Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS)

被引:20
|
作者
Azam, Sofia [1 ]
Bibi, Maryum [1 ]
Riaz, Rabia [1 ]
Rizvi, Sanam Shahla [2 ]
Kwon, Se Jin [3 ]
机构
[1] Univ Azad Jammu & Kashmir, Dept Comp Sci & IT, Muzaffarabad 13100, CO, Pakistan
[2] Raptor Interact Pty Ltd, Eco Blvd,Witch Hazel Ave, ZA-0157 Centurion, South Africa
[3] Kangwon Natl Univ, Dept AI Software, Samcheok 25913, South Korea
关键词
VANET; sybil attack; vehicular ad hoc network; machine learning; MACHINE;
D O I
10.3390/s22186934
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Vehicular Ad-hoc network (VANET) is an imminent technology having both exciting prospects and substantial challenges, especially in terms of security. Due to its distributed network and frequently changing topology, it is extremely prone to security attacks. The researchers have proposed different strategies for detecting various forms of network attacks. However, VANET is still exposed to several attacks, specifically Sybil attack. Sybil Attack is one of the most challenging attacks in VANETS, which forge false identities in the network to undermine communication between network nodes. This attack highly impacts transportation safety services and may create traffic congestion. In this regard, a novel collaborative framework based on majority voting is proposed to detect the Sybil attack in the network. The framework works by ensembling individual classifiers, i.e., K-Nearest Neighbor, Naive Bayes, Decision Tree, SVM, and Logistic Regression in a parallel manner. The Majority Voting (Hard and Soft) mechanism is adopted for a final prediction. A comparison is made between Majority Voting Hard and soft to choose the best approach. With the proposed approach, 95% accuracy is achieved. The proposed framework is also evaluated using the Receiver operating characteristics curve (ROC-curve).
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Secure Communication and Implementation Technique for Sybil Attack in Vehicular Ad-Hoc Networks
    Soni, Mukesh
    Jain, Anuj
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 539 - 543
  • [3] Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput
    Sefati, Seyed Salar
    Tabrizi, Sara Ghiasi
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (03) : 2699 - 2719
  • [4] Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks
    Zhang, Zhaoyi
    Lai, Yingxu
    Chen, Ye
    Wei, Jingwen
    Wang, Yuhang
    [J]. AD HOC NETWORKS, 2023, 141
  • [5] Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
    Grover, Jyoti
    Kumar, Deepak
    Sargurunathan, M.
    Gaur, M. S.
    Laxmi, Vijay
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 473 - 482
  • [6] Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput
    Seyed Salar Sefati
    Sara Ghiasi Tabrizi
    [J]. Wireless Personal Communications, 2022, 123 : 2699 - 2719
  • [7] Sybil Attack Prevention through Identity Symmetric Scheme in Vehicular Ad-Hoc Networks
    Khalil, Mohamed
    Azer, Marianne A.
    [J]. PROCEEDINGS OF THE 2018 WIRELESS DAYS (WD), 2018, : 184 - 186
  • [8] DIP: Detection of Invalid Packets in Vehicular Ad-hoc Networks(VANETs)
    Maheswari, M.
    Muthumeenakshi, R.
    Chinthamani, C.
    Murugan, K.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [9] Issues and Possibilities in Vehicular Ad-hoc Networks (VANETs)
    Jeremiah, Chukwu
    Nneka, Agwu Joy
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 254 - 259
  • [10] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network
    Sharma, Aravendra Kumar
    Saroj, Sushil Kumar
    Chauhan, Sanjeev Kumar
    Saini, Sachin Kumar
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599