Effective authentication to prevent Sybil attacks in vehicular platoons

The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicle...

Full description

Saved in:
Bibliographic Details
Main Authors: Junaidi, Danial Ritzuan, Ma, Maode, Su, Rong
Other Authors: School of Electrical and Electronic Engineering
Format: Conference or Workshop Item
Language:English
Published: 2023
Subjects:
Online Access:https://hdl.handle.net/10356/166640
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-166640
record_format dspace
spelling sg-ntu-dr.10356-1666402023-05-12T15:39:44Z Effective authentication to prevent Sybil attacks in vehicular platoons Junaidi, Danial Ritzuan Ma, Maode Su, Rong School of Electrical and Electronic Engineering 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV) Engineering::Electrical and electronic engineering::Wireless communication systems Authentication Elliptic Curve Cryptography Sybil Attack Digital Signature Key Exchange Platoons The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicles into the platoons, allowing them to wreak havoc on the platoon, which is known as a Sybil attack. In this paper, we propose a secure vehicular authentication scheme for platoon admission which is resistant to the threats of Sybil attacks. The proposed scheme offers a mutual authentication on both vehicle identity and message through a combination of a key exchange, a digital signature and an encryption scheme based on Elliptic Curve Cryptography (ECC). The scheme holds its outstanding feature to provide both perfect forward secrecy and group backward secrecy to ensure the protection of anonymity of vehicles and platoons while typical malicious attacks such as replay, and man-in-the-middle attacks can also be resisted. A formal evaluation of the security of the scheme by Canetti-Krawczyk (CK) adversary and random oracle model has been conducted to demonstrate its security functionality. Finally, the performance of the proposed scheme has been evaluated to show its efficiency. Agency for Science, Technology and Research (A*STAR) Submitted/Accepted version This research is supported by A*STAR under its RIE2020 Advanced Manufacturing and Engineering (AME) Industry Alignment Fund – Pre Positioning (IAF-PP) (Award A19D6a0053). 2023-05-08T01:22:56Z 2023-05-08T01:22:56Z 2022 Conference Paper Junaidi, D. R., Ma, M. & Su, R. (2022). Effective authentication to prevent Sybil attacks in vehicular platoons. 2022 17th International Conference on Control, Automation, Robotics and Vision (ICARCV), 949-954. https://dx.doi.org/10.1109/ICARCV57592.2022.10004350 9781665476874 https://hdl.handle.net/10356/166640 10.1109/ICARCV57592.2022.10004350 2-s2.0-85146795125 949 954 en A19D6a0053 © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ICARCV57592.2022.10004350. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Wireless communication systems
Authentication
Elliptic Curve Cryptography
Sybil Attack
Digital Signature
Key Exchange
Platoons
spellingShingle Engineering::Electrical and electronic engineering::Wireless communication systems
Authentication
Elliptic Curve Cryptography
Sybil Attack
Digital Signature
Key Exchange
Platoons
Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
Effective authentication to prevent Sybil attacks in vehicular platoons
description The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. One particular concern is the admission of fake virtual vehicles into the platoons, allowing them to wreak havoc on the platoon, which is known as a Sybil attack. In this paper, we propose a secure vehicular authentication scheme for platoon admission which is resistant to the threats of Sybil attacks. The proposed scheme offers a mutual authentication on both vehicle identity and message through a combination of a key exchange, a digital signature and an encryption scheme based on Elliptic Curve Cryptography (ECC). The scheme holds its outstanding feature to provide both perfect forward secrecy and group backward secrecy to ensure the protection of anonymity of vehicles and platoons while typical malicious attacks such as replay, and man-in-the-middle attacks can also be resisted. A formal evaluation of the security of the scheme by Canetti-Krawczyk (CK) adversary and random oracle model has been conducted to demonstrate its security functionality. Finally, the performance of the proposed scheme has been evaluated to show its efficiency.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
format Conference or Workshop Item
author Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
author_sort Junaidi, Danial Ritzuan
title Effective authentication to prevent Sybil attacks in vehicular platoons
title_short Effective authentication to prevent Sybil attacks in vehicular platoons
title_full Effective authentication to prevent Sybil attacks in vehicular platoons
title_fullStr Effective authentication to prevent Sybil attacks in vehicular platoons
title_full_unstemmed Effective authentication to prevent Sybil attacks in vehicular platoons
title_sort effective authentication to prevent sybil attacks in vehicular platoons
publishDate 2023
url https://hdl.handle.net/10356/166640
_version_ 1770565516199460864