• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

安全的车队管理抵御 Sybil 攻击。

Secure Vehicular Platoon Management against Sybil Attacks.

机构信息

School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore.

College of Engineering, Qatar University, Doha P.O. Box 2713, Qatar.

出版信息

Sensors (Basel). 2022 Nov 21;22(22):9000. doi: 10.3390/s22229000.

DOI:10.3390/s22229000
PMID:36433596
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9697095/
Abstract

The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment is uncommon due to cyber security concerns. One particular concern is a Sybil attack, by which the admission of fake virtual vehicles into the platoon allows malicious actors to wreak havoc on the platoon itself. In this paper, we propose a secure management scheme for platoons that can protect major events that occur in the platoon operations against Sybil attacks. Both vehicle identity and message exchanged are authenticated by adopting key exchange, digital signature and encryption schemes based on elliptic curve cryptography (ECC). Noteworthy features of the scheme include providing perfect forward secrecy and both group forward and backward secrecy to preserve the privacy of vehicles and platoons. Typical malicious attacks such as replay and man-in-the-middle attacks for example can also be resisted. A formal evaluation of the security functionality of the scheme by the Canetti-Krawczyk (CK) adversary and the random oracle model as well as a brief computational verification by CryptoVerif were conducted. Finally, the performance of the proposed scheme was evaluated to show its time and space efficiency.

摘要

在 21 世纪,高速公路的通行能力一直是一个亟待解决的问题,这使得交通事故发生的可能性更大。此外,最近全球油价飙升至创纪录水平。车辆成队行驶是一个潜在的解决方案,但由于网络安全问题,其部署并不常见。一个特别令人担忧的问题是 Sybil 攻击,通过这种攻击,允许恶意行为者将虚假虚拟车辆纳入车队,从而对车队本身造成严重破坏。在本文中,我们提出了一种安全的车队管理方案,可以保护车队操作中发生的重大事件免受 Sybil 攻击。通过采用基于椭圆曲线密码学(ECC)的密钥交换、数字签名和加密方案,可以对车辆身份和交换的消息进行认证。该方案的显著特点包括提供完美前向保密性和群组前向和后向保密性,以保护车辆和车队的隐私。典型的恶意攻击,如重放和中间人攻击等,也可以被抵抗。通过 Canetti-Krawczyk(CK)对手和随机Oracle 模型对方案的安全性功能进行了正式评估,并通过 CryptoVerif 进行了简要的计算验证。最后,评估了所提出方案的性能,以展示其时间和空间效率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/031455b0956f/sensors-22-09000-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/91d7bf61c29c/sensors-22-09000-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/8b236915f42c/sensors-22-09000-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/309115c38a5c/sensors-22-09000-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/a489f397af6a/sensors-22-09000-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/64c55644dba6/sensors-22-09000-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/109b4a16d8e3/sensors-22-09000-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/f710863e41ae/sensors-22-09000-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/1e77d4d0bb8b/sensors-22-09000-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/88a7c4172aed/sensors-22-09000-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/cf88d5a59d01/sensors-22-09000-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/96421d09b837/sensors-22-09000-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/9476be68a364/sensors-22-09000-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/8ad902d2df34/sensors-22-09000-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/932e868a10ed/sensors-22-09000-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/60812ed134f4/sensors-22-09000-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/031455b0956f/sensors-22-09000-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/91d7bf61c29c/sensors-22-09000-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/8b236915f42c/sensors-22-09000-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/309115c38a5c/sensors-22-09000-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/a489f397af6a/sensors-22-09000-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/64c55644dba6/sensors-22-09000-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/109b4a16d8e3/sensors-22-09000-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/f710863e41ae/sensors-22-09000-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/1e77d4d0bb8b/sensors-22-09000-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/88a7c4172aed/sensors-22-09000-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/cf88d5a59d01/sensors-22-09000-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/96421d09b837/sensors-22-09000-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/9476be68a364/sensors-22-09000-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/8ad902d2df34/sensors-22-09000-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/932e868a10ed/sensors-22-09000-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/60812ed134f4/sensors-22-09000-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b6cd/9697095/031455b0956f/sensors-22-09000-g016.jpg

相似文献

1
Secure Vehicular Platoon Management against Sybil Attacks.安全的车队管理抵御 Sybil 攻击。
Sensors (Basel). 2022 Nov 21;22(22):9000. doi: 10.3390/s22229000.
2
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.车载自组织网络中的安全基于假名的条件隐私保护认证方案。
Sensors (Basel). 2022 Feb 22;22(5):1696. doi: 10.3390/s22051696.
3
Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.基于鲁棒 ECC 的带隐私保护的认证密钥协商方案在远程医疗信息系统中的应用。
J Med Syst. 2015 May;39(5):49. doi: 10.1007/s10916-015-0233-3. Epub 2015 Mar 3.
4
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs.车联网中支持 Sybil 攻击检测的隐私保护密钥管理方案。
Sensors (Basel). 2021 Feb 4;21(4):1063. doi: 10.3390/s21041063.
5
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.基于物联网的医疗保健系统中具有可证明安全性的高效用户认证和用户匿名方案。
Sensors (Basel). 2017 Jun 23;17(7):1482. doi: 10.3390/s17071482.
6
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.SE-CPPA:一种车载自组织网络中安全高效的条件隐私保护认证方案。
Sensors (Basel). 2021 Dec 8;21(24):8206. doi: 10.3390/s21248206.
7
Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.基于混沌映射的三因素认证密钥协商方案的远程医疗信息系统隐私保护
IEEE J Biomed Health Inform. 2017 Mar;21(2):465-475. doi: 10.1109/JBHI.2016.2517146. Epub 2016 Jan 12.
8
A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC.基于椭圆曲线密码的 TMIS 多服务器安全生物认证密钥交换协议
Comput Methods Programs Biomed. 2018 Oct;164:101-109. doi: 10.1016/j.cmpb.2018.07.008. Epub 2018 Jul 18.
9
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things.基于物联网的门限哈希函数的聚合签名方案
Sensors (Basel). 2019 Sep 29;19(19):4239. doi: 10.3390/s19194239.
10
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.一种用于无线网络的新型隐私保护切换认证方案。
Sensors (Basel). 2017 Jun 20;17(6):1446. doi: 10.3390/s17061446.

本文引用的文献

1
Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks.重新链接:面向物联网和移动自组织网络的抗西比尔分布式身份
Sensors (Basel). 2021 May 8;21(9):3257. doi: 10.3390/s21093257.