Detecting Sybil attacks in VANETs

被引:135
|
作者
Yu, Bo [1 ]
Xu, Cheng-Zhong [1 ]
Xiao, Bin [2 ]
机构
[1] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
Sybil attacks; VANET; Position verification;
D O I
10.1016/j.jpdc.2013.02.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sybil attacks have been regarded as a serious security threat to Ad hoc Networks and Sensor Networks. They may also impair the potential applications in Vehicular Ad hoc Networks (VANETs) by creating an illusion of traffic congestion. In this paper, we make various attempts to explore the feasibility of detecting Sybil attacks by analyzing signal strength distribution. First, we propose a cooperative method to verify the positions of potential Sybil nodes. We use a Random Sample Consensus (RANSAC)-based algorithm to make this cooperative method more robust against outlier data fabricated by Sybil nodes. However, several inherent drawbacks of this cooperative method prompt us to explore additional approaches. We introduce a statistical method and design a system which is able to verify where a vehicle comes from. The system is termed the Presence Evidence System (PES). With PES, we are able to enhance the detection accuracy using statistical analysis over an observation period. Finally, based on realistic US maps and traffic models, we conducted simulations to evaluate the feasibility and efficiency of our methods. Our scheme proves to be an economical approach to suppressing Sybil attacks without extra support from specific positioning hardware. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:746 / 756
页数:11
相关论文
共 50 条
  • [1] Distributed Data Fusion for Detecting Sybil Attacks in VANETs
    El Zoghby, Nicole
    Cherfaoui, Veronique
    Ducourthial, Bertrand
    Denoeux, Thierry
    BELIEF FUNCTIONS: THEORY AND APPLICATIONS, 2012, 164 : 351 - 358
  • [2] Detecting Sybil Attacks Using Proofs of Work and Location in VANETs
    Baza, Mohamed
    Nabil, Mahmoud
    Mahmoud, Mohamed M. E. A.
    Bewermeier, Niclas
    Fidan, Kemal
    Alasmary, Waleed
    Abdallah, Mohamed
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 39 - 53
  • [3] Merged technique to prevent SYBIL Attacks in VANETs
    Syed, Salman Ali
    Prasad, B. V. V. S.
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 287 - 292
  • [4] An Intelligent Mechanism for Sybil Attacks Detection in VANETs
    Quevedo, Carlos H. O. O.
    Quevedo, Ana M. B. C.
    Campos, Gustavo A.
    Gomes, Rafael L.
    Celestino Jr, Joaquim
    Serhrouchni, Ahmed
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [5] MVDetector: Malicious Vehicles Detection Under Sybil Attacks in VANETs
    Wei, Yiming
    Qi, Weiye
    Li, Zechuan
    Han, Yufan
    Lai, Yingxu
    INFORMATION SECURITY, PT II, ISC 2024, 2025, 15258 : 307 - 322
  • [6] Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
    Chang, Shan
    Qi, Yong
    Zhu, Hongzi
    Zhao, Jizhong
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 1103 - 1114
  • [7] Detecting Sybil attacks in vehicular ad hoc networks
    Hamdan S.
    Hudaib A.
    Awajan A.
    International Journal of Parallel, Emergent and Distributed Systems, 2021, 36 (02) : 69 - 79
  • [8] Detecting and preventing Sybil attacks in wireless sensor networks
    Wadii, Jlassi
    Rim, Haddad
    Ridha, Bouallegue
    2019 IEEE 19TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS 2019), 2019,
  • [9] Predictable Model for Detecting Sybil Attacks in Mobile Social Networks
    Lyu, Chen
    Huang, Dongmei
    Jia, Qingyao
    Han, Xiao
    Zhang, Xiaomei
    Chi, Chi-Hung
    Xu, Yang
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [10] Detecting and Defending Against Sybil Attacks in Social Networks: An Overview
    Li, Faxin
    Liu, Bo
    Xiao, Zhefeng
    Fu, Yi
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 104 - 112