J].IEEE Transactions on Vehicular Technology,2012,61(1):86-96
[30] Pan Yuan-yuan,Li Jian-qing,Feng Li,et al.An analytical model for random pseudonym change scheme in VANETs [J].Cluster Computing,2013:1-9
[31] Zhou Tong,Choudhury R R,Ning Peng,et al.P2DAP—Sybil Attacks Detection in Vehicular Ad Hoc Networks [J].IEEE Journal on Selected Areas in Communications,2011,29(3):582-594
[32] Golle P,Greene D,Staddon J.Detecting and correcting malicious data in VANETs [C]∥Proceedings of the 1st ACM internationalworkshop on Vehicular ad hoc networks.Philadelphia,PA,USA,ACM,2004:29-37
[33] Grover J,Prajapati N K,Laxmi V,et al.Machine learning approach for multiple misbehavior detection in VANET [M]∥Advances in Computing and Communications.Springer Berlin Heidelberg,2011:644-653
[34] Grover J,Gaur M S,Laxmi V,et al.A Sybil attack detection approach using neighboring vehicles in VANET [C]∥Proceedings of the 4th International Conference on Security of Information and Networks.Sydney,Australia,ACM,2011:151-158
[35] Chen Chen,Wang X,Han Wei-li,et al.A robust detection of the Sybil attack in urban VANETs [C]∥The 29th IEEE International Conference on Distributed Computing Systems Workshops(ICDCS 2009).Montreal,Quebec,Canada,IEEE,2009:270-276
[36] Chang Shan,Qi Yong,Zhu Hong-zi,et al.Footprint:detecting Sybil attacks in urban vehicular networks [J].IEEE Transactions on Parallel and Distributed Systems,2012,23(6):1103-1114
[37] Guette G,Ducourthial B.On the Sybil attack detection in VANET [C]∥IEEE International Conference on Mobile Ad hoc and Sensor Systems(MASS 2007).Pisa,Italy,IEEE,2007:1-6
[38] Yu Bo,Xu Cheng-zhong,Xiao Bin.Detecting Sybil attacks inVANETs [J].Journal of Parallel and Distributed Computing,2013:746-756
[39] Grover J,Kumar D,Sargurunathan M,et al.Performance evaluation and detection of Sybil attacks in vehicular ad-hoc networks [M]∥Recent Trends in Network Security and Applications.Springer Berlin Heidelberg,2010:473-482
[40] Capun S,Hubaux J P.Secure positioning of wireless deviceswith application to sensor networks [C]∥Proceeding of 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2005).Miami,USA,IEEE,2005:1917-1928
[41] Bouassida M S,Guette G,Shawky M,et al.Sybil nodes detection based on received signal strength variations within VANET [J].IJ Network Security,2009,9(1):22-33
[42] Leinmuller T,Schoch E,Kargl F.Position verification approa-ches for vehicular ad hoc networks [J].IEEE Wireless Communications,2006,13(5):16-21
[43] Hao Yong,Tang Jin,Cheng Yu.Cooperative Sybil attack detection for position based applications in privacy preserved VANETs[C]∥Global Telecommunications Conference (GLOBECOM 2011).Houston,Texas,USA,IEEE,2011:1-5

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!