Cargando…
Secure Vehicular Platoon Management against Sybil Attacks
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9697095/ https://www.ncbi.nlm.nih.gov/pubmed/36433596 http://dx.doi.org/10.3390/s22229000 |
_version_ | 1784838474971480064 |
---|---|
author | Junaidi, Danial Ritzuan Ma, Maode Su, Rong |
author_facet | Junaidi, Danial Ritzuan Ma, Maode Su, Rong |
author_sort | Junaidi, Danial Ritzuan |
collection | PubMed |
description | The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency. |
format | Online Article Text |
id | pubmed-9697095 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96970952022-11-26 Secure Vehicular Platoon Management against Sybil Attacks Junaidi, Danial Ritzuan Ma, Maode Su, Rong Sensors (Basel) Article The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency. MDPI 2022-11-21 /pmc/articles/PMC9697095/ /pubmed/36433596 http://dx.doi.org/10.3390/s22229000 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Junaidi, Danial Ritzuan Ma, Maode Su, Rong Secure Vehicular Platoon Management against Sybil Attacks |
title | Secure Vehicular Platoon Management against Sybil Attacks |
title_full | Secure Vehicular Platoon Management against Sybil Attacks |
title_fullStr | Secure Vehicular Platoon Management against Sybil Attacks |
title_full_unstemmed | Secure Vehicular Platoon Management against Sybil Attacks |
title_short | Secure Vehicular Platoon Management against Sybil Attacks |
title_sort | secure vehicular platoon management against sybil attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9697095/ https://www.ncbi.nlm.nih.gov/pubmed/36433596 http://dx.doi.org/10.3390/s22229000 |
work_keys_str_mv | AT junaididanialritzuan securevehicularplatoonmanagementagainstsybilattacks AT mamaode securevehicularplatoonmanagementagainstsybilattacks AT surong securevehicularplatoonmanagementagainstsybilattacks |