A Robust Detection of the Sybil Attack in Urban VANETs

The Sybil attack is one of the serious attacks to Vehicular Ad Hoc Networks (VANETs), because it severely damages the security of VANETs and, even leads to a threat to lives of drivers and passengers. In this paper, we propose a solution to detect the Sybil attack based on the differences between the normal motion trajectories of vehicles and the abnormal ones. In our approach, each node can accomplish the attack detection independently with the limited assistance from the infrastructures of VANETs. We improve the feasibility of our approach with limited infrastructures at the early deployment stages of VANETs. In addition, the independency and feasibility of our algorithm are more robust than the existing solutions that rely on collaboration of neighboring nodes. Simulation results show that the proposed method outperforms the existing solutions in terms of robustness, detection rate, overhead efficiency, and lower system requirements.

[1]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[2]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[3]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[4]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[5]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[6]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[7]  Kaixin Xu,et al.  Group and swarm mobility models for ad hoc network scenarios using virtual tracks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[8]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[9]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[10]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .