Sybil attack detection in VANET using neighbouring vehicles

被引:16
作者
Grover, J. [1 ]
Laxmi, V. [2 ]
Gaur, M.S. [2 ]
机构
[1] Department of Computer Science and Engineering, Global Institute of Technology, Jaipur
[2] Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur
关键词
Identity forging; Security; Simulation; Sybil attack; VANETs; Vehicular ad hoc networks;
D O I
10.1504/IJSN.2014.066178
中图分类号
学科分类号
摘要
In vehicular ad hoc networks (VANETs), vehicles are enabled to exchange information to detect and mitigate critical situations. VANETs are vulnerable to many security threats. One severe attack is Sybil attack, in which a malicious node forges large number of fake identities in order to disrupt the proper functioning of VANET applications. Fake information reported by a single malicious vehicle may not be highly convincing because most of the VANET applications require several vehicles to reinforce a particular information before accepting as a truth. A Sybil attacker pretends multiple vehicles in order to reinforce false messages. Proposed methodology exploits the characteristics of Sybil nodes as the neighbours of fake identities (originated from a malicious node) share significant common neighbouring nodes. Motivation behind the design of proposed approach is to locate Sybil nodes quickly without using secret information exchange and special hardware support. We evaluate our proposed approach on the realistic traffic scenario. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:222 / 233
页数:11
相关论文
共 27 条
[1]  
Artimy M., Local density estimation and dynamic transmission-range assignment in vehicular ad hoc networks, IEEE Transactions on Intelligent Transportation Systems, 8, 3, pp. 400-412, (2007)
[2]  
Bai F., Krishnan H., Sadekar V., Holl G., Elbatt T., Towards characterizing and classifying communicationbased automotive applications from a wireless networking perspective, Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), pp. 1-16, (2006)
[3]  
Bouassida M.S., Guette M., Shawky M., Ducourthial B., Sybil nodes detection based on received signal strength variations within VANET, International Journal of Network Security, 9, pp. 22-32, (2009)
[4]  
Chen C., Han W., Wang X., Sybil attack detection based on signature vectors in VANETs, IJCCBS, 2, pp. 25-37, (2011)
[5]  
Demirbas M., Song Y., An RSSI-based scheme for Sybil attack detection in wireless sensor networks, WOWMOM '06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pp. 564-570, (2006)
[6]  
Dhoutaut D., Regis A., Spies F., Impact of radio propagation models in vehicular ad hoc networks simulations, Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, pp. 40-49, (2006)
[7]  
Golle P., Greene D., Staddon J., Detecting and correcting malicious data in VANETs, VANET '04: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29-37, (2004)
[8]  
Grover J., Gaur M.S., Laxmi V., A novel defense mechanism against Sybil attacks in VANET, Proceedings of the 3rd International Conference on Security of Information and Networks, SIN '10, pp. 249-255, (2010)
[9]  
Grover J., Gaur M.S., Laxmi V., Sybil attacks inVANET: Detection and prevention, Security of Self-Organizing Networks MANET, pp. 269-294, (2011)
[10]  
Grover J., Gaur M.S., Prajapati N., Laxmi V., RSS-based Sybil attack detection in VANETs, Proceedings of the International Conference TENCON2010,TENCON2010, pp. 2278-2283, (2010)