A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks

In traffic safety related application of Vehicular Ad-hoc Networks (VANETs), security is a great important issue. Sybil attack is a particular kind of attack where the attacker illegitimately claims multiple identities. In the past years, several approaches have been proposed for solving this problem. They are categorized into PKI-based, infrastructure-based, observer-based, and resource-test-based schemes. In this paper, previous protocols are analyzed, and a novel scheme to detect the Sybil nodes in VANETs is presented, mitigating the effect of a Sybil attack. The proposed Sybil nodes detection scheme, Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in VANETs (PMSD), takes advantage of unmodifiable physical measurements of the beacon messages instead of key-based materials, which dose not only solve the Sybil attack problem, but also reduces the overhead for the detection. The proposed scheme does not require fixed infrastructure, which makes it easy to implement. To increase the detection accuracy, traffic flow theory and safety guard distance is introduced into the scheme. The simulation results show a 97% detection rate of Sybil nodes, with only about a 2% error rate.

[1]  Sunilkumar S. Manvi,et al.  Issues in Mobile Ad hoc Networks for Vehicular Communication , 2008 .

[2]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[3]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[4]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[5]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[6]  Maria Kihl,et al.  Inter-vehicle communication systems: a survey , 2008, IEEE Communications Surveys & Tutorials.

[7]  W. Marsden I and J , 2012 .

[8]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[10]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[11]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[12]  Thomas Nowey,et al.  Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[13]  Nader Moayeri,et al.  Design Secure and Application-oriented Vanet , 2008 .

[14]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[15]  Jie Luo,et al.  A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment , 2010, 2010 International Conference on Communications and Mobile Computing.

[16]  Teruhiko Teraoka,et al.  Organization and exploration of heterogeneous personal data collected in daily life , 2012, Human-centric Computing and Information Sciences.

[17]  E. Schoch,et al.  Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[18]  Markulf Kohlweiss,et al.  Self-certified Sybil-free pseudonyms , 2008, WiSec '08.

[19]  Tim Leinmüller,et al.  Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[20]  Amer Aijaz,et al.  Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .

[21]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[22]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.