Detecting Sybil Attacks using Proofs of Work and Location in VANETs

AI-generated keywords: Sybil attacks Proofs of Work Location VANETs Security

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Proposed scheme for detecting Sybil attacks in VANETs using proofs of work and location
  • Each RSU issues signed time-stamped tags for vehicle's anonymous location
  • Multiple consecutive RSUs create trajectory for vehicle, serving as its anonymous identity
  • Scheme requires contributions from several RSUs to prevent fake trajectories successfully
  • Vehicles must solve computational puzzle using PoW algorithm before obtaining next proof of location
  • Event manager uses matching technique to identify Sybil trajectories during reported events like road congestion
  • Effectiveness based on physical constraint that Sybil trajectories are bound to one vehicle, requiring overlapping trajectories
  • Extensive experiments and simulations show high detection rate for Sybil attacks with minimal false negatives and acceptable overhead
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Mohamed Baza, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, Mohamed Abdallah

Abstract: In this paper, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive RSUs is used to create vehicle trajectory which is used as vehicle anonymous identity. Also, one RSU is not able to issue trajectories for vehicles, rather the contributions of several RSUs are needed. By this way, attackers need to compromise an infeasible number of RSUs to create fake trajectories. Moreover, upon receiving the proof of location from an RSU, the vehicle should solve a computational puzzle by running proof of work (PoW) algorithm. So, it should provide a valid solution (proof of work) to the next RSU before it can obtain a proof of location. Using the PoW can prevent the vehicles from creating multiple trajectories in case of low-dense RSUs. Then, during any reported event, e.g., road congestion, the event manager uses a matching technique to identify the trajectories sent from Sybil vehicles. The scheme depends on the fact that the Sybil trajectories are bounded physically to one vehicle; therefore, their trajectories should overlap. Extensive experiments and simulations demonstrate that our scheme achieves high detection rate to Sybil attacks with low false negative and acceptable communication and computation overhead.

Submitted to arXiv on 11 Apr. 2019

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1904.05845v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "Detecting Sybil Attacks using Proofs of Work and Location in VANETs," Mohamed Baza, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, and Mohamed Abdallah propose a novel scheme for detecting Sybil attacks in Vehicular Ad-Hoc Networks (VANETs) using proofs of work and location. The core idea behind their approach is to have each road side unit (RSU) issue a signed time-stamped tag as proof of a vehicle's anonymous location. These tags are then used by multiple consecutive RSUs to create a trajectory for the vehicle, serving as its anonymous identity. Unlike traditional methods where a single RSU can issue trajectories for vehicles, this scheme requires contributions from several RSUs. This means that attackers would need to compromise an impractical number of RSUs to create fake trajectories successfully. Additionally, upon receiving the proof of location from an RSU, the vehicle must solve a computational puzzle using a proof of work (PoW) algorithm before obtaining the next proof of location. This PoW requirement acts as a deterrent against vehicles creating multiple trajectories in scenarios with low-density RSUs. During any reported event such as road congestion, the event manager utilizes a matching technique to identify trajectories sent from Sybil vehicles. The effectiveness of this scheme lies in the physical constraint that Sybil trajectories are bound to one vehicle; hence their trajectories should overlap. Extensive experiments and simulations conducted by the authors demonstrate that their proposed scheme achieves a high detection rate for Sybil attacks with minimal false negatives and acceptable communication and computation overhead. Overall, this innovative approach offers an effective solution for enhancing security in VANETs by leveraging proofs of work and location to detect malicious activities such as Sybil attacks with efficiency and accuracy.
Created on 28 Mar. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.