A sybil attack detection approach using neighboring vehicles in VANET

Vehicular Ad Hoc Network (VANET) is vulnerable to many security threats. One severe attack is Sybil attack, in which a malicious node forges a large number of fake identities in order to disrupt the proper functioning of VANET applications. In this paper, a distributed and robust approach is presented to defend against Sybil attack. Proposed scheme localizes the fake identities of malicious vehicles by analyzing the consistent similarity in neighborhood information of neighbors of these fake identities. Beacon packets are exchanged periodically by all the vehicles to announce their presence and get aware of neighboring nodes. Each node periodically keep a record of its neighboring nodes. In proposed approach, each node exchange groups of its neighboring nodes periodically and perform the intersection of these groups. If some nodes observe that they have similar neighbors for a significant duration of time, these similar neighbors are identified as Sybil nodes. Proposed approach is able to locate Sybil nodes quickly without the requirement of secret information exchange and special hardware support. We evaluate our proposed approach on the realistic traffic scenario. Experiment results demonstrate that detection rate increases when optimal numbers of Sybil nodes are forged by the attacker.

[1]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Maen Artimy,et al.  Local Density Estimation and Dynamic Transmission-Range Assignment in Vehicular Ad Hoc Networks , 2007, IEEE Transactions on Intelligent Transportation Systems.

[4]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[5]  Ciarán Bryce,et al.  Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) , 2008, WISTP.

[6]  Peng Ning,et al.  Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[7]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[8]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[9]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[10]  Thomas R. Gross,et al.  An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces , 2006, MobiHoc '06.

[11]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[12]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[13]  Vijay Laxmi,et al.  A novel defense mechanism against sybil attacks in VANET , 2010, SIN.

[14]  Vijay Laxmi,et al.  Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks , 2010, CNSA.

[15]  Shie-Yuan Wang,et al.  NCTUns 5.0: A Network Simulator for IEEE 802.11(p) and 1609 Wireless Vehicular Network Researches , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[16]  Bertrand Ducourthial,et al.  Sybil Nodes Detection Based on Received Signal Strength Variations within VANET , 2009, Int. J. Netw. Secur..

[17]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[18]  Fan Bai,et al.  Towards Characterising and Classifying Communication–based Automotive Applications from a Wireless Networking Perspective , 2012 .

[19]  Sarit Pal,et al.  Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks , 2008 .

[20]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[21]  François Spies,et al.  Impact of radio propagation models in vehicular ad hoc networks simulations , 2006, VANET '06.

[22]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.