• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Detecting Sybil Attacks Using Proofs of Work and Location for Vehicular Ad-Hoc Networks (VANETs)

پدید آورنده
Bewermeier, Niclas

موضوع
Computer Engineering,Computer science,Electrical engineering

رده

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

NATIONAL BIBLIOGRAPHY NUMBER

Number
TLpq2231143868

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Detecting Sybil Attacks Using Proofs of Work and Location for Vehicular Ad-Hoc Networks (VANETs)
General Material Designation
[Thesis]
First Statement of Responsibility
Bewermeier, Niclas
Subsequent Statement of Responsibility
Mahmoud, Mohamed

.PUBLICATION, DISTRIBUTION, ETC

Name of Publisher, Distributor, etc.
Tennessee Technological University
Date of Publication, Distribution, etc.
2019

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
98

DISSERTATION (THESIS) NOTE

Dissertation or thesis details and type of degree
M.S.
Body granting the degree
Tennessee Technological University
Text preceding or following the note
2019

SUMMARY OR ABSTRACT

Text of Note
Vehicular Ad-Hoc Networks (VANETs) enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that will pave the way to the next-generation Intelligent Transportation System (ITS). ITS aims to improve the road safety and reduce slow traffic and jams. To preserve driver's privacy, vehicles should use multiple pseudonyms instead of only one identity. However, malicious vehicles may exploit this abundance of pseudonyms and launch Sybil attacks by pretending to be multiple vehicles. Then, these Sybil (or fake) vehicles report false data, e.g., to create fake congestions or pollute the traffic management data. In this thesis, we propose a novel Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) is responsible for issuing a signed and time-stamped tag as a proof for the vehicle's anonymous location. Each vehicle should use the proofs sent from multiple RSUs to create an anonymous trajectory. The vehicle should send its trajectory to a traffic management center (TMC) which should use a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that since the Sybil vehicles are bounded physically to one vehicle, their trajectories should overlap. We design the proof of location so that one RSU is not able to create trajectories for the vehicles, but the contributions of several RSUs are needed. By this way, our scheme can be secured against RSU compromise attacks. In addition, to limit the ability of attackers to create multiple trajectories for the Sybil vehicles, upon receiving the proof of location from an RSU, the vehicle also receives a computational puzzle to solve. The vehicles should solve the puzzle and provide the solution (proof of work) to the next RSU to obtain a proof of location. Our extensive simulations and experiments demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.

TOPICAL NAME USED AS SUBJECT

Computer Engineering
Computer science
Electrical engineering

PERSONAL NAME - PRIMARY RESPONSIBILITY

Bewermeier, Niclas
Mahmoud, Mohamed

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

p

[Thesis]
276903

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival