Skip to main content
Erschienen in: Wireless Personal Communications 3/2022

30.10.2021

Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput

verfasst von: Seyed Salar Sefati, Sara Ghiasi Tabrizi

Erschienen in: Wireless Personal Communications | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Ad-hoc networks are vehicular networks whose functions are widely expanding. High dynamicity and the presence of wireless communications are two major challenging features of these networks. Due to, security and protection of these networks have remained as big unresolved challenges. Attack detection in Vanets may have significant impact on the efficiency of these networks. Timely detection of attacks helps prevent road casualties and traffic control. Initial identification is done by the neighboring nodes. When each node receives a message from neighboring nodes, it compares the ID of each node’s with those of other nodes’ messages. If the messages are the same but sent from different nodes, neighboring nodes send a sample of the data to the RSU. If RSU doubts to an ID, it establishes a table of parameters, such a delay, packet drop and throughput. The total sum of fitness function should be equal to one. If the fitness function of these parameters is beyond the determined limit, nodes will continue to work. In this paper detected Sybil attacks used by the NS3 simulator. The results of the proposed method were acceptable in comparison with PDF (probability density function), FCVS (Fuzzy-based collaborative verification system) and Heartbeat scheme. Delay, energy and strength were the parameters, which had higher responsiveness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alheeti, K. M.A., Gruebler, A., McDonald-Maier, K. D. (2015). An intrusion detection system against malicious attacks on the communication network of driverless cars. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), IEEE, pp. 916–921. Alheeti, K. M.A., Gruebler, A., McDonald-Maier, K. D. (2015). An intrusion detection system against malicious attacks on the communication network of driverless cars. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), IEEE, pp. 916–921.
2.
Zurück zum Zitat Alheeti, K. M. A. Gruebler, A., McDonald-Maier, K. D., Fernando, A. Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, pp. 502–503. Alheeti, K. M. A. Gruebler, A., McDonald-Maier, K. D., Fernando, A. Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, pp. 502–503.
3.
Zurück zum Zitat Bian, C., Zhao, T., Li, X., & Yan, W. (2015). Boosting named data networking for data dissemination in urban VANET scenarios. Vehicular Communications, 2(4), 195–207.CrossRef Bian, C., Zhao, T., Li, X., & Yan, W. (2015). Boosting named data networking for data dissemination in urban VANET scenarios. Vehicular Communications, 2(4), 195–207.CrossRef
4.
Zurück zum Zitat Faisal, S. M., & Zaidi, T. (2020). Timestamp Based Detection of Sybil Attack in VANET. Int. J. Netw. Secur., 22(3), 397–408. Faisal, S. M., & Zaidi, T. (2020). Timestamp Based Detection of Sybil Attack in VANET. Int. J. Netw. Secur., 22(3), 397–408.
5.
Zurück zum Zitat Cheng, J., Cheng, J., Zhou, M., Liu, F., Gao, S., & Liu, C. (2015). Routing in internet of vehicles: A review. IEEE Transactions on Intelligent Transportation Systems, 16(5), 2339–2352.CrossRef Cheng, J., Cheng, J., Zhou, M., Liu, F., Gao, S., & Liu, C. (2015). Routing in internet of vehicles: A review. IEEE Transactions on Intelligent Transportation Systems, 16(5), 2339–2352.CrossRef
6.
Zurück zum Zitat Yao, Y., et al. (2017). Voiceprint: A novel Sybil attack detection method based on RSSI for VANETs. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),: IEEE, pp. 591–602. Yao, Y., et al. (2017). Voiceprint: A novel Sybil attack detection method based on RSSI for VANETs. In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),: IEEE, pp. 591–602.
7.
8.
Zurück zum Zitat Pukale, P., & Gupta, P. (2013). Analysis of end-to-end delay in vehicular networks. International Journal of Science Research, 5, 1122–1125. Pukale, P., & Gupta, P. (2013). Analysis of end-to-end delay in vehicular networks. International Journal of Science Research, 5, 1122–1125.
9.
Zurück zum Zitat Walters, J. P., Liang, Z., Shi, W., Chaudhary, V. (2007). Wireless sensor network security: A survey. In Security in distributed, grid, mobile, and pervasive computing: Auerbach Publications, pp. 367–409. Walters, J. P., Liang, Z., Shi, W., Chaudhary, V. (2007). Wireless sensor network security: A survey. In Security in distributed, grid, mobile, and pervasive computing: Auerbach Publications, pp. 367–409.
10.
Zurück zum Zitat Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef
11.
Zurück zum Zitat Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.CrossRef Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.CrossRef
12.
Zurück zum Zitat Boukerche, A., Oliveira, H. A., Nakamura, E. F., & Loureiro, A. A. (2008). Vehicular ad hoc networks: A new challenge for localization-based systems. Computer communications, 31(12), 2838–2849.CrossRef Boukerche, A., Oliveira, H. A., Nakamura, E. F., & Loureiro, A. A. (2008). Vehicular ad hoc networks: A new challenge for localization-based systems. Computer communications, 31(12), 2838–2849.CrossRef
13.
Zurück zum Zitat Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). "Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560–7572.CrossRef Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). "Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560–7572.CrossRef
14.
Zurück zum Zitat Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 38, 100312.MathSciNetCrossRef Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 38, 100312.MathSciNetCrossRef
15.
Zurück zum Zitat Sefati, S. S., & Tabrizi, S. G. (2021). Cluster head selection and routing protocol for wireless sensor networks (WSNs) based on software-defined network (SDN) via game of theory. Journal of Electrical and Electronic Engineering, 9(4), 100–115.CrossRef Sefati, S. S., & Tabrizi, S. G. (2021). Cluster head selection and routing protocol for wireless sensor networks (WSNs) based on software-defined network (SDN) via game of theory. Journal of Electrical and Electronic Engineering, 9(4), 100–115.CrossRef
16.
Zurück zum Zitat Park, P., Di Marco, P., Nah, J., & Fischione, C. (2020). Wireless avionics intracommunications: A survey of benefits, challenges, and solutions. IEEE Internet of Things Journal, 8(10), 7745–7767.CrossRef Park, P., Di Marco, P., Nah, J., & Fischione, C. (2020). Wireless avionics intracommunications: A survey of benefits, challenges, and solutions. IEEE Internet of Things Journal, 8(10), 7745–7767.CrossRef
18.
Zurück zum Zitat Sengan, S., Subramaniyaswamy, V., Nair, S. K., Indragandhi, V., Manikandan, J., & Ravi, L. (2020). Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Generation Computer Systems, 112, 724–737.CrossRef Sengan, S., Subramaniyaswamy, V., Nair, S. K., Indragandhi, V., Manikandan, J., & Ravi, L. (2020). Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Generation Computer Systems, 112, 724–737.CrossRef
19.
Zurück zum Zitat Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless personal communications, 73(1), 95–126.CrossRef Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless personal communications, 73(1), 95–126.CrossRef
20.
Zurück zum Zitat Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258–47267.CrossRef Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258–47267.CrossRef
21.
Zurück zum Zitat Yu, B., Xu, C.-Z., & Xiao, B. (2013). Detecting sybil attacks in VANETs. Journal of Parallel and Distributed Computing, 73(6), 746–756.CrossRef Yu, B., Xu, C.-Z., & Xiao, B. (2013). Detecting sybil attacks in VANETs. Journal of Parallel and Distributed Computing, 73(6), 746–756.CrossRef
22.
Zurück zum Zitat Chen, C.-L., Chang, C., Chang, C.-H., & Wang, Y.-F. (2013). A secure ambulance communication protocol for VANET. Wireless personal communications, 73(3), 1187–1213.CrossRef Chen, C.-L., Chang, C., Chang, C.-H., & Wang, Y.-F. (2013). A secure ambulance communication protocol for VANET. Wireless personal communications, 73(3), 1187–1213.CrossRef
23.
Zurück zum Zitat Fogue, M., et al. (2014). Securing warning message dissemination in VANETs using cooperative neighbor position verification. IEEE Transactions on Vehicular Technology, 64(6), 2538–2550.CrossRef Fogue, M., et al. (2014). Securing warning message dissemination in VANETs using cooperative neighbor position verification. IEEE Transactions on Vehicular Technology, 64(6), 2538–2550.CrossRef
24.
Zurück zum Zitat Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145–173.CrossRef Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A. M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145–173.CrossRef
25.
Zurück zum Zitat Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing, 75, 712–727.CrossRef Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing, 75, 712–727.CrossRef
26.
Zurück zum Zitat Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103.CrossRef Cunha, F., et al. (2016). Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44, 90–103.CrossRef
28.
Zurück zum Zitat Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1550147720906390.CrossRef Liu, J., Yang, W., Zhang, J., & Yang, C. (2020). Detecting false messages in vehicular ad hoc networks based on a traffic flow model. International Journal of Distributed Sensor Networks, 16(2), 1550147720906390.CrossRef
29.
Zurück zum Zitat Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179–2193.CrossRef Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179–2193.CrossRef
30.
Zurück zum Zitat Barnwal, R. P., Ghosh, S.K. (2012). Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks. In 2012 International Conference on Connected Vehicles and Expo (ICCVE): IEEE, pp. 29–34. Barnwal, R. P., Ghosh, S.K. (2012). Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks. In 2012 International Conference on Connected Vehicles and Expo (ICCVE): IEEE, pp. 29–34.
Metadaten
Titel
Detecting Sybil Attack in Vehicular Ad-hoc Networks (Vanets) by Using Fitness Function, Signal Strength Index and Throughput
verfasst von
Seyed Salar Sefati
Sara Ghiasi Tabrizi
Publikationsdatum
30.10.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09261-x

Weitere Artikel der Ausgabe 3/2022

Wireless Personal Communications 3/2022 Zur Ausgabe

Neuer Inhalt