Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1854099.1854150acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A novel defense mechanism against sybil attacks in VANET

Published: 07 September 2010 Publication History

Abstract

Security is an important concern for many Vehicular Ad hoc Network (VANET) applications. One particular serious attack, known as Sybil attack, against ad hoc networks involves an attacker illegitimately claiming multiple identities. In this paper, we present a simple security scheme, based on the difference in movement patterns of Sybil nodes and normal nodes, for detecting Sybil nodes in VANET. Our approach is distributed in nature because all nodes contribute for detection of Sybil nodes in VANET and it scales well in an expanding network. In this approach, each Road Side Unit (RSU) calculates and stores different parameter values (Received Signal Strength, distance, angle) after receiving the beacon packets from nearby vehicles. The reason for choosing the angle as one of the parameters is that it will always be different for two vehicles (not moving side-by-side), even if they have same values for distance and received signal strength (RSS) with reference to a RSU. The combination of the parameters makes our detection approach highly accurate. After a significant observation period, these RSUs exchange their records and calculate the difference of the parameters. If some nodes have same values for the parameters during this observation period, these nodes are classified as Sybil nodes. Our preliminary simulation results show 99% accuracy and approximately 0.5% error rate, lower as compared to existing techniques.

References

[1]
Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux. Securing Vehicular Communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, 13(5):8--15, 2006.
[2]
M. Raya and J. P. Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15(1):39--68, 2007.
[3]
Amer Aijaz, Bernd Bochow, Florian Dützer, Andreas Festag, Matthias Gerlach, Rainer Kroh, and Tim Leinmüijller. Attacks on Inter Vehicle Communication Systems - an Analysis. In In Proc. WIT, pages 189--194, 2006.
[4]
John R. Douceur. The Sybil Attack. In IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pages 251--260, London, UK, 2002. Springer-Verlag.
[5]
James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. The sybil attack in sensor networks: analysis & defenses. In IPSN '04: Proceedings of the 3rd international symposium on Information processing in sensor networks, pages 259--268, Berkeley, California, USA, 2004. ACM.
[6]
Philippe Golle, Dan Greene, and Jessica Staddon. Detecting and correcting malicious data in VANETs. In VANET '04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pages 29--37, Philadelphia, PA, USA, 2004. ACM.
[7]
S. Pal, A. K. Mukhopadhyay, and P. P. Bhattacharya. Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks. IEEE Technical Review, 25(4):209--214, 2008.
[8]
Jean-Pierre Hubaux, Srdjan Čapkun, and Jun Luo. The Security and Privacy of Smart Vehicles. IEEE Security and Privacy, 2(3):49--55, 2004.
[9]
Brian Neil Levine, Clay Shields, and N. Boris Margolin. A Survey of Solutions to the Sybil Attack. Technical Report 2006-052, University of Massachusetts Amherst, Amherst, MA, October 2006.
[10]
Murat Demirbas and Youngwhan Song. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In WOWMOM '06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pages 564--570, Washington, DC, USA, 2006. IEEE Computer Society.
[11]
Chris Piro, Clay Shields, and Brian Neil Levine. Detecting the Sybil Attack in Mobile Ad hoc Networks. In Securecomm and Workshops, 2006, pages 1--11, 2006.
[12]
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham D.Flaxman. SybilGuard: defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking, 16(3):576--589, 2008.
[13]
Gilles Guette and Ciarán Bryce. Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). In WISTP, pages 106--116, 2008.
[14]
Gilles Guette and Bertrand Ducourthial. On the Sybil attack detection in vanet. In IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, pages 1--6, Los Alamitos, CA, USA, 2007. IEEE Computer Society.
[15]
Bin Xiao, Bo Yu, and Chuanshan Gao. Detection and localization of Sybil nodes in VANETs. In DIWANS '06: Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, pages 1--8, Los Angeles, CA, USA, 2006. ACM.
[16]
Tong Zhou, R. R. Choudhury, Peng Ning, and K. Chakrabarty. Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. In Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on, pages 1--8, 2007.
[17]
Soyoung Park Aslam, B. Turgut, D. Zou, and C. C. Defense against Sybil attack in Vehicular Ad hoc Network based on Roadside Unit Support. In Military Communications Conference, 2009. MILCOM 2009. IEEE, pages 1--7, Boston, MA, 2009. IEEE.
[18]
Chen Chen, Xin Wang, Weili Han, and Binyu Zang. A Robust Detection of the Sybil Attack in Urban VANETs. In ICDCS Workshops, pages 270--276. IEEE Computer Society, 2009.
[19]
NCTUns 5.0, Network Simulator and Emulator. http://NSL.csie.nctu.edu.tw/nctuns.html

Cited By

View all
  • (2022)Vehicular Platoon Communication: Architecture, Security Threats and Open ChallengesSensors10.3390/s2301013423:1(134)Online publication date: 23-Dec-2022
  • (2022)Sybil Attack Countermeasures in Vehicular Ad Hoc Networks2022 International Conference on Communications, Information, Electronic and Energy Systems (CIEES)10.1109/CIEES55704.2022.9990799(1-6)Online publication date: 24-Nov-2022
  • (2021)Credibility Enhanced Temporal Graph Convolutional Network Based Sybil Attack Detection On Edge Computing Servers2021 IEEE Intelligent Vehicles Symposium (IV)10.1109/IV48863.2021.9575361(524-531)Online publication date: 11-Jul-2021
  • Show More Cited By

Index Terms

  1. A novel defense mechanism against sybil attacks in VANET

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SIN '10: Proceedings of the 3rd international conference on Security of information and networks
      September 2010
      286 pages
      ISBN:9781450302340
      DOI:10.1145/1854099
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • Microsoft: Microsoft
      • RFBR: Russian Foundation for Basic Research

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 September 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. security
      2. sybil attack
      3. vehicular adhoc network

      Qualifiers

      • Research-article

      Conference

      SIN '10
      Sponsor:
      • Microsoft
      • RFBR
      SIN '10: 3rd International Conference of Security of Information and Networks
      September 7 - 11, 2010
      Rostov-on-Don, Taganrog, Russian Federation

      Acceptance Rates

      Overall Acceptance Rate 102 of 289 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Vehicular Platoon Communication: Architecture, Security Threats and Open ChallengesSensors10.3390/s2301013423:1(134)Online publication date: 23-Dec-2022
      • (2022)Sybil Attack Countermeasures in Vehicular Ad Hoc Networks2022 International Conference on Communications, Information, Electronic and Energy Systems (CIEES)10.1109/CIEES55704.2022.9990799(1-6)Online publication date: 24-Nov-2022
      • (2021)Credibility Enhanced Temporal Graph Convolutional Network Based Sybil Attack Detection On Edge Computing Servers2021 IEEE Intelligent Vehicles Symposium (IV)10.1109/IV48863.2021.9575361(524-531)Online publication date: 11-Jul-2021
      • (2020)A collaborative strategy for detection and eviction of Sybil attacker and Sybil nodes in VANETInternational Journal of Communication Systems10.1002/dac.462134:3Online publication date: 20-Nov-2020
      • (2018)Artificial Intelligence Based Intrusion Detection System to Detect Flooding Attack in VANETsHandbook of Research on Network Forensics and Analysis Techniques10.4018/978-1-5225-4100-4.ch006(87-100)Online publication date: 2018
      • (2018)A hierarchical detection method in external communication for self-driving vehicles based on TDMAPLOS ONE10.1371/journal.pone.018876013:1(e0188760)Online publication date: 9-Jan-2018
      • (2018)Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A ReviewAdvanced Multimedia and Ubiquitous Engineering10.1007/978-981-13-1328-8_71(547-555)Online publication date: 29-Nov-2018
      • (2017)Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANETProceedings of the 2017 International Conference on Software and e-Business10.1145/3178212.3178231(117-122)Online publication date: 28-Dec-2017
      • (2016)Sybil attack prevention and detection in vehicular ad hoc network2016 International Conference on Computing, Communication and Automation (ICCCA)10.1109/CCAA.2016.7813790(594-599)Online publication date: Apr-2016
      • (2015)A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networksSecurity and Communication Networks10.1002/sec.12518:17(3271-3281)Online publication date: 25-Nov-2015
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media