Detecting Sybil attacks in VANETs

Sybil attacks have been regarded as a serious security threat to Ad hoc Networks and Sensor Networks. They may also impair the potential applications in Vehicular Ad hoc Networks (VANETs) by creating an illusion of traffic congestion. In this paper, we make various attempts to explore the feasibility of detecting Sybil attacks by analyzing signal strength distribution. First, we propose a cooperative method to verify the positions of potential Sybil nodes. We use a Random Sample Consensus (RANSAC)-based algorithm to make this cooperative method more robust against outlier data fabricated by Sybil nodes. However, several inherent drawbacks of this cooperative method prompt us to explore additional approaches. We introduce a statistical method and design a system which is able to verify where a vehicle comes from. The system is termed the Presence Evidence System (PES). With PES, we are able to enhance the detection accuracy using statistical analysis over an observation period. Finally, based on realistic US maps and traffic models, we conducted simulations to evaluate the feasibility and efficiency of our methods. Our scheme proves to be an economical approach to suppressing Sybil attacks without extra support from specific positioning hardware.

[1]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[2]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[3]  Tim Leinmüller,et al.  Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.

[4]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[6]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[7]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[8]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[9]  Jacob J. Meyers Channel Characterization and Reliability of 5.8 GHz DSRC Wireless Communication Links in Vehicular Ad Hoc Networks in Suburban Driving Environment , 2005 .

[10]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[11]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[12]  Eylem Ekici,et al.  Urban multi-hop broadcast protocol for inter-vehicle communication systems , 2004, VANET '04.

[13]  Ravi M. Yadumurthy,et al.  Reliable MAC broadcast protocol in directional and omni-directional transmissions for vehicular ad hoc networks , 2005, VANET '05.

[14]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[15]  Paolo Santi,et al.  Fair sharing of bandwidth in VANETs , 2005, VANET '05.

[16]  Srinivasan Keshav,et al.  Vehicular opportunistic communication under the microscope , 2007, MobiSys '07.

[17]  Ragunathan Rajkumar,et al.  GrooveSim: a topography-accurate simulator for geographic routing in vehicular networks , 2005, VANET '05.

[18]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[19]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[20]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[21]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[22]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[23]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[24]  Jing Zhao,et al.  VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks , 2008, IEEE Trans. Veh. Technol..

[25]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[26]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .