Sybil attack detection in ultra-dense VANETs using verifiable delay functions

被引:4
|
作者
Rajendra, Yuvaraj [1 ]
Subramanian, Venkatesan [1 ]
Shukla, Sandeep Kumar [2 ]
机构
[1] IIIT, Dept IT, Allahabad, India
[2] IIT, Dept CSE, Delhi, India
关键词
Vehicular networks; VANET; Sybil detection; Verifiable delay functions; Secure vehicular communication;
D O I
10.1007/s12083-024-01673-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad Hoc Networks (VANETs) play a critical role in the future development of Intelligent Transportation Systems (ITS). These networks facilitate communication between vehicles and roadside infrastructure, establishing a dynamic network capable of sharing and processing traffic data. By harnessing this data, a comprehensive understanding of traffic conditions can be achieved, ultimately improving road safety and efficiency. VANETs have the potential to warn drivers about potential hazards, suggest optimal routes, and coordinate traffic signals. However, the current system design poses a vulnerability where a vehicle can acquire multiple identities, allowing it to launch a Sybil attack by impersonating multiple vehicles. In this attack, Sybil (or fake) vehicles generate and report false data, leading to fabricated congestion reports and corrupting traffic management data. To address this issue, this research proposes a novel Sybil attack detection scheme that leverages Verifiable Delay Functions (VDFs) and location data. The proposed scheme utilizes VDFs iteratively computed by vehicles throughout their journeys, forming a VDF chain where the included data is immutable. A vehicle obtains a signature on its recent VDF state from nearby Roadside Units (RSUs) and other vehicles and incorporates these signatures into its VDF chain. The inclusion of signatures in the VDF chains is time-bound and can't be altered later. Essentially, the VDF chain serves as an immutable storage mechanism for each vehicle. Interactions between vehicles involve the exchange of signatures on VDF states, and these interactions, when compiled in a VDF chain, constitute a vehicle's trajectory. By analyzing these trajectories, we can effectively detect Sybil trajectories. Unlike existing methods that solely rely on vehicle-to-RSU interactions, resulting in high false positive rates, our approach introduces vehicle-to-vehicle interactions using VDF chains, thereby increasing the detection rate. Extensive experiments and simulations are conducted to evaluate the proposed scheme's performance in detection. The results demonstrate that our approach can accurately detect Sybil attacks while achieving low rates of false negatives and false positives when compared to existing models.
引用
收藏
页码:1645 / 1666
页数:22
相关论文
共 50 条
  • [1] Sybil Attack Detection in VANETs Using CatBoost Classifier
    Fdil, E. L. Mehdi
    Souidi, E. L. Mamoun
    INTELLIGENT COMPUTING, VOL 4, 2024, 2024, 1019 : 428 - 437
  • [2] Sybil Attack Detection in VANETs using an AdaBoost Classifier
    Laouiti, Dhia Eddine
    Ayaida, Marwane
    Messai, Nadhir
    Najeh, Sameh
    Najjar, Leila
    Chaabane, Ferdaous
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 217 - 222
  • [3] A Robust Detection of the Sybil Attack in Urban VANETs
    Chen, Chen
    Wang, Xin
    Han, Weili
    Zang, Binyu
    ICDCS: 2009 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2009, : 270 - 276
  • [4] Enhancing Security in VANETs with Sybil Attack Detection using Fog Computing
    Paranjothi, Anirudh
    Khan, Mohammad S.
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [5] Sybil Attack Detection in Urban Vanets Based on RSU Support
    Hamed, Hamid
    Keshavarz-Haddad, Alireza
    Haghighi, Shapour Golbahar
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 602 - 606
  • [6] Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI
    Yao, Yuan
    Xiao, Bin
    Yang, Gang
    Hu, Yujiao
    Wang, Liang
    Zhou, Xingshe
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (11) : 2588 - 2602
  • [7] Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network
    Yao, Lin
    Li, Jia
    Deng, Jing
    Wu, Guowei
    COMPUTERS & SECURITY, 2023, 124
  • [8] Sybil Attack Detection in VANETs: An LSTM-Based BiGAN Approach
    Zhong, Yongchao
    Yang, Haonan
    Li, Ying
    Yang, Bo
    Li, Xiaoqi
    Yue, Qiuling
    Hu, Jinglu
    Zhang, Yuqing
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 113 - 120
  • [9] Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
    Yao, Yuan
    Xiao, Bin
    Wu, Gaofei
    Liu, Xue
    Yu, Zhiwen
    Zhang, Kailong
    Zhou, Xingshe
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 591 - 602
  • [10] On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
    Iwendi, Celestine
    Uddin, Mueen
    Ansere, James A.
    Nkurunziza, P.
    Anajemba, J. H.
    Bashir, Ali Kashif
    IEEE ACCESS, 2018, 6 : 47258 - 47267