Mitigation of insider and outsider DoS attack against signature based authentication in VANETs

B. Pooja, M. M.Manohara Pai, Radhika M. Pai, Nabil Ajam, Joseph Mouzna

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.

Original languageEnglish
Title of host publication2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages152-157
Number of pages6
ISBN (Electronic)9781479945689
DOIs
Publication statusPublished - 14-10-2014
Event2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014 - Bali, Indonesia
Duration: 10-02-201412-02-2014

Conference

Conference2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014
CountryIndonesia
CityBali
Period10-02-1412-02-14

Fingerprint

Authentication
Electronic document identification systems
Denial-of-service attack
Bandwidth

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Information Systems

Cite this

Pooja, B., Pai, M. M. M., Pai, R. M., Ajam, N., & Mouzna, J. (2014). Mitigation of insider and outsider DoS attack against signature based authentication in VANETs. In 2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014 (pp. 152-157). [6924490] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/APCASE.2014.6924490
Pooja, B. ; Pai, M. M.Manohara ; Pai, Radhika M. ; Ajam, Nabil ; Mouzna, Joseph. / Mitigation of insider and outsider DoS attack against signature based authentication in VANETs. 2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 152-157
@inproceedings{537ad37f769143c9a84f9a187ef1c127,
title = "Mitigation of insider and outsider DoS attack against signature based authentication in VANETs",
abstract = "Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.",
author = "B. Pooja and Pai, {M. M.Manohara} and Pai, {Radhika M.} and Nabil Ajam and Joseph Mouzna",
year = "2014",
month = "10",
day = "14",
doi = "10.1109/APCASE.2014.6924490",
language = "English",
pages = "152--157",
booktitle = "2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Pooja, B, Pai, MMM, Pai, RM, Ajam, N & Mouzna, J 2014, Mitigation of insider and outsider DoS attack against signature based authentication in VANETs. in 2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014., 6924490, Institute of Electrical and Electronics Engineers Inc., pp. 152-157, 2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014, Bali, Indonesia, 10-02-14. https://doi.org/10.1109/APCASE.2014.6924490

Mitigation of insider and outsider DoS attack against signature based authentication in VANETs. / Pooja, B.; Pai, M. M.Manohara; Pai, Radhika M.; Ajam, Nabil; Mouzna, Joseph.

2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 152-157 6924490.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Mitigation of insider and outsider DoS attack against signature based authentication in VANETs

AU - Pooja, B.

AU - Pai, M. M.Manohara

AU - Pai, Radhika M.

AU - Ajam, Nabil

AU - Mouzna, Joseph

PY - 2014/10/14

Y1 - 2014/10/14

N2 - Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.

AB - Authentication is an essential framework for safe and secure communication of messages in VANETs. For authenticating messages the IEEE 1609.2 standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. As a result an inside or an outside attacker could use a fraction of bandwidth and flood the network with invalid signatures resulting in Denial of Service (DoS) attack. Thus in this work a two phase scheme is proposed to mitigate inside and outside DoS attackers in VANETs. In the first phase HMAC signatures computed from private and public key pair are used for authenticating the communicating entity. As only authentic users can compute the HMAC signature, DoS attack due to outside attackers is mitigated. If the entity is authentic and subjects other vehicle to DoS attack, the second phase is designed to detect the insider attackers. In this phase based on the number of invalid signatures flooded by the attacker, it is compared against a threshold value to identify the inside attacker. Hence DoS attack is mitigated due to inside as well as outside attackers. Experimental results show that the proposed scheme not only alleviates DoS attack but also performs better with negligible computational overhead.

UR - http://www.scopus.com/inward/record.url?scp=84911087617&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84911087617&partnerID=8YFLogxK

U2 - 10.1109/APCASE.2014.6924490

DO - 10.1109/APCASE.2014.6924490

M3 - Conference contribution

AN - SCOPUS:84911087617

SP - 152

EP - 157

BT - 2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Pooja B, Pai MMM, Pai RM, Ajam N, Mouzna J. Mitigation of insider and outsider DoS attack against signature based authentication in VANETs. In 2014 Asia-Pacific Conference on Computer Aided System Engineering, APCASE 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 152-157. 6924490 https://doi.org/10.1109/APCASE.2014.6924490