Loading

Decentralized Sybil Attack Prevention in VANET using Elliptic Curve Cryptography
Suhaib Rehman1, Nitika Kapoor2
1Suhaib Rehman, Department of Computer Science & Engineering, Chandigarh University, Mohali, Punjab, India
2Nitika Kapoor, Department of Computer Science & Engineering, Chandigarh University, Mohali, Punjab, India

Manuscript received on 07 April 2019 | Revised Manuscript received on 12 May 2019 | Manuscript published on 30 May 2019 | PP: 1922-1929 | Volume-8 Issue-1, May 2019 | Retrieval Number: A213958119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The existence of vehicular ad-hoc network (VANET) depends on secure message dissemination. Among the various possible attacks on VANET, sybil attack is the root cause of other attacks and it can violate the fundamental assumption of VANET. Our proposal helps in preventing Sybil attack during the initial phase of authentication by proposing three level network model. On the top is Cloud-based Trusted Authority (CTA) which maintains database of all the valid vehicles (global database) and generates Elliptic Curve domain parameters. In the middle is the RSU-Manager (RSUM) level which maintains the database of local vehicles of a particular area and at the bottom are the RSUs and vehicles. Elliptic Curve Cryptography is used as the cryptographic algorithm during message dissemination with the aim of increasing performance and security. The comparison of hash of vehicle information is performed for authentication of vehicle during vehicle to infrastructure interaction. Authentication of Vehicle in first phase is performed at RSUM and in second phase at the CTA, in case the vehicle information is not found in the database of RSUM. Our proposed model provides flexibility, lower latency and reduces network overhead. This paper demonstrates the proposed scheme for detecting sybil node in an effective manner.
Index Terms: Cloud-based Trusted Authority (CTA), Elliptic Curve Digital Signature Algorithm (ECDSA), Roadside Unit-Manager, Sybil Attack, Transport Authority, Vehicular Ad-hoc Network (VANET)

Scope of the Article: Cryptography and Applied Mathematics