Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks

Vehicular networks have been drawing special atten- tion in recent years, due to its importance in enhancing driving experience and improving road safety in future smart city. In past few years, several security services, based on cryptography, PKI and pseudonymous, have been standardized by IEEE and ETSI. However, vehicular networks are still vulnerable to various attacks, especially Sybil attack. In this paper, a Support Vector Machine (SVM) based Sybil attack detection method is proposed. We present three SVM kernel functions based classifiers to distinguish the malicious nodes from benign ones via evaluating the variance in their Driving Pattern Matrices (DPMs). The effectiveness of our proposed solution is evaluated through extensive simulations based on SUMO simulator and MATLAB. The results show that the proposed detection method can achieve a high detection rate with low error rate even under a dynamic traffic environment.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[3]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[4]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[5]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[6]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[7]  Florian Dotzer,et al.  Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[8]  Rida Khatoun,et al.  Decentralized Alerts Correlation Approach for DDoS Intrusion Detection , 2008, 2008 New Technologies, Mobility and Security.

[9]  Mohamed F. Younis,et al.  Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs , 2015, 2015 IEEE International Conference on Communications (ICC).

[10]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[11]  Jun Gao,et al.  Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection , 2014, IEEE Transactions on Cybernetics.

[12]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[13]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[14]  Jizhong Zhao,et al.  Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[15]  Weihua Zhuang,et al.  Stochastic Analysis of a Single-Hop Communication Link in Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Intelligent Transportation Systems.

[16]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[17]  Yu Cheng,et al.  Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[18]  Bu-Sung Lee,et al.  Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.

[19]  Shihao Yan,et al.  Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.

[20]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.

[21]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .