Efficient Detection of Sybil Attack Based on Cryptography in Vanet

Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

[1]  Jing Deng,et al.  Wireless ad hoc networks , 2003 .

[2]  W. Effelsberg,et al.  Vehicular ad-hoc networks: from vision to reality and back , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[3]  Tim Leinmüller,et al.  Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[4]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[5]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[6]  E. Schoch,et al.  Security requirements and solution concepts in vehicular ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[7]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[8]  Emin Gün Sirer,et al.  Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .

[9]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[10]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[11]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[12]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[13]  Ghassan Samara Efficient certificate management in VANET , 2010, 2010 2nd International Conference on Future Computer and Communication.

[14]  Amer Aijaz,et al.  Attacks on Inter Vehicle Communication Systems-an Analysis , 2005 .

[15]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[16]  Christer Andersson,et al.  Self-certified Sybil-Free Pseudonyms : Introducing Privacy in Infrastructureless Wireless Networks , 2007 .

[17]  Sajid Hussain,et al.  Using Received Signal Strength Variation for Energy Efficient Data Dissemination in Wireless Sensor Networks , 2007 .

[18]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[19]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[20]  Sajid Hussain,et al.  Using Received Signal Strength Variation for Energy Efficient Data Dissemination in Wireless Sensor Networks , 2007, 18th International Workshop on Database and Expert Systems Applications (DEXA 2007).

[21]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[22]  Dharma P. Agrawal,et al.  Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[23]  Pin-Han Ho,et al.  Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme , 2007, 2007 IEEE International Conference on Communications.