Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3576 Accesses

Abstract

Vehicular Ad-hoc Networks (VANET) technology provides a fast, easy to deploy and an inexpensive solution for intelligent traffic control and traffic disaster preventive measure. In VANET, moving vehicles communicate using wireless technology. This communication can be used to divert traffic from congested or dysfunctional routes, to seek help in an emergency and to prevent accident escalation in addition to providing intelligent traffic control. However, an attacker can use the same system to spread false warning messages resulting in congestion on certain routes thereby leading to accidents or causing delay in providing help etc. One of the harmful attacks against VANET is Sybil attack, in which an attacker generates multiple identities to feign multiple nodes. In this paper, we present an implementation of simulated Sybil attack scenario in VANET and discuss its impact on network performance. A cooperative approach of Sybil attack detection, inferred through analysis of Sybil attack, is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 85.59
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 105.49
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Raya, M., Papadimitratos, P., Hubaux, J.-P.: Secure vehicular communications. IEEE Wireless Communications Magazine, 8–15 (2006)

    Google Scholar 

  2. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security 15(1), 39–68 (2007)

    Google Scholar 

  3. Aijaz, A., Bochow, B., Dtzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmuller, T.: Attacks on Inter-Vehicle Communication Systems - An Analysis. In: Proceedings of the 3rd International Workshop on Intelligent Transportation, WIT (March 2006)

    Google Scholar 

  4. Douceur, J.R.: The Sybil attack. In: Proceedings of the International Workshop on Peer to Peer Systems, pp. 251–260 (March 2002)

    Google Scholar 

  5. Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil attack in mobile ad hoc network. In: International Conference on Security and Privacy in Communication Networks, pp. 1–11 (2006)

    Google Scholar 

  6. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defences. In: International Symposium on Information Processing in Sensor Networks, pp. 259–268 (April 2004)

    Google Scholar 

  7. Levine, B.N., Shields, C., Margolin, N.B.: A Survey of Solutions to the Sybil Attack. Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA (October 2006)

    Google Scholar 

  8. NCTUns 5.0, Network Simulator and Emulator, http://NSL.csie.nctu.edu.tw/nctuns.html

  9. Yan, G., Olariu, S., Weigle, M.C.: Providing VANET security through active position detection. Computer Communications 31(12), 2883–2897 (2008)

    Article  Google Scholar 

  10. **ao, B., Yu, B., Gao, C.: Detection and localization of Sybil nodes in VANETs. In: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 2006), Los Angeles, Calif, USA, pp. 1–8 (September 2006)

    Google Scholar 

  11. Yu, H., Kaminsky, M., Schlosser, M.T., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. In: Proc. ACM SIGCOMM (2006)

    Google Scholar 

  12. Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of first ACM Workshop on Vehicular Ad Hoc Networks, pp. 29–37 (2004)

    Google Scholar 

  13. Hubaux, J.-P., Apkun, S.C., Luo, J.: The security and privacy of smart vehicles. IEEE Security and Privacy 4(3), 49–55 (2004)

    Google Scholar 

  14. Demirbas, M., Song, Y.: An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In: International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 564–570. IEEE Computer Society, Washington (2006)

    Chapter  Google Scholar 

  15. Leinmüller, T., Schoch, E., Kargl, F.: Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications Magazine (October 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grover, J., Kumar, D., Sargurunathan, M., Gaur, M.S., Laxmi, V. (2010). Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation