A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs

Abstract Vehicular Ad Hoc Networks (VANETs) are expected to play an important role in our lives. They will improve traffic safety and bring a revolution on the driving experience. However, these benefits are counterbalanced by possible attacks that threaten not only the vehicle’s security, but also passengers lives. One of the most common ones is the Sybil attack, which is more dangerous than others since it could be the starting point of many other attacks in VANETs. This paper proposes a distributed approach allowing the detection of Sybil attacks using the traffic flow theory. The key idea here is that each vehicle will monitor its neighbourhood in order to detect an eventual Sybil attack. This is achieved by comparing between the real accurate speed of the vehicle and the one estimated using the V2V communications with vehicles in the vicinity. This estimated speed is obtained using the traffic flow fundamental diagram of the road’s portion where the vehicles are moving. A mathematical model that evaluates the rate of Sybil attack detection according to the traffic density is proposed. Then, this model is validated through some extensive simulations conducted using the well-known NS3 network simulator together with SUMO traffic simulator.

[1]  Mario Gerla,et al.  Ghost: Concealing vehicular botnet communication in the VANET control channel , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  Mario Gerla,et al.  INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[3]  Mario Gerla,et al.  Localization of Sybil Nodes with Electro-Acoustic Positioning in VANETs , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[4]  Harold J Payne,et al.  MODELS OF FREEWAY TRAFFIC AND CONTROL. , 1971 .

[5]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[6]  M J Lighthill,et al.  On kinematic waves II. A theory of traffic flow on long crowded roads , 1955, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.

[7]  J. Maxwell A Treatise on Electricity and Magnetism , 1873, Nature.

[8]  Jizhong Zhao,et al.  Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[9]  Sihem Kechida,et al.  A piecewise switched linear approach for traffic flow modeling , 2017, Int. J. Autom. Comput..

[10]  Samia Boubaker,et al.  Comparative analysis of microscopic models of road traffic data , 2011, 2011 4th International Conference on Logistics.

[11]  Lata Ragha,et al.  Mitigation of attack on authenticating identities in ad-hoc network , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).

[12]  Mohamed Khalil,et al.  Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks , 2018, 2018 Wireless Days (WD).

[13]  Jian Wang,et al.  A secure positioning algorithm against Sybil attack in wireless sensor networks based on number allocating , 2017, 2017 IEEE 17th International Conference on Communication Technology (ICCT).

[14]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[15]  Rida Khatoun,et al.  k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks , 2017, 2017 Third International Conference on Mobile and Secure Services (MobiSecServ).