LCSS Based Sybil Attack Detection and Avoidance in Clustered Vehicular Networks

被引:2
|
作者
Rakhi, S. [1 ]
Shobha, K. R. [2 ]
机构
[1] Atria Inst Technol, Bengaluru 560024, Karnataka, India
[2] Ramaiah Inst Technol, Bengaluru 560054, Karnataka, India
关键词
Cluster; power control; RSSI; Sybil; VANET; ALGORITHM; SIMILARITY; INTERNET;
D O I
10.1109/ACCESS.2023.3294469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future Road transportation mainly depends upon connected vehicles. Intelligent Transportation Systems bring benefits to the road users through Vehicular Adhoc Networks (VANETs). Since VANET packet contains life critical information, security is inevitable. A rogue node called sybil node can transmit fake messages to its neighbours and disrupt the system, challenging security. Since the nodes are very dynamic, stability is also a major concern. Existing rogue node detection methods do not address this problem suitably. In the proposed work, rouge node detection is implemented in a clustered network which improves the stability of the network. The main aim of this paper is to implement a sybil attack detection method in distributed or coordinated clustered networks using a novel hybridization technique. The cluster head detects the sybil attacker by comparing the received signal strength of packets from each node based on a similarity algorithm, Longest Common SubSequence (LCSS). However, if the sybil attacker launches a power control mechanism, the similarity calculation fails. To overcome this issue, a Change Point Detection(CPD) technique by comparing the changes in mean value of RSS time series from a particular node is proposed. Coordinated attacks can be easily detected in a clustered network as the information regarding the attackers' spreads in the network quickly so that the nodes can avoid connecting to such malicious nodes during their journey. The proposed algorithm shows significant improvement in detection rate, detection delay and false positive for varying vehicle count compared to existing techniques.
引用
收藏
页码:75179 / 75190
页数:12
相关论文
共 50 条
  • [41] Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks
    Zhang, Zhaoyi
    Lai, Yingxu
    Chen, Ye
    Wei, Jingwen
    Wang, Yuhang
    [J]. AD HOC NETWORKS, 2023, 141
  • [42] Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
    Grover, Jyoti
    Kumar, Deepak
    Sargurunathan, M.
    Gaur, M. S.
    Laxmi, Vijay
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 473 - 482
  • [43] Sybil Attack Type Detection in Wireless Sensor Networks based on Received Signal Strength Indicator detection scheme
    Marian, Salavat
    Mircea, Popa
    [J]. 2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 121 - 124
  • [44] Sybil Attack Detection in Urban Vanets Based on RSU Support
    Hamed, Hamid
    Keshavarz-Haddad, Alireza
    Haghighi, Shapour Golbahar
    [J]. 26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 602 - 606
  • [45] Lightweight Sybil Attack Detection in MANETs
    Abbas, Sohail
    Merabti, Madjid
    Llewellyn-Jones, David
    Kifayat, Kashif
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 236 - 248
  • [46] Sybil Attack Detection Method Based on Geographic Information in ZigBee
    Huang, Mei-gen
    Yu, Bin
    Kong, Zhi-yin
    Zhou, Wei-wei
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 336 - 341
  • [47] Sybil Attack Detection Based on RSSI for Wireless Sensor Network
    Wang, Jiangtao
    Yang, Geng
    Sun, Yuan
    Chen, Shengshou
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2684 - 2687
  • [48] Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 698 - 702
  • [49] CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks
    Wahab, Omar Abdel
    Mourad, Azzam
    Otrok, Hadi
    Bentahar, Jamal
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2016, 50 : 40 - 54
  • [50] A Sybil Attack Detection Scheme for Privacy-Preserving Mobile Social Networks
    Li, Pengfei
    Lu, Rongxing
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,