28-02-2013, 11:03 AM
TYRETRACKERETECTING MASQUERADING VEHICLES IN ROAD TRANSPORTATION A PROJECT REPORT
TYRETRACKER.docx (Size: 88.61 KB / Downloads: 21)
ABSTRACT
To any road transport safety and security authority, the location privacy of vehicle is high concern and anonymous verification of vehicle is indispensable in any urban vehicular network. Consequently, an attacker who succeeds in forging multiple hostile identities can easily launch a masquerader attack, gaining a disproportionately large influence. In this project, we propose a novel masquerader attack detection mechanism Tyretracker, using the trajectories of vehicles for identification while still preserving their location privacy. When a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of the appearance time at this RSU. Design of location-hidden authorized message generation scheme is for two objectives: first,RSU signatures on messages are signer ambiguous so the RSU location information is concealed from the resulting authorized message; second, two authorized messages signed by the same RSU within the same given period of time (temporarily linkable) are recognizable so that they can be used for identification. With the temporal limitation on the likability of two authorized messages, authorized messages used for long-term identification are prohibited. With this scheme, vehicles can generate a location-hidden trajectory for location-privacy-preserved identification by collecting a consecutive series of authorized messages. To overcome the major challenges of RSU trustworthiness, a centralized server is maintained for RSU authentication.
Existing system
In existing system, hackers easily can act as source node and sends message to destination. Destination receives wrong message from hackers. Destination believes that its correct message from source. Destination receives the wrong information from hackers.
Messages are passed from sender to destination (receiver) without any security. Message header holds source node information which sends the message to receiver. Hackers can easily change that header information and sends to destination.
Disadvantages
Destination gets the wrong information from hackers or malicious user. There is no any server to detect hackers. Header information may be hiding by malicious user. Source node does not get any response from destination while hackers get that source information.
PROPOSED SYSTEM
In this proposed system, hackers cannot act as source, because one centralized server is maintaining to check authentication of source. This centralized server is sybilguard. It blacks unauthorized users or hackers. Sybilguard is maintaining source node information and header information of message. It checks the users using that details whether they are attackers or normal user. Hacker’s information has not been transferred to destination. Destination has not been receiving any attacker information.
ADVANTAGES
Sybilguard is maintained to detect the attackers who are all act as source node. It deletes that wrong information from hackers and indicates that they are attackers. Hackers’ information has not transferred to receiver.
Sybilguard act as the centralized server to all users. It handles the message transmission between those users. Each user has to register individually. Those user informations are stored in centralized server and find the attackers using that information.