Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 4682538, 11 pages
https://doi.org/10.1155/2017/4682538
Research Article

Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

Xia Feng1,2 and Jin Tang2

1Department of Computer Science & Technology, Anhui University, Hefei, Anhui 230601, China
2School of Computing, The University of Utah, Salt Lake City, UT 84102, USA

Correspondence should be addressed to Xia Feng; moc.liamxof@uha.xgnef

Received 11 August 2016; Revised 11 December 2016; Accepted 22 December 2016; Published 7 February 2017

Academic Editor: Stefania Sardellitti

Copyright © 2017 Xia Feng and Jin Tang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Wang, T. Li, and L. Chen, “Security issues and system structure of internet of vehicles,” Journal of Network and Information Security, vol. 1, no. 22, pp. 41–54, 2016. View at Google Scholar
  2. Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 7, pp. 3589–3603, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. C. Piro, C. Shields, and B. N. Levine, “Detecting the sybil attack in mobile Ad hoc networks,” in Proceedings of the IEEE/ACM International Conference on Security and Privacy in Communication Networks (SecureComm '06), pp. 1–11, Baltimore, Md, USA, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Zhang, D. Gao, and C. Foh, “A survey of abnormal traffic information detection and transmission mechanisms in VSNs,” International Journal of Distributed Sensor Networks, vol. 10, no. 5, pp. 1–13, 2014. View at Google Scholar
  5. S. Abbas, M. Merabti, D. Llewellyn-Jones, and K. Kifayat, “Lightweight sybil attack detection in MANETs,” IEEE Systems Journal, vol. 7, no. 2, pp. 236–248, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Yu, C.-Z. Xu, and B. Xiao, “Detecting Sybil attacks in VANETs,” Journal of Parallel and Distributed Computing, vol. 73, no. 6, pp. 746–756, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Sarigiannidis, E. Karapistoli, and A. A. Economides, “Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information,” Expert Systems with Applications, vol. 42, no. 21, pp. 7560–7572, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. N. Borisov, “Computational puzzles as sybil defenses,” in Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P '06), pp. 171–176, Cambridge, UK. View at Publisher · View at Google Scholar
  9. T. Zhou, R. R. Choudhury, P. Ning, and K. Chakrabarty, “P2DAP—Sybil attacks detection in vehicular ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, pp. 582–594, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: detecting Sybil attacks in urban vehicular networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 1103–1114, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Lee, E. Jeong, and I. Jung, “A DTSA (detection technique against a sybil attack) protocol using SKC (session key based certificate) on VANET,” International Journal of Security and its Applications, vol. 7, no. 3, pp. 157–165, 2013. View at Google Scholar · View at Scopus
  12. R. Hussain, H. Oh, and S. Kim, “AntiSybil: standing against Sybil attacks in privacy-preserved VANET,” in Proceedings of the 1st International Conference on Connected Vehicles and Expo (ICCVE '12), pp. 108–113, IEEE, Beijing, China, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Lin, “LSR: mitigating zero-day sybil vulnerability in privacy-preserving vehicular peer-to-peer networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 237–246, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Feng, C.-Y. Li, D.-X. Chen, and J. Tang, “A method for defensing against multi-source Sybil attacks in VANET,” Peer-to-Peer Networking and Applications, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. K. Hoffman, D. Zage, and C. Nita-Rotaru, “A survey of attack and defense techniques for reputation systems,” ACM Computing Surveys, vol. 42, no. 1, article no. 1, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. U. Khan and S. Agrawal, “Detection of Malicious Nodes (DMN) in vehicular ad-hoc networks,” Procedia Computer Science, vol. 46, no. 9, pp. 965–972, 2015. View at Google Scholar
  17. X. Feng, C. Li, D. Chen, and J. Tang, “EBRS: event based reputation system for defensing multi-source sybil attacks in VANET,” in Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA '15), pp. 145–154, August 2015.
  18. K. Rabieh, M. M. E. A. Mahmoud, T. N. Guo, and M. Younis, “Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs,” in Proceedings of the IEEE International Conference on Communications (ICC '15), pp. 7298–7303, London, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. J. R. Douceur, “The sybil attack,” in Peer-to-Peer Systems, vol. 2429 of Lecture Notes in Computer Science, pp. 251–260, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  20. J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: analysis & defenses,” in Proceedings of the Third International Symposium on Information Processing in Sensor Networks (IPSN '04), Berkeley, Calif, USA, April 2004. View at Scopus
  21. S. Park, B. Aslam, D. Turgut, and C. C. Zou, “Defense against sybil attack in vehicular ad hoc network based on roadside unit support,” in Proceedings of the IEEE Military Communications Conference (MILCOM '09), pp. 1–7, Boston, Mass, USA, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  22. J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, “Linkable ring signature with unconditional anonymity,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 157–165, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. L. Chen, X. Jia, L. Meng, and L. Wang, “Expedite privacy-preserving emergency communication scheme for VANETs,” International Journal of Distributed Sensor Networks, vol. 9, no. 5, pp. 1–13, 2013. View at Google Scholar
  24. D. Pointcheval and J. Stern, “Security proofs for signature schemes,” in International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 1996: Advances in Cryptology—EUROCRYPT '967, pp. 387–398, Springer, Berlin, Germany, 1996. View at Publisher · View at Google Scholar
  25. F. K. Karnadi, Z. H. Mo, and K.-C. Lan, “Rapid generation of realistic mobility models for VANET,” in Proceedings of the 2007 IEEE Wireless Communications and Networking Conference (WCNC '07), pp. 2508–2513, Hong Kong, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  26. SUMO—Simulation of Urban Mobility, http://sumo.sourceforge.net.