p2 dap-sybil attacks detection in vehicular ad hoc networks

23
P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks. .

Upload: martha-chambers

Post on 06-Jan-2018

219 views

Category:

Documents


1 download

DESCRIPTION

INTRODUCTION What is ad hoc network ? Adhoc network refer to a network connection established for single session. What is VANET ? The vehicular ad hoc network (VANET) is a special communication pattern to provide communication information within the roadside box-to-vehicle and inter-vehicle with the aid of wireless network. VANET are begin increasingly supported for traffic control, accident avoidance and management of parking lots and public area.

TRANSCRIPT

Page 1: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

P2 DAP-Sybil Attacks Detection in

Vehicular Ad hoc Networks. .

Page 2: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

OUTLINE

INTRODUCTION.EXITING SYSTEM.PROBLEM STATEMNET.PROPOSED WORK.REFERENCE.

Page 3: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

INTRODUCTION

What is ad hoc network ? Adhoc network refer to a network connection established for

single session.What is VANET ? The vehicular ad hoc network (VANET) is a special

communication pattern to provide communication information within the roadside box-to-vehicle and inter-vehicle with the aid of wireless network .

VANET are begin increasingly supported for traffic control, accident avoidance and management of parking lots and public area.

Page 4: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Architecture of VANET

RSB

Overheard traffic information

V2R V2

V1 V2V

V3

Overheard traffic info or DMV

Page 5: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Assumption on VANET Architecture1.DMV is a trusted party that maintains vehicles records and

distributes certified pseudonyms to vehicles.DMV has enough resources to generate pseudonyms (certified public key )quickly and store all vehicles related information.

2.Vehicles are untrusted party. they communicate with each other in a multihop manner. A message exchange among vehicles is singed with a DMV certified pseudonyms.

3.RSB are wireless access point .they are scattered along the road and connected to DMV via a backhaul network, acting as intermediate to the DMV.

the RSB monitor vehicular activity, identify suspicious behavior and report to DMV for confirmation and punishment

Page 6: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

There are two type of communication in VANET.1.Vehicular to Vehicular Communication(V2V). Vehicles communicates with each other through wireless

medium. 11.Vehicular to Road Side Box(V2R) It is the direct wireless exchange of relevant information

between vehicles and the communication units placed on the side of roads i.e. road side box.

Application of VANET1. Traffic Information2. Road Condition and weather Info.3. Increase Traveler Safety.4. Electronic Toll Collection5. Accident avoidance in road.

Page 7: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Sybil Attack

What is Sybil Attack ? If vehicle use multiple pseudonyms to sign an event such that other

thing multiple vehicle report same event the action consider as Sybil Attack

A Sybil attack is a type of attack in which a malicious node illegally create duplicate multiple vehicle identities.

Fig. Node Participate in Sybil Attack

Node in Sybil Attack

Sybil NodeMalicious Node or

Sybil Attacker

Page 8: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Malicious node/Sybil Attacker:- The node which copy the identities of other nodes.Sybil node:- Additional identities created by the malicious node are known

as Sybil nodes

Page 9: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Exiting System

P2 DAP Scheme are used for handling Sybil attack. The main purpose is to detect Sybil attacks and revoke malicious vehicles immediately after detection.

this scheme is distributed in three stage 1.Complete Two-Stage P2DAP Scheme 2.E-P2DAP – Detecting Events Instead of Sybil Attack. 3.T-P2DAP – Detecting Collusion

Page 10: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Complete Two-Stage P2DAP Scheme

The DMV knows the total number of vehicles, and sequentially generates a sufficient number of yearly pseudonyms for all the vehicles.

After generating a pseudonym p, the DMV first hashes (p | κc) using a one-way hash function, where κc is a global key.

It then selects a set of bits from the hashed result to create hash collisions. The selected bits are referred as “coarse-grained hash value”.

After that, the pseudonym p is placed into a group, which stores the pseudonyms with the same coarse-grained hash values.

In other words, for each pseudonym pl in the m-th coarse-grained group, we have H(pl|κc) = Γm, where H is a one-way hash function, and Γm is the coarse-grained hash value for group m

Page 11: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

We refer such groups as “coarse-grained groups”. The key κc will be distributed to all the RSBs.

DMV calculates the hash value for the above p with a new key κf , and selects a set of bits from the result.

The bits selected from the new hash value are referred as the “fine-grained hash value”. The pseudonym p is then placed into a subgroup of the coarse-

grained group, namely fine grained group, in which all the pseudonyms have the same fine-grained hash value.

For each pseudonym pl in the n-th fine-grained group under the m-th coarse-grained group, we have H(pl |κf) = Θn, where Θn is the fine-grained hash value for the subgroup n.

H(p|κc) = H(p|κc), H(p|κf) = H(p|κf ), In Simplest Coarse Gained Hash Value is Calculated at RSB Site DMV Calculates Fine Gained Hash Value because DMV do not

give Secret Key to RSB

Page 12: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

E-P2DAP – Detecting Events Instead of Sybil Attack. In the C-P2DAP scheme, an RSB reports to the DMV whenever it finds

any set of pseudonyms that hash to the same coarse-grained values. when an event is reported by a large number of vehicles, C-P2DAP can

cause false alarms. Assumptions (1). Each false (faked) event is generated by only one malicious

vehicle. (2). Benign vehicles will not report false events. For an event (ti, lj, ek), the RSB collects a list of pseudonyms Li,j,k

used to sign the event. If p, p Li,j,k, H(p|κc) = H(p|κc), i.e., all the ∀ ∈pseudonyms used to sign (ti, lj, ek) have the same coarse-grained hash value, then the event is probably sent from only one vehicle, and is likely a faked event. In this case, the RSB generates a report with the

same format as in C-P2DAP and sends it to the DMV.

Page 13: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

DMV only needs to examine the pseudonyms in two cases: 1) an attacker reports a false event and carries out a Sybil attack; 2) a true event is reported by multiple benign vehicles whose

pseudonyms have the same coarse-grained hash value, which is a false alarm

The number of false alarms is likely to be small comparedto the total number of the pseudonyms that RSBs process. That Reduces the overhead of DMV.

Page 14: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

T-P2DAP – Detecting Collusion One issue with the E-P2DAP scheme is that it cannot detect

colluding vehicles, i.e., two or more malicious vehicles reporting the same faked event.

Faked event is generated by minimum two vehicles but vehicle number will not be exceed the threshold τ.

for a pseudonym list Li,j,m, the RSB calculates the coarse-grained hash value for each pseudonym p Li,j,k, and ∈ obtains a set of coarse-grained hash values Sc. If |Sc| ≤ τ and two or more pseudonyms in Li,j,k map to the same coarsegrained hash value, the RSB suspects the event to be fake and reports to the DMV.

Page 15: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Drawback of Existing System. By this Three Scheme we Only detect the sybil attack but can not

revoke it. By this scheme overhead of traffic increases because malicious

vehicle try to get the pseudonyms from DMV so overhead increases.

Page 16: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Proposed Work1. Network Generation and Vehicle

Registration with public authentication Key.

2.Detection of Sybil Attack. 2.1 Encryption of Message 2.2 Key Exchange 2.3 Decryption3. Revoking The Sybil Attack

Page 17: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Block Diagram

Page 18: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Network Generation and Vehicle Registration with public authentication Key Create Region Create DMV OR RSB. Create Node or Vehicle With Parameter IP Address, ID, UID, Max

and min wait time, Max and Min Speed. DMV Can Register the Vehicle with Public Authentication Key

before vehicle can transmit the message.

Page 19: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Detection Of Sybil Attack Encryption of Message In this Phase Source Node can Encrypt the with Public Key

Cryptography. In phase1, each vehicle should be registered in a group and receive

its public authentication key (AK) before any message transmission. For signing a message, the vehicle uses group authentication key and encryption function and sends it along with original message to other vehicle and RSU

Page 20: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Key Exchange Algorithm RSU don’t have Private Key of Regional DMV so it sends request

to Regional DMV for OBUid decryption. Regional DMV don’t have private key of Vehicle so it sends

request to Home DMV for getting Private key of Vehicle. Home DMV reply private key to Regional DMV.

Page 21: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Alice and Bob agree to use a modulus p = 23 and base g = 5 (which is a primitive root modulo 23).

Alice chooses a secret integer a = 6, then sends Bob A = ga mod p◦ A = 56 mod 23 = 8

Bob chooses a secret integer b = 15, then sends Alice B = gb mod p◦ B = 515 mod 23 = 19

Alice computes s = Ba mod p◦ s = 196 mod 23 = 2

Bob computes s = Ab mod p◦ s = 815 mod 23 = 2

Alice and Bob now share a secret (the number 2).

Page 22: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Algorithm used for Sybil attack detection

1- EH(PUAK(M)) from source node S 2- EH(SKA(IDA| HAK(M))) from source node S 3- E(PUCA(IDA, HSKA(IDA| HAK(M)))) from node S 4- SEND(RQST(M,HAK(M),CAh,OBUId) from source node S to

local RSU other vehicle in local region) 5- EH(PUAK(M)) in RSU and IF(HAK(M)==HAK(M)) THEN go

to step 7 else go to step 6 6- REPORT to CAl “the message is fault” 7- D(SKCl(IDA, HSKA(IdA| HAK(M))) in CAl 8- REQST(PUA) to CAh 9- RPLY(PUA) to CAl 10- EH(SKA(IDA|HAK(M))) and IF(HSKA(IDA|

HAK(M))==HSKA(IDA|HAK(M))) THEN Sybil attack detect.

Page 23: P2 DAP-Sybil Attacks Detection in Vehicular Ad hoc Networks

Revoking the Sybil Attack When any Home DMV Detects the sybil Attack it then Sends the

request to regional DMV for revoking the node or Vehicle. So Regional DMV now Block or remove the node from region. So now Node Ultimately removes from root as well as Network.