Robust Sybil Attack Detection in Vehicular Networks

被引:1
|
作者
Tulay, Halit Bugra [1 ]
Koksal, Can Emre [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
cybersecurity; sybil attack; vehicular networks; VANET;
D O I
10.1109/VTC2021-FALL52928.2021.9625060
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The broadcast nature of the vehicular networks makes them vulnerable to Sybil attacks, where an attacker illegitimately claims multiple identities and undermines the networks. We propose a non-cryptographic attack detection approach that is based on signal-level wireless measurements. Our approach exploits the spatial signal variation of wireless channels to detect Sybil attacks. The performance of our approach is verified via extensive simulations and DSRC-based experiments in a real vehicular network. The results show that we achieve the detection rates of 95% in simulations and 99% in real-world experiments. The proposed approach can be deployed on the existing systems without a need for additional hardware or infrastructure.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
    Grover, Jyoti
    Kumar, Deepak
    Sargurunathan, M.
    Gaur, M. S.
    Laxmi, Vijay
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 473 - 482
  • [32] Lightweight Sybil Attack Detection in MANETs
    Abbas, Sohail
    Merabti, Madjid
    Llewellyn-Jones, David
    Kifayat, Kashif
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 236 - 248
  • [33] Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 698 - 702
  • [34] Signal Strength Based Sybil Attack Detection in Wireless Ad hoc Networks
    Abbas, S.
    Merabti, M.
    Llewellyn-Jones, D.
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2009, : 190 - 195
  • [35] An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks
    Triki, Bayrem
    Rekhis, Slim
    Boudriga, Noureddine
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [36] A Sybil Attack Detection Scheme for Privacy-Preserving Mobile Social Networks
    Li, Pengfei
    Lu, Rongxing
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [37] Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks
    Saxena, Sweety
    Sejwar, Vikas
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 15 - 30
  • [38] P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks
    Zhou, Tong
    Roy, Romit
    Ning, Choudhury Peng
    Chakrabarty, Krishnendu
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 582 - 594
  • [39] A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
    Wang, Hui
    Ma, Li
    Bai, Hong-ying
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 752 - 756
  • [40] Similarity-Based and Sybil Attack Defended Community Detection for Social Networks
    Jiang, Zhongyuan
    Li, Jing
    Ma, Jianfeng
    Yu, Philip S.
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3487 - 3491