Sybil attack detection in vehicular ad hoc networks (VANETs): a comprehensive survey

被引:0
作者
Hadri, Habiba [1 ]
Ouadou, Mourad [1 ]
Chakour, Laila [2 ]
Minaoui, Khalid [1 ]
机构
[1] Mohammed V Univ Rabat, Fac Sci, LRIT Lab, Rabat, Morocco
[2] Polytech Univ Hauts De France, F-59300 Valenciennes, France
关键词
ITS; VANET; Communication; Security; Sybil attack; Detection methods; Simulation tools; SECURITY CHALLENGES; ROUTING PROTOCOLS; AUTHENTICATION; SCHEME; PRIVACY;
D O I
10.1007/s11334-025-00603-7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
There are more vehicles on the road with the expansion of the world's population and the growth of the economy. With an increased number of vehicles, the chances of incidents and fatalities on the roads also rise. VANETs have great potential for reducing the risk of accidents and the consequent number of road deaths through the implementation of vehicular communications. Besides allowing road operators to observe any unruly behavior and take action promptly, VANETs have design-related, routing, communication, and safety issues to consider. The use of wireless communication brings with it the risk of these networks becoming prone to various kinds of security attacks, such as acquiring multiple identities by a vehicle or RSU station, popularly known as the Sybil attack. This vulnerability may result in a malicious vehicle sending fabricated messages over the congestion of roads, imminent road accidents, road closures, etc., to deceive drivers into routing via other routes and exposing them to unfortunate incidents. This paper presents a profound study of techniques and methodologies adopted for the detection and mitigation of Sybil attacks within VANET networks. The systematic classification of existing approaches is further done with a detailed analysis concerning detection mechanisms, deployment strategies, and evaluation metrics.
引用
收藏
页码:453 / 474
页数:22
相关论文
共 91 条
[1]  
Ahmed S, 2017, VEH TECHNOL CONFE
[2]  
Ait Wakrime, 2023, P 7 INT C FUT NETW D, P769
[3]  
Al-kahtani MS, 2012, 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012)
[4]   A comprehensive survey on vehicular Ad Hoc network [J].
Al-Sultan, Saif ;
Al-Doori, Moath M. ;
Al-Bayatti, Ali H. ;
Zedan, Hussien .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 :380-392
[5]   Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey [J].
Ali, Ikram ;
Hassan, Alzubair ;
Li, Fagen .
VEHICULAR COMMUNICATIONS, 2019, 16 :45-61
[6]  
[Anonymous], Masquerade
[7]  
[Anonymous], REPLAY ATTACKS
[8]  
[Anonymous], 2012, Int J Comput Theor Eng, DOI DOI 10.7763/IJCTE.2012.V4.627
[9]  
Ayaida M, 2019, INT WIREL COMMUN, P913, DOI 10.1109/iwcmc.2019.8766572
[10]   A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs [J].
Ayaida, Marwane ;
Messai, Nadhir ;
Najeh, Sameh ;
Ndjore, Kouame Boris .
AD HOC NETWORKS, 2019, 90