Cargando…

Secure Vehicular Platoon Management against Sybil Attacks

The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which...

Descripción completa

Detalles Bibliográficos
Autores principales: Junaidi, Danial Ritzuan, Ma, Maode, Su, Rong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9697095/
https://www.ncbi.nlm.nih.gov/pubmed/36433596
http://dx.doi.org/10.3390/s22229000
_version_ 1784838474971480064
author Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
author_facet Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
author_sort Junaidi, Danial Ritzuan
collection PubMed
description The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency.
format Online
Article
Text
id pubmed-9697095
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96970952022-11-26 Secure Vehicular Platoon Management against Sybil Attacks Junaidi, Danial Ritzuan Ma, Maode Su, Rong Sensors (Basel) Article The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti–Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency. MDPI 2022-11-21 /pmc/articles/PMC9697095/ /pubmed/36433596 http://dx.doi.org/10.3390/s22229000 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Junaidi, Danial Ritzuan
Ma, Maode
Su, Rong
Secure Vehicular Platoon Management against Sybil Attacks
title Secure Vehicular Platoon Management against Sybil Attacks
title_full Secure Vehicular Platoon Management against Sybil Attacks
title_fullStr Secure Vehicular Platoon Management against Sybil Attacks
title_full_unstemmed Secure Vehicular Platoon Management against Sybil Attacks
title_short Secure Vehicular Platoon Management against Sybil Attacks
title_sort secure vehicular platoon management against sybil attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9697095/
https://www.ncbi.nlm.nih.gov/pubmed/36433596
http://dx.doi.org/10.3390/s22229000
work_keys_str_mv AT junaididanialritzuan securevehicularplatoonmanagementagainstsybilattacks
AT mamaode securevehicularplatoonmanagementagainstsybilattacks
AT surong securevehicularplatoonmanagementagainstsybilattacks