Detecting Sybil attacks in vehicular ad hoc networks

被引:20
|
作者
Hamdan S. [1 ]
Hudaib A. [2 ]
Awajan A. [1 ]
机构
[1] Computer Science Department, Princess Sumaya University for Technology, Amman
[2] Computer Science Department, University of Jodan, Amman
关键词
Ad hoc networks; mobile ad hoc networks; Sybil attack; vehicular ad hoc networks;
D O I
10.1080/17445760.2019.1617865
中图分类号
学科分类号
摘要
Ad hoc networks are vulnerable to numerous attacks due to its infrastructure-less nature, one of these attacks is the Sybil attack. Sybil attack is a severe attack on vehicular ad hoc networks (VANET) in which the intruder maliciously claims or steals multiple identities and uses these identities to disturb the functionality of the VANET network by disseminating false identities. Many solutions have been proposed in order to defend the VANET network against the Sybil attack. In this research a hybrid algorithm is proposed by combining footprint and privacy-preserving detection of abuses of pseudonyms (P2DAP) methods. The hybrid detection algorithm is implemented using the ns2 simulator. The proposed algorithm works as follows. P2DAP acts better than the footprint algorithm when the number of vehicles increases. On the other hand, the footprint algorithm acts better when the speed of vehicles increases. The hybrid algorithm depends on encryption, authentication and on the trajectory of the vehicle. The scenarios will be generated using SUMO and MOVE tools. © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:69 / 79
页数:10
相关论文
共 50 条
  • [41] Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI
    Yao, Yuan
    Xiao, Bin
    Wu, Gaofei
    Liu, Xue
    Yu, Zhiwen
    Zhang, Kailong
    Zhou, Xingshe
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (02) : 362 - 375
  • [42] Detecting Greedy Behavior By Linear Regression And Watchdog In Vehicular Ad Hoc Networks
    Mejri, Mohamed Nidhal
    Ben-Othman, Jalel
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 5032 - 5037
  • [43] Securing vehicular ad hoc networks
    Raya, Maxim
    Hubaux, Jean-Pierre
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (01) : 39 - 68
  • [44] Security in vehicular ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 88 - 95
  • [45] Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network
    Stepien, Krzysztof
    Poniszewska-Maranda, Aneta
    SENSORS, 2021, 21 (10)
  • [46] A Study on Vehicular Ad hoc Networks
    Viswacheda, Duduku. V.
    Chekima, Ali
    Wong, Farrah
    Dargham, Jamal Ahmad
    2015 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2015), 2015, : 422 - 426
  • [47] Vehicular Ad Hoc and Sensor Networks
    Chao, Han-Chieh
    Chen, Yuh-Shyan
    Hamalainen, Seppo
    IET COMMUNICATIONS, 2010, 4 (07) : 755 - 757
  • [48] Research on Vehicular Ad Hoc Networks
    Liu, Yue
    Bi, Jun
    Yang, Ju
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 4430 - +
  • [49] Securing vehicular ad hoc networks
    Liu, Xiaonan
    Fang, Zhiyi
    Shi, Lijun
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 441 - 446
  • [50] Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
    Klonowski, Marek
    Koza, Michal
    Kutylowski, Miroslaw
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 391 - 402