Effective authentication to prevent Sybil attacks in vehicular platoons
The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicle...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166640 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-166640 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1666402023-05-12T15:39:44Z Effective authentication to prevent Sybil attacks in vehicular platoons Junaidi, Danial Ritzuan Ma, Maode Su, Rong School of Electrical and Electronic Engineering 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV) Engineering::Electrical and electronic engineering::Wireless communication systems Authentication Elliptic Curve Cryptography Sybil Attack Digital Signature Key Exchange Platoons The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicles into the platoons, allowing them to wreak havoc on the platoon, which is known as a Sybil attack. In this paper, we propose a secure vehicular authentication scheme for platoon admission which is resistant to the threats of Sybil attacks. The proposed scheme offers a mutual authentication on both vehicle identity and message through a combination of a key exchange, a digital signature and an encryption scheme based on Elliptic Curve Cryptography (ECC). The scheme holds its outstanding feature to provide both perfect forward secrecy and group backward secrecy to ensure the protection of anonymity of vehicles and platoons while typical malicious attacks such as replay, and man-in-the-middle attacks can also be resisted. A formal evaluation of the security of the scheme by Canetti-Krawczyk (CK) adversary and random oracle model has been conducted to demonstrate its security functionality. Finally, the performance of the proposed scheme has been evaluated to show its efficiency. Agency for Science, Technology and Research (A*STAR) Submitted/Accepted version This research is supported by A*STAR under its RIE2020 Advanced Manufacturing and Engineering (AME) Industry Alignment Fund – Pre Positioning (IAF-PP) (Award A19D6a0053). 2023-05-08T01:22:56Z 2023-05-08T01:22:56Z 2022 Conference Paper Junaidi, D. R., Ma, M. & Su, R. (2022). Effective authentication to prevent Sybil attacks in vehicular platoons. 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV), 949-954. https://dx.doi.org/10.1109/ICARCV57592.2022.10004350 9781665476874 https://hdl.handle.net/10356/166640 10.1109/ICARCV57592.2022.10004350 2-s2.0-85146795125 949 954 en A19D6a0053 © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ICARCV57592.2022.10004350. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Wireless communication systems Authentication Elliptic Curve Cryptography Sybil Attack Digital Signature Key Exchange Platoons |
spellingShingle |
Engineering::Electrical and electronic engineering::Wireless communication systems Authentication Elliptic Curve Cryptography Sybil Attack Digital Signature Key Exchange Platoons Junaidi, Danial Ritzuan Ma, Maode Su, Rong Effective authentication to prevent Sybil attacks in vehicular platoons |
description |
The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicles into the platoons, allowing them to wreak havoc on the platoon, which is known as a Sybil attack. In this paper, we propose a secure vehicular authentication scheme for platoon admission which is resistant to the threats of Sybil attacks. The proposed scheme offers a mutual authentication on both vehicle identity and message through a combination of a key exchange, a digital signature and an encryption scheme based on Elliptic Curve Cryptography (ECC). The scheme holds its outstanding feature to provide both perfect forward secrecy and group backward secrecy to ensure the protection of anonymity of vehicles and platoons while typical malicious attacks such as replay, and man-in-the-middle attacks can also be resisted. A formal evaluation of the security of the scheme by Canetti-Krawczyk (CK) adversary and random oracle model has been conducted to demonstrate its security functionality. Finally, the performance of the proposed scheme has been evaluated to show its efficiency. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Junaidi, Danial Ritzuan Ma, Maode Su, Rong |
format |
Conference or Workshop Item |
author |
Junaidi, Danial Ritzuan Ma, Maode Su, Rong |
author_sort |
Junaidi, Danial Ritzuan |
title |
Effective authentication to prevent Sybil attacks in vehicular platoons |
title_short |
Effective authentication to prevent Sybil attacks in vehicular platoons |
title_full |
Effective authentication to prevent Sybil attacks in vehicular platoons |
title_fullStr |
Effective authentication to prevent Sybil attacks in vehicular platoons |
title_full_unstemmed |
Effective authentication to prevent Sybil attacks in vehicular platoons |
title_sort |
effective authentication to prevent sybil attacks in vehicular platoons |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/166640 |
_version_ |
1770565516199460864 |