Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks

Vehicular Ad-hoc Networks (VANET) technology provides a fast, easy to deploy and an inexpensive solution for intelligent traffic control and traffic disaster preventive measure. In VANET, moving vehicles communicate using wireless technology. This communication can be used to divert traffic from congested or dysfunctional routes, to seek help in an emergency and to prevent accident escalation in addition to providing intelligent traffic control. However, an attacker can use the same system to spread false warning messages resulting in congestion on certain routes thereby leading to accidents or causing delay in providing help etc. One of the harmful attacks against VANET is Sybil attack, in which an attacker generates multiple identities to feign multiple nodes. In this paper, we present an implementation of simulated Sybil attack scenario in VANET and discuss its impact on network performance. A cooperative approach of Sybil attack detection, inferred through analysis of Sybil attack, is also presented.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[3]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[4]  Acm Sigmobile 2nd Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks : DIWANS 2006 : co-located with MobiCom 2006, September 25, 2006, Los Angeles, California, USA , 2006 .

[5]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[6]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[7]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[8]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[9]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[10]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[11]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[12]  Tim Leinmüller,et al.  POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.

[13]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[14]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.