Distributed Data Fusion for Detecting Sybil Attacks in VANETs

Sybil attacks have become a serious threat as they can affect the functionality of VANETs (Vehicular Ad Hoc Networks). This paper presents a method for detecting such attacks in VANETs based on distributed data fusion. An algorithm has been developed in order to build distributed confidence over the network under the belief function framework. Our approach has been validated by simulation.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  H. B. Mitchell,et al.  Multi-Sensor Data Fusion: An Introduction , 2007 .

[3]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[4]  Martin Mauve,et al.  Probabilistic aggregation for data dissemination in VANETs , 2007, VANET '07.

[5]  Bertrand Ducourthial,et al.  On the Sybil attack detection in VANET , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[6]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[7]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[8]  Arthur P. Dempster,et al.  Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[9]  Véronique Berge-Cherfaoui,et al.  Distributed data fusion: application to confidence management in vehicular networks , 2008, 2008 11th International Conference on Information Fusion.

[10]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[11]  T. Denœux Conjunctive and disjunctive combination of belief functions induced by nondistinct bodies of evidence , 2008 .

[12]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[13]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[14]  Bayesian network model for data incest in a distributed sensor network , 2004 .

[15]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[16]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[17]  Jin Wang,et al.  A new evidential trust model for open communities , 2009, Comput. Stand. Interfaces.

[18]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[19]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[20]  Philippe Smets,et al.  Belief functions: The disjunctive rule of combination and the generalized Bayesian theorem , 1993, Int. J. Approx. Reason..

[21]  Thierry Denoeux,et al.  Conjunctive and disjunctive combination of belief functions induced by nondistinct bodies of evidence , 2008, Artif. Intell..