Secure vehicular platoon management against Sybil attacks

The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which...

Full description

Saved in:
Bibliographic Details
Main Authors: Junaidi, Danial Ritzuan, Ma, Maode, Su, Rong
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2023
Subjects:
Online Access:https://hdl.handle.net/10356/166632
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-166632
record_format dspace
spelling sg-ntu-dr.10356-1666322023-05-05T15:47:06Z Secure vehicular platoon management against Sybil attacks Junaidi, Danial Ritzuan Ma, Maode Su, Rong School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering::Wireless communication systems Engineering::Electrical and electronic engineering::Antennas, wave guides, microwaves, radar, radio Authentication Digital Signature Elliptic Curve Cryptography Key Exchange Platoons Sybil Attack The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency. Agency for Science, Technology and Research (A*STAR) Published version This research is funded by A*STAR under its RIE2020 Advanced Manufacturing and Engineering (AME) Industry Alignment Fund–Pre Positioning (IAF-PP) (Award A19D6a0053). The APC is funded by the Guest Editor, Peter Chong. 2023-05-05T05:30:30Z 2023-05-05T05:30:30Z 2022 Journal Article Junaidi, D. R., Ma, M. & Su, R. (2022). Secure vehicular platoon management against Sybil attacks. Sensors, 22(22), 9000-. https://dx.doi.org/10.3390/s22229000 1424-8220 https://hdl.handle.net/10356/166632 10.3390/s22229000 22 2-s2.0-85142704760 22 22 9000 en A19D6a0053 Sensors © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Wireless communication systems
Engineering::Electrical and electronic engineering::Antennas, wave guides, microwaves, radar, radio
Authentication
Digital Signature
Elliptic Curve Cryptography
Key Exchange
Platoons
Sybil Attack
spellingShingle Engineering::Electrical and electronic engineering::Wireless communication systems
Engineering::Electrical and electronic engineering::Antennas, wave guides, microwaves, radar, radio
Authentication
Digital Signature
Elliptic Curve Cryptography
Key Exchange
Platoons
Sybil Attack
Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
Secure vehicular platoon management against Sybil attacks
description The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
format Article
author Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
author_sort Junaidi, Danial Ritzuan
title Secure vehicular platoon management against Sybil attacks
title_short Secure vehicular platoon management against Sybil attacks
title_full Secure vehicular platoon management against Sybil attacks
title_fullStr Secure vehicular platoon management against Sybil attacks
title_full_unstemmed Secure vehicular platoon management against Sybil attacks
title_sort secure vehicular platoon management against sybil attacks
publishDate 2023
url https://hdl.handle.net/10356/166632
_version_ 1770564493377536000