Detecting Sybil attacks in VANETs

被引:138
作者
Yu, Bo [1 ]
Xu, Cheng-Zhong [1 ]
Xiao, Bin [2 ]
机构
[1] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
Sybil attacks; VANET; Position verification;
D O I
10.1016/j.jpdc.2013.02.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sybil attacks have been regarded as a serious security threat to Ad hoc Networks and Sensor Networks. They may also impair the potential applications in Vehicular Ad hoc Networks (VANETs) by creating an illusion of traffic congestion. In this paper, we make various attempts to explore the feasibility of detecting Sybil attacks by analyzing signal strength distribution. First, we propose a cooperative method to verify the positions of potential Sybil nodes. We use a Random Sample Consensus (RANSAC)-based algorithm to make this cooperative method more robust against outlier data fabricated by Sybil nodes. However, several inherent drawbacks of this cooperative method prompt us to explore additional approaches. We introduce a statistical method and design a system which is able to verify where a vehicle comes from. The system is termed the Presence Evidence System (PES). With PES, we are able to enhance the detection accuracy using statistical analysis over an observation period. Finally, based on realistic US maps and traffic models, we conducted simulations to evaluate the feasibility and efficiency of our methods. Our scheme proves to be an economical approach to suppressing Sybil attacks without extra support from specific positioning hardware. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:746 / 756
页数:11
相关论文
共 27 条
[1]  
[Anonymous], P 2 ACM INT WORKSH V
[2]  
[Anonymous], P 2006 WORKSH DEP IS
[3]  
[Anonymous], P 4 WORKSH HOT TOP N
[4]  
[Anonymous], 2002, Wireless Communications: Principles and Practice
[5]  
[Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
[6]  
[Anonymous], NETWORK SIMULATOR
[7]  
Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
[8]   Challenges of intervehicle ad hoc networks [J].
Blum, JJ ;
Eskandarian, A ;
Hoffman, LJ .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2004, 5 (04) :347-351
[9]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[10]  
Capkun S, 2005, IEEE INFOCOM SER, P1917