Defending against Sybil Attacks in Vehicular Platoons

Vehicular networks are being progressively advocated for traffic and congestion management, accident prevention as well as enabling numerous location-based services. In vehicular networks, vehicles form platoons for improving operational efficiency and providing better traffic management thus resulting in optimized performance. However, platoons are vulnerable to notorious threats such as Sybil attacks wherein malicious users fabricate fictitious identities or impersonate those of legitimate nodes. In this paper, we model Sybil attacks in vehicular platoons using OMNET++, SUMO and Veins framework and evaluate their impact on performance. Further, a defense mechanism using hybrid key management in conjunction with witness based mechanisms is proposed. Evaluation shows that the proposed defense mechanism significantly limits the impact of Sybil attacks with minimal overhead. The proposed approach is lightweight in that public key based credentials are bootstrapped to set-up pairwise symmetric keys thus resulting in decreased overhead.

[1]  J. Jithish,et al.  Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[2]  Tamitza Toroyan,et al.  Global status report on road safety , 2009, Injury Prevention.

[3]  Edison Pignaton de Freitas,et al.  On the impact of sybil attacks in cooperative driving scenarios , 2017, 2017 IFIP Networking Conference (IFIP Networking) and Workshops.

[4]  Adam Duran,et al.  Effect of Platooning on Fuel Consumption of Class 8 Vehicles Over a Range of Speeds, Following Distances, and Mass , 2014 .

[5]  Marwane Ayaida,et al.  A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs , 2019, Ad Hoc Networks.

[6]  Sriram Chellappan,et al.  Detecting Sybil attacks in vehicular networks , 2014, Journal of Trust Management.

[7]  Sriram Sankaran,et al.  Towards efficient resource provisioning in vehicular networks , 2017, 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy).

[8]  Assadarat Khurat,et al.  Distributed consensus-based Sybil nodes detection in VANETs , 2017, 2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[9]  Ghassan Samara,et al.  Security Issues in Vehicular Ad Hoc Networks (VANET): a survey , 2017, ArXiv.

[10]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[11]  Edison Pignaton de Freitas,et al.  Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning , 2017, 2017 IEEE Vehicular Networking Conference (VNC).

[12]  Mohamed F. Younis,et al.  Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs , 2015, 2015 IEEE International Conference on Communications (ICC).

[13]  J. Jithin,et al.  Sybil defense mechanisms: A survey , 2015 .

[14]  Xue Liu,et al.  Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[15]  Arafat Awajan,et al.  Hybrid Algorithm to Detect the Sybil Attacks in VANET , 2018, 2018 Fifth International Symposium on Innovation in Information and Communication Technology (ISIICT).

[16]  Xia Feng,et al.  A method for defensing against multi-source Sybil attacks in VANET , 2017, Peer-to-Peer Netw. Appl..

[17]  Adrian Perrig,et al.  Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[18]  Mahdiyeh Alimohammadi,et al.  Sybil Attack Detection in Vehicular Networks , 2014 .

[19]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[20]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[21]  Imad Mahgoub,et al.  TrafficModeler extensions: A case for rapid VANET simulation using, OMNET++, SUMO, and VEINS , 2013, 2013 High Capacity Optical Networks and Emerging/Enabling Technologies.

[22]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[23]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.