Isolation of Sybil Attack in VANET using Neighboring Information

被引:0
作者
Saggi, Mandeep Kaur [1 ]
Kaur, Ranjeet [1 ]
机构
[1] DAV Univ, Dept Comp Sci, Jalandhar, Punjab, India
来源
2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2015年
关键词
MANET; VANET; Malicious node; Sybil Attack; Collision; V2V communication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advancement of wireless communication leads researchers to conceive and develop the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). In Sybil attack, the WSN is destabilized by a malicious node which create an innumerable fraudulent identities in favor of disrupting networks protocols. In this paper, a novel technique has been proposed to detect and isolate Sybil attack on vehicles resulting in proficiency of network. It will work in two-phases. In first phase RSU registers the nodes by identifying their credentials offered by them. If they are successfully verified, second phase starts & it allots identification to vehicles thus, RSU gathers information from neighboring nodes & define threshold speed limit to them & verify the threshold value is exceed the defined limit of speed. A multiple identity generated by Sybil attack is very harmful for the network & can be misused to flood the wrong information over network. Simulation results show that proposed detection technique increases the possibilities of detection and reduces the percentage of Sybil attack.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 10 条
[1]  
[Anonymous], WIR PERS MULT COMM 2
[2]  
[Anonymous], 2011, GLOB TEL C GLOBECOM
[3]   Security attacks and solutions for vehicular ad hoc networks [J].
Isaac, J. T. ;
Zeadally, S. ;
Camara, J. S. .
IET COMMUNICATIONS, 2010, 4 (07) :894-903
[4]   A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment [J].
Jang, Jeong-Ah ;
Choi, Keechoo ;
Cho, Hanbyeog .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2012, 13 (04) :1880-1890
[5]   Probabilistic isolation of malicious vehicles in pseudonym changing VANETs [J].
Liu, Bisheng ;
Zhong, Yiping ;
Zhang, Shiyong .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :967-972
[6]  
Rawat A, 2012, Journal of Information and Operations Management, V3, P301
[7]   An accurate and efficient collaborative intrusion detection framework to secure vehicular networks [J].
Sedjelmaci, Hichem ;
Senouci, Sidi Mohammed .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 43 :33-47
[8]  
Sharma H, 2014, 2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), P476, DOI 10.1109/CONFLUENCE.2014.6949365
[9]   A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles [J].
Wahab, Omar Abdel ;
Otrok, Hadi ;
Mourad, Azzam .
COMPUTER COMMUNICATIONS, 2014, 41 :43-54
[10]   VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks [J].
Wahab, Omar Abdel ;
Otrok, Hadi ;
Mourad, Azzam .
COMPUTER COMMUNICATIONS, 2013, 36 (13) :1422-1435