Abstract
Vehicular Ad-hoc Networks (VANET) technology provides a fast, easy to deploy and an inexpensive solution for intelligent traffic control and traffic disaster preventive measure. In VANET, moving vehicles communicate using wireless technology. This communication can be used to divert traffic from congested or dysfunctional routes, to seek help in an emergency and to prevent accident escalation in addition to providing intelligent traffic control. However, an attacker can use the same system to spread false warning messages resulting in congestion on certain routes thereby leading to accidents or causing delay in providing help etc. One of the harmful attacks against VANET is Sybil attack, in which an attacker generates multiple identities to feign multiple nodes. In this paper, we present an implementation of simulated Sybil attack scenario in VANET and discuss its impact on network performance. A cooperative approach of Sybil attack detection, inferred through analysis of Sybil attack, is also presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Raya, M., Papadimitratos, P., Hubaux, J.-P.: Secure vehicular communications. IEEE Wireless Communications Magazine, 8–15 (2006)
Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security 15(1), 39–68 (2007)
Aijaz, A., Bochow, B., Dtzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmuller, T.: Attacks on Inter-Vehicle Communication Systems - An Analysis. In: Proceedings of the 3rd International Workshop on Intelligent Transportation, WIT (March 2006)
Douceur, J.R.: The Sybil attack. In: Proceedings of the International Workshop on Peer to Peer Systems, pp. 251–260 (March 2002)
Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil attack in mobile ad hoc network. In: International Conference on Security and Privacy in Communication Networks, pp. 1–11 (2006)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defences. In: International Symposium on Information Processing in Sensor Networks, pp. 259–268 (April 2004)
Levine, B.N., Shields, C., Margolin, N.B.: A Survey of Solutions to the Sybil Attack. Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA (October 2006)
NCTUns 5.0, Network Simulator and Emulator, http://NSL.csie.nctu.edu.tw/nctuns.html
Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Computer Communications 31(12), 2883–2897 (2008)
**ao, B., Yu, B., Gao, C.: Detection and localization of Sybil nodes in VANETs. In: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 2006), Los Angeles, Calif, USA, pp. 1–8 (September 2006)
Yu, H., Kaminsky, M., Schlosser, M.T., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. In: Proc. ACM SIGCOMM (2006)
Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of first ACM Workshop on Vehicular Ad Hoc Networks, pp. 29–37 (2004)
Hubaux, J.-P., Apkun, S.C., Luo, J.: The security and privacy of smart vehicles. IEEE Security and Privacy 4(3), 49–55 (2004)
Demirbas, M., Song, Y.: An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In: International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 564–570. IEEE Computer Society, Washington (2006)
Leinmüller, T., Schoch, E., Kargl, F.: Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications Magazine (October 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grover, J., Kumar, D., Sargurunathan, M., Gaur, M.S., Laxmi, V. (2010). Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)