Nothing Special   »   [go: up one dir, main page]

Skip to content
BY 4.0 license Open Access Published by De Gruyter Open Access December 7, 2015

Multivariate verification for sybil attack detection in VANET

  • Jyoti Grover , Manoj Singh Gaur and Vijay Laxmi
From the journal Open Computer Science

Abstract

Wireless vehicular communication is used to enhance traffic safety and to minimize congestion, thereby leading to increased driving efficiency. A malicious node can transmit an inaccurate message to trigger inevitable situations by pretending to be multiple (other) vehicles. Therefore, it is critical to identify malicious nodes as well as fake messages generated by such nodes, and discard such messages quickly. In a Sybil attack, an attacker participates in the network with multiple forged identities in order to disrupt the fundamental operations of VANET. Sybil attacks are particularly easy to launch in VANETs due to the open and broadcast nature of communication medium. In this paper, we present the implementation of simulated Sybil attack scenario in VANET and its consequences on the performance of the network. We also propose a lightweight, scalable and distributed detection approach based on the difference in movement patterns of Sybil nodes and legitimate nodes. In our approach, each Road Side Unit (RSU) computes, stores and verifies various parameter values including RSS, distance, angle of passing-by vehicles through passive overhearing process to detect Sybil attackers. The combination of different parameters makes our detection approach highly accurate. We validate our results on realistic traces obtained from a multi-agent microscopic traffic simulator (MMTS). Simulation results show the effectiveness of the proposed approach to locate Sybil nodes with a different number of network parameters.

References

[1] M. Raya, J.P. Hubaux, Securing vehicular ad hoc networks, JCS 15(1), 39–68, 2007 10.3233/JCS-2007-15103Search in Google Scholar

[2] A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, T. Leinmüller, Attacks on Inter Vehicle Communication Systems - an Analysis, Proc. WIT, 189–194, 2006 Search in Google Scholar

[3] J.R. Douceur, The Sybil Attack, IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, Springer-Verlag, London, UK, 251–260, 2002 10.1007/3-540-45748-8_24Search in Google Scholar

[4] J. Newsome, E. Shi, D. Song, A. Perrig, The sybil attack in sensor networks: analysis & defenses, IPSN ’04: Proceedings of the 3rd international symposiumon Information processing in sensor networks, ACM, Berkeley, California, USA, 259–268, 2004 10.1145/984622.984660Search in Google Scholar

[5] B.N. Levine, C. Shields, N.B.Margolin, A Survey of Solutions to the Sybil Attack, Technical Report 2006-052, University of Massachusetts Amherst, Amherst, MA. 2006 Search in Google Scholar

[6] P. Golle, D. Greene, J. Staddon, Detecting and correctingmalicious data in VANETs, VANET ’04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, ACM, Philadelphia, PA, USA, 29–37, 2004 10.1145/1023875.1023881Search in Google Scholar

[7] S. Pal, A.K. Mukhopadhyay, P.P. Bhattacharya,Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks, IEEE Technical Review 25(4), 209–214, 2004 10.4103/0256-4602.42813Search in Google Scholar

[8] J.P. Hubaux, S. Capkun, J. Luo, The Security and Privacy of Smart Vehicles, IEEE Security and Privacy 2(3), 49–55, 2004 10.1109/MSP.2004.26Search in Google Scholar

[9] M. Demirbas, Y. Song, An RSSI-based Scheme for Sybil Attack Detection inWireless Sensor Networks,WOWMOM’06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, IEEE Computer Society, Washington, DC, USA, 564–570, 2006 Search in Google Scholar

[10]C. Piro, C. Shields, B.N. Levine, Detecting the Sybil Attack in Mobile Ad hoc Networks, Securecomm and Workshops, 1– 11, 2006 10.1109/SECCOMW.2006.359558Search in Google Scholar

[11] G. Guette, C. Bryce, Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs), WISTP, 106–116, 2008 10.1007/978-3-540-79966-5_8Search in Google Scholar

[12] G. Yan, S. Olariu, M.C. Weigle, Providing VANET Security Through Active Position Detection, Comput. Commun. 31(12), 2883–2897, 2008 10.1016/j.comcom.2008.01.009Search in Google Scholar

[13] B. Xiao, B. Yu, C. Gao, Detection and localization of Sybil nodes in VANETs, DIWANS ’06: Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, ACM, Los Angeles, CA, USA, 1– 8, 2006 10.1145/1160972.1160974Search in Google Scholar

[14] G. Guette, B. Ducourthial, On the Sybil attack detection in VANET, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, IEEE Computer Society, Los Alamitos, CA, USA, 1–6, 2007 10.1109/MOBHOC.2007.4428742Search in Google Scholar

[15] T. Zhou, R.R. Choudhury, P. Ning, K. Chakrabarty, Privacy- Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks, Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services: MobiQuitous 2007, 1–8, 2007 10.1109/MOBIQ.2007.4451013Search in Google Scholar

[16] J. Grover, M.S. Gaur, V. Laxmi, Sybil Attacks in VANET: Detection and Prevention, Security of Self-Organizing Networks MANET, WSN, WMN, VANET, Auerbach Publications, 269– 294, 2011 Search in Google Scholar

[17] J. Grover, D. Kumar, M. Sargurunathan, M.S. Gaur, V. Laxmi, Performance evaluation and detection of sybil attacks in vehicular ad-hoc networks, Recent Trends in Network Security and Applications, Communications in Computer and Information Science, 89, Springer Berlin Heidelberg, 473–482, 2010 10.1007/978-3-642-14478-3_47Search in Google Scholar

[18]J. Grover, M.S. Gaur, V. Laxmi, A Novel Defense Mechanism against Sybil Attacks in VANET Proceedings of the 3rd international conference on Security of information and networks: SIN ’10, ACM, New York, NY, USA, 249–255, 2010 10.1145/1854099.1854150Search in Google Scholar

[19] J. Grover, M.S. Gaur, N. Prajapati, V. Laxmi, RSS-based Sybil Attack Detection in VANETs, Proceedings of the international conference TENCON2010, IEEE, 2278–2283, 2010 Search in Google Scholar

[20]S. Lv, X. Wang, X. Zhao, X. Zhou, Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks, CIS ’08: Proceedings of the 2008 International Conference on Computational Intelligence and Security, IEEE Computer Society, 442–446, 2008 10.1109/CIS.2008.69Search in Google Scholar

[21] S. Park, B. Aslam, D. Turgut, C.C. Zou, Defense against Sybil attack in Vehicular Ad hoc Network based on Roadside Unit Support, Military Communications Conference, MILCOM, IEEE, 1–7, 2009 10.1109/MILCOM.2009.5379844Search in Google Scholar

[22]C. Chen, X.Wang,W. Han, B. Zang, A Robust Detection of the Sybil Attack in Urban VANETs, ICDCS Workshops, IEEE Computer Society, 270–276, 2009 10.1109/ICDCSW.2009.48Search in Google Scholar

[23]D. Jiang, L. Delgrossi, IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments, Vehicular Technology Conference, VTC Spring 2008, IEEE, 2036–2040, 2008 10.1109/VETECS.2008.458Search in Google Scholar

[24]T.S. Rappaport, Wireless communications, principles and practice, Prentice Hall, Upper Saddle River, NJ,USA, 1996 Search in Google Scholar

[25]V. Naumov, R. Baumann, T. Gross, An evaluation of intervehicle ad hoc networks based on realistic vehicular traces, Proceedings of the 7thACMinternational symposiumon Mobile ad hoc networking and computing, MobiHoc ’06, New York, NY, USA, 108–119, 2006 10.1145/1132905.1132918Search in Google Scholar

[26]A. Tangpong, G. Kesidis, H. Hung-yuan, A. Hurson, Robust Sybil Detection for MANETs, Proceedings of 18th international conferenceComputerCommunications and Networks, ICCCN 2009., IEEE, 1–6, 2009 10.1109/ICCCN.2009.5235387Search in Google Scholar

[27]G. Setiawan, S. Iskandar, S. Kanhere, K.C. Lan, The effect of radio models on vehicular network simulations, ITS, John Wiley & Sons, 2007 Search in Google Scholar

[28]C. Chen, W. Han, X. Wang, Sybil attack detection based on signature vectors in VANETs, IJCCBS 2, 25–37, 2001 10.1504/IJCCBS.2011.038948Search in Google Scholar

[29]D. Dhoutaut, A. Régis, F. Spies, Impact of radio propagation models in vehicular ad hoc networks simulations, Proceedings of the 3rd international workshop on Vehicular ad hoc networks, ACM, NY, USA, 40–49, 2006 10.1145/1161064.1161072Search in Google Scholar

[30]R. Xiu-li, Y. Wei, Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network, 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCom ’09, 1–4, 2009 Search in Google Scholar

[31] F. Bai, H. Krishnan, V. Sadekar, G. Holl, T. Elbatt, Towards characterizing and classifying communication-based automotive applications from awireless networking perspective, Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), 1–16, 2006 Search in Google Scholar

[32]M.S. Bouassida, M. Guette, M. Shawky, B. Ducourthial, Sybil nodes detection based on received signal strength variations within VANET, IJNS 9, 22–32, 2009 Search in Google Scholar

[33]K.F. Ssu, W.T. Wang, W.C. Chang, Detecting Sybil attacks in Wireless Sensor Networks using neighboring information, Computer Networks 53(18), 3042–3056, 2009 10.1016/j.comnet.2009.07.013Search in Google Scholar

[34]D. Weerasinghe Hesiri, R. Tackett, F. Huirong, Verifying Position and Velocity for Vehicular Ad-hoc Networks, Security and Communication Networks, JohnWiley & Sons, Ltd, 2010 10.1002/sec.231Search in Google Scholar

[35]R. Hussain, H. Oh, On secure and privacy-aware sybil attack detection in vehicular communications,Wireless Pers. Commun., 77(4), 2649-2673, 2014 10.1007/s11277-014-1659-5Search in Google Scholar

Received: 2013-10-16
Accepted: 2015-10-01
Published Online: 2015-12-07

© 2015 J. Grover et al.

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 12.11.2024 from https://www.degruyter.com/document/doi/10.1515/comp-2015-0006/html
Scroll to top button