Detecting Sybil attacks in vehicular ad hoc networks

被引:20
|
作者
Hamdan S. [1 ]
Hudaib A. [2 ]
Awajan A. [1 ]
机构
[1] Computer Science Department, Princess Sumaya University for Technology, Amman
[2] Computer Science Department, University of Jodan, Amman
关键词
Ad hoc networks; mobile ad hoc networks; Sybil attack; vehicular ad hoc networks;
D O I
10.1080/17445760.2019.1617865
中图分类号
学科分类号
摘要
Ad hoc networks are vulnerable to numerous attacks due to its infrastructure-less nature, one of these attacks is the Sybil attack. Sybil attack is a severe attack on vehicular ad hoc networks (VANET) in which the intruder maliciously claims or steals multiple identities and uses these identities to disturb the functionality of the VANET network by disseminating false identities. Many solutions have been proposed in order to defend the VANET network against the Sybil attack. In this research a hybrid algorithm is proposed by combining footprint and privacy-preserving detection of abuses of pseudonyms (P2DAP) methods. The hybrid detection algorithm is implemented using the ns2 simulator. The proposed algorithm works as follows. P2DAP acts better than the footprint algorithm when the number of vehicles increases. On the other hand, the footprint algorithm acts better when the speed of vehicles increases. The hybrid algorithm depends on encryption, authentication and on the trajectory of the vehicle. The scenarios will be generated using SUMO and MOVE tools. © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:69 / 79
页数:10
相关论文
共 50 条
  • [1] Combating Sybil Attacks in Vehicular Ad Hoc Networks
    Rabieh, Khaled Mohamed
    Azer, Marianne Amir
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 65 - 72
  • [2] Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A Review
    Muhamad, Aveen
    Elhadef, Mourad
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 547 - 555
  • [3] Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm
    Mahdi Maleknasab Ardakani
    Mohammad Ali Tabarzad
    Mohammad Amin Shayegan
    The Journal of Supercomputing, 2022, 78 : 16303 - 16335
  • [4] Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm
    Ardakani, Mahdi Maleknasab
    Tabarzad, Mohammad Ali
    Shayegan, Mohammad Amin
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (14): : 16303 - 16335
  • [5] Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks
    Zhou, Tong
    Choudhury, Romit Roy
    Ning, Peng
    Chakrabarty, Krishnendu
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 195 - +
  • [6] Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks
    Zhang, Zhaoyi
    Lai, Yingxu
    Chen, Ye
    Wei, Jingwen
    Wang, Yuhang
    AD HOC NETWORKS, 2023, 141
  • [7] Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
    Grover, Jyoti
    Kumar, Deepak
    Sargurunathan, M.
    Gaur, M. S.
    Laxmi, Vijay
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 473 - 482
  • [8] P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks
    Zhou, Tong
    Roy, Romit
    Ning, Choudhury Peng
    Chakrabarty, Krishnendu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 582 - 594
  • [9] Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks
    Triki, Bayrem
    Rekhis, Slim
    Chammem, Mhamed
    Boudriga, Noureddine
    2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
  • [10] Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
    Chang, Shan
    Qi, Yong
    Zhu, Hongzi
    Zhao, Jizhong
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 1103 - 1114