Secure vehicular platoon management against Sybil attacks
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166632 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-166632 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1666322023-05-05T15:47:06Z Secure vehicular platoon management against Sybil attacks Junaidi, Danial Ritzuan Ma, Maode Su, Rong School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering::Wireless communication systems Engineering::Electrical and electronic engineering::Antennas, wave guides, microwaves, radar, radio Authentication Digital Signature Elliptic Curve Cryptography Key Exchange Platoons Sybil Attack The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency. Agency for Science, Technology and Research (A*STAR) Published version This research is funded by A*STAR under its RIE2020 Advanced Manufacturing and Engineering (AME) Industry Alignment Fund–Pre Positioning (IAF-PP) (Award A19D6a0053). The APC is funded by the Guest Editor, Peter Chong. 2023-05-05T05:30:30Z 2023-05-05T05:30:30Z 2022 Journal Article Junaidi, D. R., Ma, M. & Su, R. (2022). Secure vehicular platoon management against Sybil attacks. Sensors, 22(22), 9000-. https://dx.doi.org/10.3390/s22229000 1424-8220 https://hdl.handle.net/10356/166632 10.3390/s22229000 22 2-s2.0-85142704760 22 22 9000 en A19D6a0053 Sensors © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Wireless communication systems Engineering::Electrical and electronic engineering::Antennas, wave guides, microwaves, radar, radio Authentication Digital Signature Elliptic Curve Cryptography Key Exchange Platoons Sybil Attack |
spellingShingle |
Engineering::Electrical and electronic engineering::Wireless communication systems Engineering::Electrical and electronic engineering::Antennas, wave guides, microwaves, radar, radio Authentication Digital Signature Elliptic Curve Cryptography Key Exchange Platoons Sybil Attack Junaidi, Danial Ritzuan Ma, Maode Su, Rong Secure vehicular platoon management against Sybil attacks |
description |
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Junaidi, Danial Ritzuan Ma, Maode Su, Rong |
format |
Article |
author |
Junaidi, Danial Ritzuan Ma, Maode Su, Rong |
author_sort |
Junaidi, Danial Ritzuan |
title |
Secure vehicular platoon management against Sybil attacks |
title_short |
Secure vehicular platoon management against Sybil attacks |
title_full |
Secure vehicular platoon management against Sybil attacks |
title_fullStr |
Secure vehicular platoon management against Sybil attacks |
title_full_unstemmed |
Secure vehicular platoon management against Sybil attacks |
title_sort |
secure vehicular platoon management against sybil attacks |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/166632 |
_version_ |
1770564493377536000 |